0% found this document useful (0 votes)
4K views56 pages

Dorks Today

The document appears to contain snippets of code and text from various web shells and hacking tools. There are references to file permissions, server software/OS details, database status, and basic shell interactions. Many of the snippets contain code, credentials or indications that they are from unauthorized access or hacking tools.

Uploaded by

Joao Santos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4K views56 pages

Dorks Today

The document appears to contain snippets of code and text from various web shells and hacking tools. There are references to file permissions, server software/OS details, database status, and basic shell interactions. Many of the snippets contain code, credentials or indications that they are from unauthorized access or hacking tools.

Uploaded by

Joao Santos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 56

H/drwxrwxrwx [ home ] windows-1251 wso 2.

XdawelaX

K0D1K Backdoor, Recoded By K0D1K

/* Decoded by Anonymox9ja */ mailer

intitle:Automatic cPanel Finder/Cracker 3xp1r3 Cyber Army

M O C H U B O Y I N B O X M A I L E R
.:|T.C.T xMailer |:.

intitle:Atom!c Bomb

B0FF codesupp edit

drwxr-xr-x [ home ]. UTF-8 Windows-1251 KOI8-R KOI8-U cp866

/ drwxr-xr-x [ File Manager ]. UTF-8, Windows-1251, KOI8-R, KOI8-U, cp866. Server


IP

/ drwxr-xr-x [ home ]. UTF-8, Windows-

-rw-r--r--, R T E D

-rwxr-xr-x, R T E D

RC-SHELL v2 ext:php

RC-SHELL v2.0.2011.0827

+[ No Free 2015 ]+

[ Rofik Shell ]

JamvanHax0r Web Sh3LL

Coded by RetnOHacK #Procoderz Team Albanian

#Procoderz Team Albania - 1337w0rm � RetnOHacK 2013

UTC 2015 x86_64. Safe mode: OFF

El Moujahidin Bypass Shell

ELMALISEKER Backd00r

::[ k4L0ng666 HeRe ]

M3R1C4 Shell Backdoor

Windows NT WIN-1RBRKP3NC8R 6.1 build 7601

Copyright � Trenggalek Cyber Army

disk total/free \ \ web software \ \ safe mode \ \ open basedir \ \ curl \ \


Rajaoui-PS Mini Sh3ll

ShellIBT/shellibt.php

ALFA-SHELL-V2.5.0.1

\ sys \ \ kernel \ \ user \ \ disk total/free \ \ web software \ \ safe mode \ \


open basedir \ \ curl \ \ mysql \ \ mssql \ \ oracle \ \ postgresql \ \ \ \ linux

Treize_Shell

uname: user: php: hdd: 5 rw r r select action

uname -a: Windows NT STORM 6.1 build 7601

-=[Indonesia Cyber Crash Shell]=-

--==[[ InCreDibLe SHelL By Team IndiShElL ]]==--

MANNU SHELL By Team IndiShell

=[ Symlink By CaptSalkus48 ]=pass:hackmeDON


Coded by Donnazmi pass:hackmeDON

!!BLAZING HACKERS PAKISTAN!!SHELL!! pass:bhp


Coded by : E@GL3 STR!K3R pass:bhp

404 Error Web Shell by Madleets.com

Software : Microsoft-IIS/8.5
System OS : Windows NT NJWEB01 6.2 build 9200 (Unknown Windows version Standard
Edition) i586 | [ Google ] | [ milw0rm ]

.::. Anonymox9ja T.C.T Mailer 2016 .::.

/drwxrwxrwx [ home ] windows-1251 wso 2.4

Software: Apache/2.4.7 (Ubuntu). PHP/5.5.9-1ubuntu4.20. uname -a: Linux

Name Size Permissions Option drwxr-xr-x

Code By: H?i CLover [#] H?i Clover � [#]

HOME PROCESS EVAL SQL HASH CONNECT ZONE-H DDOS SAFE MODE SYMLINK MADSPOT KIll C0de

r57shell v.1.42 | Byt3B0y mod. |

WSO 2.4 | [ Php ]

Hacked By Alarg53

Cod3d By Alarg53

Hacked By Alarg531.0, Coded By Alarg53 Hacked By Alarg531.0, Coded By Alarg53

-:[ User & Domains & Symlink ]:- ext:php


Symlink_Sa 3.0

Anonjocker Shell by Karim-TN v1.0

Choose File Submit

/ drwxr-xr-x [ home ].Cwd: Linux

Uname user php hdd wso

Wso smp.php safe mode- off [ phpinfo ] datetime- drwxr-xr-x [ home ]

Permisions: drwxr-xr-x [home dir]

c99madshell apache drwxr xr x shell php smp

Madspot security team shell rw r

r00t-tEaM ShElL

!C99madShell v. 3.0 BLOG edition!

Owned By EPO--=[ KING OF HALIFAX]=--

Cod3d by Mr.Alsa3ek and Al-Swisre

drwxrws--- [ home ]

[ WSO r3coded by Kerupuk -Stupidc0de Family x Sanjungan Jiwa Team ]


[Google] [Exploit-DB]
"::---[ MCA shell ]---::"
::[ BillGate - cybery army ]::
(( Hacked By: Al-rqmi.TM )
intitle:"index of/"sym.php"
drwx---r-x [ home ]
# �#Powered by FULLMAGIC COMMUNITY:: Masa Depan Mu Adalah Kematian ::
[ Bing ] | [ Zone-H ]
Server IP:
inurl:c99.php uid =
Linux neon.mtw.ru 3.9.3

Anjiyo Bypass Shell

2016 safe-mode off linux neon drwxr-xr

BWI PriV8 Sh3LL

Haunted Uploader Shell r3c0ded bY Haunted Bro Team.

[#] HauntedUploader Shell

Siyanur5x.php bypass privilege shell

2016 safe-mode off linux neon drwxr-xr

Coded by MecTruy

0rYX_HACKER.PHP Handler Bypass Shell Beta 1.0


[ Salam ? Alaykoum ]

Jijle3 [PHDZ] ext:php

[ � ] LyCaNZ [ � ]

[ � ] S E M P A K [ � ]

(Writeable). Make file: (Writeable). Execute: Upload file: (Writeable)

Permissions, Actions. [ . ] dir

"xploit.php" drwxr-xr-x

[ freedom is real - 1945 ]

-=[ b374k r3c0ded by ./Mr.Dha ]=-

Black CyberSec Crew Shell

Web Shell b374k r3c0d3d by x'1n73ct

[ + ] 1n73ct10n Shell V3.3 [ + ]

Mr.RobotX169-Web Shell

IndoXploit Coder Shell

Mr Secretz Shell

Stupidc0de Shell

[+] cPanel & WHM Toolkit

ERORDZ

Claymiro Shell

--------------Anonymous Shell-----------------

-=[ b374k r3c0ded by X'1N73CT & S1T1 B4RC0D3 ]=-

� 2015 X'1N73CT & S1T1 B4RC0D3

Make Dir

2016 safe-mode off windows-1251 drwxr-xr

Gabesi TN File Manager

Coded By Gabesi TN

Hacked by Gabesi TN

-=[ Walkers404 File Manager ]=-

/ drwxr-xr-x [ File Manager ]

Pak Hunters File Manager


Hunter Bajwa File Manager

Halako File Manager

</> ustadcage_48 file manager

File Manager (Aut0Upload3r)

2015 Safe Mode Wso Smp (writeable)

linux - drwxr -xr -x

2016 safe-mode off linux drwxr-xr

2016 Safe Mode Wso Smp (writeable)

GB-WSO-IP-WSO.

WSO 2.5 lt windows-1251 (writable)

=[ 1n73ct10n privat shell ]=

Andela1C3 v.3

=[ Benny-x207 privat shell ]=

||@N0NYM0US-S3C.ORG SHELL||

Uname: Windows NT HW19 6.2 build 9200 [Google] [milw0rm]

Safe mode: OFF [ phpinfo ] Datetime: upload

safe : OFF MySQL: ON | Perl: ON . Server IP :

-rw-rw-rw- R T E D

Permission: -rw-rw-rw-

uname -a : sysctl : $OSTYPE : Server : id : pwd : ip

drwxrwxrwx RT
intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink
File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ]
[ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ]
[ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php
MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON WGet: ON
Fetch: OFF Perl: ON

Security Info Processes MySQL Eval Encoder Mailer milw0rm Md5-Lookup Toolz Kill-
Shell Feedback Update About
FTP-Brute

Freespace : 2396.21 GB of 3304.2 GB (72.52%). MySQL: ON MSSQL: OFF Oracle: OFF


MSSQL: OFF PostgreSQL: ON cURL: ON WGet: ON Fetch: OFF Perl: ON
ALFA TEaM SHeLL

[FTP Buteforcer] [Security Info] [Processes] [MySQL] [PHP-Code] [Encoder]


[Backdoor]

[Home] [Enumerate] [Search] [Self-Kill] [About]

[PHP-Tools] [Cpanel Finder] [Install PHP Proxy] [Install RFI/LFI Scanner] [Mass
Code Injection]

Software : Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/1.0.1e-fips mod_jk/1.2.37


mod_bwlimited/1.4. PHP/5.5.28 - php.ini

New8ie-Shell

mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off

2011 php perms safe-mode: off (not secure)

[ftp buteforcer] [security info] [processes] [mysql] [php-code] [encoder]


[backdoor]

[home] [enumerate] [search] [self-kill] [about]

mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: on
fetch: on perl: on

mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off

curl: off mysql: on mssql: off postgresql: off oracle: off

curl: on mysql: on mssql: off postgresql: on oracle: off

curl: on mysql: on mssql: on postgresql: on oracle: off

frosch orgel

mysql: on mssql: off oracle: off mssql: off postgresql: on curl: on wget: on fetch:
off perl: on

safe-mode: off (off secure) drwxr-xr-x

mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off-rw-r-

2010 safe~mode drwxr-xr-x

2010 safe~mode perms drwxr

[ftp buteforcer] [security info] [processes] [mysql] [php-code] [encoder]


[backdoor] [back-connection] [home] [enumerate] [md5-

[ftp buteforcer] [security info] [processes] [mysql] [php-code] [encoder]


[backdoor] [home] [enumerate] [search] [self-kill] [a

curl: on mysql: on mssql: off

perms drwxr-xr-x

WSO [MySQLl] [home] [perl: off] perms drwxr

curl: on mysql: on mssql: on postgresql: off oracle: off

SyRiAn Electronic Army Shell

storm 3[hard edition]

Manager | Jump | SQL | Extract Users & Domains | Hash Tools | Md5 | Crack |
/etc/passwd | Symljnk | CGI | Root | Bypass | Up shell | Mailer Tools |Leech | |
Encode JS Obfuscator | Decode JS Obfuscator | Encode PHP | Decode PHP | BackConnect
| Brute Force Tools | CM | Reverse IP

Lolipop BETA ( Powered By KingDefacer )

( CyberMiniShell v1.0 )

webadmin.php create symlink delete rename move


Delete, Chmod, Rename, Edit drwxr-xr-x ext:php

B Ge Team File Manager drwxr-xr-x ext:php

Recode Galerz Shell


OS Shell
Z3U54774CK | OWL SQUAD

404-server!! drwxr-xr-x

ZONE TUNISIA TEAM FILE MANAGER VERSION 1

Golden-Hacker File Manager

Cod3d By Alarg53

[#] hm X_Shell Backd00r [#]

{+} Mr.Trouble5hooting Was Here..!!! {+}

? Stupidc0de Family Backdoor ?

MesterFri File

Mr Secretz Shell

mas-untung [dot] [tk]

</> USTADCAGE_48 FILE MANAGER


$$ Beby $$

EBULOBO SHELL

Upload File ... -- drwxr-xr-x. Delete Chmod Rename

intitle:�wso � ext:php intext:�server ip� 2015 intext:� [ home ]�''

ALFA TEaM SHeLL

Madspot Security Team Shell Drwxr Xr X

0x404 Backdoor

Uname: User: Php: Hdd: Cwd


...:::: PHP File Manager
Current Path : "Upload File" Version 1.0, Coded By filetype:php site:net

Current Path : "Upload File" drwxr-xr-x

[#] DrXx [#]

current path /var/www/html/ upload ext:php

404-server upload file name size -rw-rw-r-- delete chmod rename edit

MySQL : ON | Perl : ON | Python : ON | WGET : ON | CURL : ON Current Path


Public Shell Version 2.0

-- drwxr-xr-x. Delete Chmod Rename. Man Man

W3LL M!N! SH3LL

Mister Spy drwxr-xr-x


[#]S4yur xh3LL Backd00r [#]

X.X File Manager


X.X Mini Shell

B Ge Team File Manager

[#] Mini Anime Shell [#]

3QRAB ALMO5EAM File Manager

Rwad Security File Manager

DrXx1.0, Coded By SAHARA H4XOR

public-html/wp-content [home] -rw--r--r-

Speca Turshi shell

MalaysiaGOV File Manager

Recoded By Cyber4rt

2016 safe mode utf-8 drwxr-xr

SmartSh3ll @by_DrBaKou

Wso smp.php rw-r safe off

2016 safe mode utf-8 drwxr-xr

D3c0d3r Team Shell

Software : Apache/2.2.8

SAFE MODE is OFF (Not Secure) OS : Windows NT

http://www.indetectables.net/viewtopic.php?p=275405

/public_html/wp-content/uploads/

"G22B File Manager"

[!] Silent MiNi Shell [!] ~ Silent L0v3R ~

PHP Tryag File Manager 1.4 G-B - :: Security ???? ????? Arab ::

SNOOPER DZ SHELL

"[email protected]"

xor.php
"g2b.php"

::---[MCA shell]---::.php"

::[ MCA shell ]:: - Hacked By:Al-rqmi.TM

"[MCA shell]"

!N3tShell v. Emp3ror Undetectable #18!

[Cyber Anarchy Shell] by r0ot

[ STUNSHELL #unknown @ ByroeNet ]

1n73ction Shell V3.3 [ Special Edition ]

h1kt0s4 shell

1 0.39% basel 3.1 library


1 0.39% basel interpolation
1 0.39% basel interpolation engine
1 0.39% basel spectra
x2300 locus7shell modified by #!physx^
basel stellar library
allintext:�safe-mode: off (not secure)
1 0.39% x2300 locus7shell v. 1.0a beta
1 1.22% .phpact=f shell
uid=30(wwwrun) gid=8(www)
2 0.78% .us/images/0/588/mo_656_656.swf
2 0.78% allintext:--[ x2300 locus7shell v. modded by #!physx^

lion/

"Current Path : /var/www/html/" upload

DC3 Cyber ??Security Crew Shell Shell Dive PRIV DxShell.1.0 egy

x2300 Locus7 Shell

Backdoor of Et04

K0D1K Backdoor, Recoded By K0D1K


Welcome To Hell :) -rw-r--r--

13chmod37 priv8 Shell

Coded By ./ChmoD Home:

:: Coded By izleyici

Hacked MichZo

ELMALISEKER Backd00r ASP


Gamma Web Shell Perl-Cgi
go-shell Perl-Cgi

Sindbad File Manager

Dr.S4mom File Manager

intitle:HackeD By Matrix Dz

hacked by Mr.DreamX196

"Sindbad~EG File Manager"

.:!~@# .::M@rAz Ali::. #@~!:.

config root man just like file manager


-rw-r--r-- Man Man ext:php

hacked by nofawkX-al

Drs-team web shell

"D.R.S Dz"

!:: JACKSON ::!

ZARk - Backd00R eXpl0iter

Blackshot BACKD00R

Hamdida X_Shell Backd00r

Upload File : Name: Size: Permissions: Options:

BOSS SHELL

Cyber Team Cirebon

Red White Spirit Team

[!] DiffMuRis Shell

El Moujahidin Bypass Shell -rw-r--r--


bypass 1.0, Devloped By El Moujahidin

Fallagassrini Bypass Shell

Coded By Ashiyane HaCkEr

By Error Filename ? Size Permission Owner Group Functions

X-m3n
"X-m3n" shell ext:php

[+] idbte4m shell v1

+-=[ Coded by Sy$+3mX | BloodSecurity Hackers ]=-+


[?CWD] [?DOC_ROOT] [?PARENT] [RELOAD]
[WRITABLE][READABLE] ~> drwxr-xr-x

c99shellbyR3.php

Bloodsec International
Bloodsec International Private shell by ~OverLaX~

X-P - Shalimar Group

Dr.SiLnT HilL Bypass Shell

IDBTE4M SHELL V1 [+]=-

7RAXEX xh3LL Backd00r

RouGani Shell

Official #OpHongKong Shell

AnonymousFox Shell

_ow _4 _a_ch ? __^

[#] DiDO [#]

Mr. DellatioNx196 GaLers xh3LL Backd00r

TANBE CYBER TEAM SHELL ARYMY

AL-VRI (shell)

Bogor Blackhat shell

Sinkashit Shell v.666

Current File Backd00r

4n0ns 4LphA xh3LL Backd00r

[#] Anon Aplha xh3LL Backd00r

::[ BillGate - Muslim Cyber Army ]::

[#] uLtRa VicTory xh3LL Backd00r [#]

GaLers Shell SANDI JULIAN BACKDOOR

path=/var/www/vhosts/

Doctor_injection Shell

Gunz_Berrry xh3LL Backd00r

Uploaded by: KN4CK3R

Blackshot BACKD00R

intitle:hacked by noFawkx-al
intitle:backdoor + inurl:edu

ASPYDrvsInfo

Sniper-Sa Shell

N3TWAR SPAMMER

n3tw4r INBOX

Spiritokiller INBOX

k4raeL+-+sh3LL
#k4rael - Sh3ll

HaCkeR"s By jozaF

HaCkEd By _=Reza=_

Egy-Spider Shell

HACKED by [ �0��upT3R ] [ RunN3R-32 ]

.::M9awdin Team::..

[#] GaLers xh3LL Backd00r - mex exchange

SyRiAn Sh3ll ~ V8~ [ B3 Cr34T!V3 Or D!3 TRy!nG ]

Hacked By Blackhattiger

ISPA Shell Prv8

d | HACKED BY ANONCODERS - CYBER CALIPHATE

Intext:S4yur xh3LL Backd00r

Intext:Hamdida X_Shell Backd00r

X11R6

Coded By Mr.Hamdida X_Shell Backd00r

Coded By G-B Home:

backdoorintitle:"Hamdida X_Shell Backd00r"

Dtool Pro 21. Dx Shell v1.0 22. ekin0x 23

"uploader by ghost-dz"ext:php

Hacked by IndoXploit

Lazy File Manager

D2MYSILENT Privat3 Sh3ll

[#] Hacktivist Jihad sh3LL Backd00r


intitle:MyShell 1.1.0 build 20010923

inurl:/administrator/index.php?autologin=1

intext:powered by joomla & filetype:sql -github

Intext:GaLers xh3LL Backd00r

b4cKd00r 3 Coded By Mr. DellatioNx196 Indonesian Cyber Freedom

Gunz_Berrry Backd00r

[#] Gunz_Berrry AnonCoders Backd00r [#]


Gunz_Berrry

D14N xh3LL Backd00r


Memberal_Force xh3LL Backd00r
ILink7 | [#] GaLers xh3LL Backd00r [#]
FallaGa File Manager
Tryag File Manager
Hacked by ./BlaDDzeRR
H4CK50D1 xh3LL Backd00r

OuNeT RdXxS Shell

MulCiShell v2.0
Zehir Shell
Dark Shell
ASPX Shell
Altantiq Shell
][Black-Heart][
c99.xml
cPanel Shell
c99.xml

Lou Sh File Manager

Khanh Cloud! Mini Shell

Coded by Fallag Gassrini |Tunisian Fallaga Team

Intext:[#] Walkers Xhell Backd00r [#]

Intext:Gunz_Berry AnonCoders Backd00r

gunz_berry | Hacked MD-GHOST

AnoaGhost Shell File Manager

hacked by moroccan wolf

Hacked By Predator-Ma

Hacked by Zabi8

Da3s HaCkEr File Manager


Fr13nds File Manager

HaTRk File Manager

Cyb3r_Dr4in File Manager

Fr13nds Team File Manager

path=/var/www/

darkshadow File Manager

uploader by ghost dz

Dr.silnt HilL File Manager

Dr.ViP File Manager

Coded By Fallag darkshadow-tn

Hacked By (The_InJx)

Hacked By MrMax

Hacked By DrLazy Fallag

.::Hacked By Owner Dzz::.

| HaCkEd ~ By: MD ~GHOST|

Hacked By MD-GHOST

fileupload-XpaLFz_TAclwLOT69023703.log

HaTRk File Manager

Dr-Jn File Manager Version 1.0, Coded By HaCkEr

Hacked By TheWayEnd | [#] S4yur xh3LL Backd00r [#]

Current Path : /var/www/vhosts/

Siber-Warrior Clean SheLL

Cyb3r_Dr4in File Manager

Safe mode: OFF [ phpinfo ] Datetime: Server IP:

[ + ] Nabil NaSsiri [ + ] | [ Php ]

[+] Pontianak Crew [+]

-:[ DM SHELL ]:-

�[ Hacked by Uchiha ]�

Uname User Php Hdd Cwd. [ Sec. Info ].

3Turr ~ SH311
k 2 l l 3 3 d S h e l l

::k 2 l l 3 3 d::

2015 gb safe mode off server ip

EliTeCr3W�

WSO [Black-ID] 3.0

Madspot security shell safemode smp drwxr rw r

2015 safe mode shell smp drwx sql

drwx+Shell+SMP+File+PHP/

SQL PHP-code Update Feedback Self remove Logout. drwx--x--x

upload: [ok] make file: [ok] drwxr xr x ext:php

CyberTrons xh3LL Backd00r

Coded By Mr. CyberTron

R57 WSO uname RW R

gALerZ xh33L b4cKdDoRz

0R4EL3XH33L

[#] Bems404 xh33L b4cKdDoRz [#]

[+]OWNED[+]

-rw-r--r--. Delete, Chmod, Rename, Edit

=|#Mr.EXI2T|= =

!shell recoded by !87&!01 kurdish blackhats

bypass 1.0, Devloped By El Moujahidin

dhfdfh | [+]OWNED[+]

gALerZ xh33L b4cKdDoRz r3c0ded bY Zee Zuu

search.assist.shaw.ca

allinurl:"/wp-content/themes/newsworld/*.php"

allinurl:/wp-content/themes/newsworld/getresults.php site:org

allinurl:/wp-content/themes/newsworld/getresults.php site:biz
allinurl:/wp-content/themes/newsworld/getresults.php site:in

allinurl:/wp-content/themes/newsworld/newuser.php

allinurl:/wp-content/themes/newsworld/getresults.php first

thumbopen.php?src=http://flickr.com.apartmentrentalslist.com/index.php second

https://defense.ballastsecurity.net/decoding/index.php?
raw=b8054335e47c2604c48729ed0ad34a0d

https://defense.ballastsecurity.net/decoding/index.php?
raw=7dd5ccad14ab12de7b73b34a4ada4159

inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"

intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]


[ tmp ] [ delete ]

inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout

inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout

intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update

webadmin.php
webadmin.php drwxr-xr-x

[ � ] S E M P A K [ � ] shell

Sadrazam | Casus Shell

Modded FaTaLisTiCz_Fx Fx29SheLL - 30 - 12 - 2010

Small Web Shell by ZaCo PHP

Ceweng Cyber 1.02 05.2011

C37 phpshell 1.1

b374k m1n1 1.01


CiH H@CkErZ CiH99 v8.2 2018

m1n1 newbie3vilc063s.2012

intitle:"index of/" "Ardy47@Problem

intitle:"index of/" "sym.php

intitle:"index of/" "sadrazam.php?

intitle:"index of/" "GnY.php

intitle:"index of/" " webadmin.php

--==[[ Symlink Based CPanel Cracker By Team IndiShell ]]==--

-=[Symlink Tools to bypass user]V.3=-

o---[ Developer by SnIpEr_SA Symlink User Bypass]---o

filetype php r57 shell

drwxr-xr-x - SuperWeb

"drwxrwxrwx" hsphere shell filetype:php

13chmod37 priv8 Shell

CiH_H@CkErZ CiH99 v8.2 2014

eXpCrEw SHeLL

==AXeL PaNi==

==eL PaNi==

==INTeL PaNi==

==IZeL PuNe==

-===[ ExploreCrew WebShell ]===-- - -


cc

Mr.TiGeR shell

o---[ Xgr0upVn.org - shell by RST/GHC | http://Xgr0upVn.org | H@ck+Cr@ck=Enj0y! |


Design by:AluCaR | ]---o

intitle:"Symlink_Sa 2.0 "

o--{ UnKn0wN Shell }--o

o--{ W.A.S Shell }--o

#k4raeL - sh3LL
o--{ Cubi11 Shell }--o

o--{ TuN-Hax0rS Shell }--o

NeT-Own3r Shell

HMBr57 Shell
c99madshell drwxr-xr-x

AluCaR Shell

Sniper-Sa Cr3w
zehir ASP shell
ly0kha shell
h4ntu shell [powered by tsoi] PHP

SnIpEr_SA shell

#
lamashell PHP
#
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP
#
load_shell PHP
c99madshell ok drwxr-xr-x filetype:php
bypass drwxr-xr-x filetype:php

Rchi xh3LL Backd00r

GaLers xh3LL Backd00r

=[Indonesia Cyber Crash Privat Shell]=

K2LL33D SHELL

o---[ r57 Shell ]---o o---[ heroes1412 ]---o

[ + ] 1n73ct10n Shell V3.3 [ + ]

[milw0rm!] bypass drwxr-xr-x filetype:php

Permisions: drwxr-xr-x [home dir]

Wso 2.2 Drwxr Xr X

Wso 2.1 Drwxr Xr X

Php Uid Drwxr Xr X Uname A Http

Uname A Uid Drwxr Xr X R57shell

Public Html Drwxr Xr X

Wso 2.3 Drwxr Xr X

Boff 1.0 Drwxr Xr X


_[ X-Shell ]_::. .::_[ VnZone ]_

x0rg-Bypass

Mr.Xu�n Qu�
Shell

jatimcrew .: Ninja_1263:.

X Slash SHELL 1.5 06.2008

Laskar Lolabu1.5 06.2008

[FTP Buteforcer] [Security Info] [Processes] [MySQL] [PHP-Code] [Encoder]


[Backdoor] [Back-Connection] [Home] [Enumerate] [Md5-Lookup] [Word-Lists] [milw0rm
it!] [Search] [Self-Kill] [About]

!N3tShell v. Emp3ror Undetectable #18!

[Cyber Anarchy Shell] by r0ot

[ STUNSHELL #unknown @ ByroeNet ]

1n73ction Shell V3.3 [ Special Edition ]

h1kt0s4 shell

! tryagshell 1.3

h1kt0s4

h1kt0s4
-
r57 Shell -
c100 Shell -
Sniper-Sa Shell
Egy-Spider Shell
Locus Shell

#!physx

CiH_H@CkErZ CiH99 v8.1 2013

FX29 Shell

[FULL]Fx29SheLL

By FaTaLisTiCz_Fx
Fx Fx29SheLL v2.0.09.08

Uploader
PHPjackal1.3
Mail List Maker

..............................................................................
!C99Shell v. 1.0 beta!
!C99Shell v. 1.0 pre-release build #16!
!C99Shell v. 1.0 pre-release build #5!
!C99shell v. 1+Safe-mode: OFF (not secure)
!c99shell v. 1+Safe-mode: OFF (not secure)
"c99" filetype:php intext:"Safe-Mode: OFF"
"c99.php" filetype:php
"c99shell v 1.0"
"c99shell v. 1.0 "
"c99Shell v. 1.0 pre"
"C99Shell v. 1.0 pre"
"c99Shell v. 1.0 pre-release build "
"C99Shell v. 1.0 pre-release build "
"c99shell v. 1.0 pre-release build"
"c99shell v. 1.0 pre-release"
"Captain Crunch Security Team" inurl:c99
"Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
"Encoder Tools Proc. FTP brute"
"index of /" c99.php
"index of" c99.php
"Index of/"+c99.php
"inurl:c99..php"
"inurl:c99.php"
"uname -a","uid=","drwxr-xr-x","r57shell"
--[ c99shell v. 1.0 pre-release build #15 | Powered by ]--
--[ c99shell v. 1.0 pre-release build #16
--[ c99shell v. 1.0 pre-release build #16 powered by Captain Crunch Security Team |
]--
=C99Shell v. 1.0 pre-release
allintext: Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self
remove
allintext:C99Shell v. 1.0 pre-release build #12
allintitle: "c99shell"
allintitle: C99shell filetype:php
allinurl: "c99.php"
allinurl: c99.php
allinurl:"c99.php"
allinurl:"c99.php" filetype:php
allinurl:.c99.php
allinurl:/c99.php
allinurl:c99.php
allinurl:c99.php?
c9 shell v.1.0 (roots)
c9. PHP-code Feedback Self remove
c9.php
c9.php "intitle:Index of "
c9.php download
c99 shell v.1.0 (roots)
c99. PHP-code Feedback Self remove
c99.php "intitle:Index of "
c99shell [file on secure ok ]?
c99shell +uname
c99shell filetype:php -echo
c99shell linux infong
c99shell php + uname
c99shell powered by admin
c99shell v. 1.0
C99Shell v. 1.0 beta !
c99shell v. 1.0 pre
C99Shell v. 1.0 pre-release
C99Shell v. 1.0 pre-release build
c99shell v. 1.0 pre-release build
C99Shell v. 1.0 pre-release build #
C99Shell v. 1.0 pre-release build #12
c99shell v. 1.0 pre-release build #16
C99Shell v. 1.0 pre-release build #16
c99shell v. 1.0 pre-release build #16 |
C99Shell v. 1.0 pre-release build #16 administrator
C99Shell v. 1.0 pre-release build #16 download
C99Shell v. 1.0 pre-release build #16 software apache
C99Shell v. 1.0 pre-release build #16!
C99Shell v. 1.0 pre-release build #5
c99shell v. 1.0 pre-release build #5
c99shell v. 1.0 release security
C99Shell v. 1.3
c99shell v. pre-release build
c99shell v.1.0
C99Shell v.1.0 pre-release
c99shell[file on ]ok
c99shell[on file]ok
c99shell+v.+1.0 16
c9shell
c9shell [file on secure ok ]?
c9shell +uname
c9shell filetype:php -echo
c9shell linux infong
c9shell php + uname
c9shell powered by admin
c9shell v. 1.0
c9Shell v. 1.0 beta !
c9shell v. 1.0 pre
c9Shell v. 1.0 pre-release
c9Shell v. 1.0 pre-release build
c9shell v. 1.0 pre-release build
c9Shell v. 1.0 pre-release build #
c9Shell v. 1.0 pre-release build #12
c9shell v. 1.0 pre-release build #16
c9Shell v. 1.0 pre-release build #16
c9shell v. 1.0 pre-release build #16 |
c9Shell v. 1.0 pre-release build #16 administrator
c9Shell v. 1.0 pre-release build #16 download
c9Shell v. 1.0 pre-release build #16 software apache
c9Shell v. 1.0 pre-release build #16!
c9Shell v. 1.0 pre-release build #5
c9shell v. 1.0 pre-release build #5
c9shell v. 1.0 release security
c9Shell v. 1.3
c9shell v. pre-release build
c9shell v.1.0
c9Shell v.1.0 pre-release
c9shell[file on ]ok
c9shell[on file]ok
c9shell+v.+1.0 16
download c99.php
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout"
files/c99.php
ftp apache inurl:c99.php
img.c99.php
img/c99.php
index of /admin/files/
intitle:!C99Shell v. 1.0 pre-release build #16! root
intitle:"c99shell" filetype:php root
intitle:"c99shell" Linux infong 2.4
intitle:"index of /" "c99.php"

intitle:"Index of" c99.php


intitle:"index of" intext:c99.php
intitle:"Index of/"+c99.php
intitle:"index.of" c99.php
intitle:c99shell "Software: Apache"
intitle:c99shell +filetype:php
intitle:c99shell filetype:php
intitle:c99shell intext:uname
intitle:C99Shell pre-release
intitle:c99shell uname -bbpress
intitle:C99Shell v. 1.0 pre-release +uname
intitle:index.of c99.php
intitle:index/of file c99.php
inurl:"/c99.php"
inurl:"/c99.php" intitle:"C99shell"
inurl:"c99.php"
inurl:"c99.php" c99shell
inurl:"c99.php" filetype:php
inurl:"c99.php?"
inurl:/c99.php
inurl:/c99.php?
inurl:/c99.php+uname
inurl:admin/files/
inurl:c99.php
inurl:c99.php c99 shell
inurl:c99.php ext:php
inurl:c99.php uid=0(root)
inurl:c99.php?
ok c99.php
powered by Captain Crunch Security Team
root c99.php
safe-mode: off (not secure) drwxrwxrwx c99shell

Dork : inurl:/wp-content/plugins/wp-vertical-gallery/

Dork : inurl:/wp-content/plugins/estatik/

2013 drwxr-x--- safe mode r57shell rw r


0.07% uname -auid=drwxr-xr-xc99shell
1 0.07% safe mode : off generation time drwxrwxrwx -c99shell
1 0.07% safe mode off drwxrwxrwx c99shell
1 0.07% safe-mode: off (not secure)
1 0.07% safe-mode: off (not secure) drwxrwxrwx c99shell.php
1 0.07% safemode perms drwxr
1 0.07% drwxr-xr-x safe mode on secure public_html c99shell
1 0.07% c99shell drwxr-xr-x uname safe mode secure off public_html
1 0.07% c99shell v. 1.0 beta
1 0.07% @drwxrwxrwx c99shell.php
1 0.07%

drwxr-x--- [ home ]File manager drwx--x--x x86_64 #1 SMP Upload file: (Writeable)
Choose File>>
2015 Safe Mode Drwxr XR X.enumerate] [encoder] [tools] [proc.] [ftp brute] [sec.]
[sql]- wso 2.4 ","drwxr-xr-x","c99madshellPublic HTML drwxrwxrwx 2016 C99madshell
PHP2013 drwxr-x--- safe mode r57shell rw rC99shell Off Oracle drwxrwxrwx
PHP2013:.de/c99madshell.phpN3tshell Drwxr XR X
IL Boff 1.0 RW R
GB Xmlrpc WSO Drwxr
C99shell UName bbPress Drwxr
Drwxr XR X C99shell
C99shell 4.0V Drwxr XR X
Boff 1.0 RW R
Safe SMP Boff RW R" filetype:php intext:"Safe-Mode: OFF"

inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"

"Shell" filetypehp intext:"uname -a:" "EDT 2010"

intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]


[ tmp ] [ delete ]

inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout

inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout

intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update

inurl:r57.php [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ]


[ delete ]
"r57shell 1.4"
"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]"

inurl:b374k.php
inurl:c99.php
inurl:c100.php Generation time:
inurl:itsecteam_shell.php
inurl:"c99.php" inurl:c99.php inurl:c99.php inurl:c99.php allinurl:c99.php
inurl:"c99.php" inurl:c99.php intitle:c99shell uname c99shell v.1.0 (roots)
inurl:/c99.php allinurl:.c99.php allinurl:.c99.php intitle:C99Shell
allintitle:"C99Shell" allintitle:"C99Shell" c99.php ccteam.ru c99.php
intext:c99shell inurl:c99.php
!C99Shell v. 1.0 pre-release build #16!
intitle:c99shell filetype:php
inurl:c99.php
inurl:"/c99.php"
allinurl:c99.php
c99shell v. 1.0 pre-release build #5
"inurl:c99.php" + "intext:safe"
--[ c99shell v. 1.0 pre-release build #12 powered by Captain Crunch Security Team
c99.php download
intitle:r57shell | intitle:c99shell +uname
inurl:minimail c99
!C99Shell v. 1.0 pre-release build # +php -htm -html -shtml
allintitle: c99shell filetype:php
inurl:c99.php uid=0(root)
inurl:c99.php
inurl:/files/c99.php
intitle:c99shell safe-mode:OFF
c99.php "uid=0"
safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php uid=0(root)
allintitle: "c99shell"
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
c99. PHP-code Feedback Self remove
c99shell filetype:php -echo
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell +filetype:php
intitle:C99Shell v. 1.0 pre-release +uname
!C99Shell v. 1.0 pre-release build #5!
inurl:"c99.php"
C99Shell v. 1.0 pre-release build #16!
c99shell v. 1.0 pre-release build #16
intitle:c99shell intext:uname
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell uname -bbpress
B64 PHP Shell � The Defaced - Created by Kr3w
intitle:madspot team shell
inurl:".php?act=exploits"
inurl:".php?act=tools"
inurl:".php?act=encoder"
inurl:".php?act=proxy"
inurl:".php?act=shbd"
inurl:".php?act=fsbuff"
inurl:".php?act=rip"
inurl:".php?act=update"
inurl:".php?act=cmd="
!C2007Shell v. 1.0 pre-release build #16!
-[ c2007shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r| Adora
Security Pwnz j00! |
inurl:.php �cURL: ON MySQL: ON MSSQL: OFF�
�Shell� filetype:php intext:�uname -a:� �EDT 2010?
intitle:�intitle:r57shell� [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]
[ tmp ] [ delete ]
inurl:�c99.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
inurl:�c100.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
intitle:�Shell� inurl:�.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update

1 4 14.29% !n3tshell v. d.o.m team!


2 2 7.14% fx29shell drwxrwxrwx
3 2 7.14% intitle:inbox mailer filetype:php
4 1 3.57% !c99 v0.0.1 syn-mod [synsta]!
5 1 3.57% !n3tshell v. emp3ror undetectable #18! filetype php
6 1 3.57% alex geigy
7 1 3.57% c99 v0.0.1 syn-mod synsta
8 1 3.57% consul autolift
9 1 3.57% drwxrwxrwx n3tshell filetype:php
10 1 3.57% fatalisticz_fx fx29shell v
11 1 3.57% fx fx29shell drwxr-xr-x
12 1 3.57% garage geigy
13 1 3.57% inbox mailer
14 1 3.57% intitle:fx29shell apache uname filetype:php
15 1 3.57% intitle:inbox php mailer ext:php
16 1 3.57% intitle:inbox php mailer ext:php inurl:ch
17 1 3.57% intitle:inbox php mailer filetype:php
18 1 3.57% musawir ali wavelets
19 1 3.57% safe-mode : curl : mysql : mssql-
20 1 3.57% safe-mode: off (no secure). /home/httpd/ -

List of ALL hacking Shells

C99Shell v. 1.0 beta (5.02.2005) PHP


b374k PHP
b374k-mini-shell PHP
Cyber Shell PHP
GFS Web-Shell PHP
NFM 1.8 PHP
r57shell PHP
Small Web Shell by ZaCo PHP
nsTView v2.1 PHP
DxShell v1.0 PHP
C99madShell v. 2.0 madnet edition PHP
CTT Shell PHP
GRP WebShell 2.0 release build 2018 (C)2006,Great PHP
Crystal shell PHP
Loaderz WEB Shell PHP
NIX REMOTE WEB SHELL PHP
Antichat Shell PHP
CasuS 1.5 PHP
Sincap 1.0 PHP
C99Shell v. 1.0 pre-release build(safe-mode) PHP
hiddens shell v1 PHP
Web-shell (c)ShAnKaR PHP
Predator PHP
KA_uShell 0.1.6 PHP
NGH PHP
C2007Shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r PHP
Antichat Shell. Modified by Go0o$E PHP
c0derz shell [csh] v. 0.1.1 release PHP
iMHaBiRLiGi Php FTP PHP
PHVayv PHP
phpRemoteView PHP
STNC WebShell v0.8 PHP
MyShell PHP
ZyklonShell PHP
AK-74 Security Team Web Shell Beta Version PHP
Gamma Web Shell Perl-Cgi
go-shell Perl-Cgi
PhpSpy Ver 2006 Perl-Cgi
CmdAsp.asp.txt ASP
CyberSpy5.Asp.txt ASP
klasvayv.asp.txt ASP
indexer.asp.txt ASP
NTDaddy v1.9 ASP
reader.asp.txt ASP
RemExp.asp.txt ASP
zehir4.asp.txt ASP
Elmaliseker.txt ASP
EFSO_2.txt ASP
accept_language PHP
Ajax_PHP Command Shell PHP
Antichat Shell v1.3 PHP
Ayyildiz Tim -AYT- Shell v 2.1 Biz PHP
aZRaiLPhp v1.0 PHP
backupsql PHP
c99 PHP
c99_locus7s PHP
c99_madnet PHP
c99_PSych0 PHP
c99_w4cking PHP
Crystal PHP
ctt_sh PHP
cybershell PHP
dC3 Security Crew Shell PRiV PHP
Dive Shell 1.0 � Emperor Hacking Team PHP
DTool Pro PHP
Dx PHP
GFS web-shell ver 3.1.7 � PRiV8 PHP
gfs_sh PHP
h4ntu shell [powered by tsoi] PHP
iMHaPFtp PHP
ironshell PHP
JspWebshell 1.2 PHP
KAdot Universal Shell v0.1.6 PHP
lamashell PHP
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP
load_shell PHP
matamu PHP
Moroccan Spamers Ma-EditioN By GhOsT PHP
myshell PHP
Mysql interface v1.0 PHP
MySQL Web Interface Version 0.8 PHP
mysql PHP
mysql_tool PHP
NCC-Shell PHP
NetworkFileManagerPHP PHP
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version PHP
nshell PHP
nstview PHP
PH Vayv PHP
PHANTASMA PHP
PHP Shell PHP
php-backdoor PHP
php-include-w-shell PHP
pHpINJ PHP
PHPJackal PHP
PHPRemoteView PHP
Private-i3lue PHP
pws PHP
r57 PHP
r57_iFX PHP
r57_kartal PHP
r57_Mohajer22 PHP
rootshell PHP
ru24_post_sh PHP
s72 Shell v1.1 Coding PHP
Safe0ver Shell -Safe Mod Bypass By Evilc0der PHP
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 PHP
SimAttacker � Vrsion 1.0.0 � priv8 4 My friend PHP
simple_cmd PHP
simple-backdoor PHP
SimShell 1.0 � Simorgh Security MGZ PHP
SnIpEr_SA Shell PHP
Uploader PHP
WinX Shell PHP
Worse Linux Shell PHP
zacosmall PHP
Antichat Shell v1.3 PHP
Ayyildiz Tim -AYT- Shell v 2.1 Biz PHP
aZRaiLPhp v1.0 PHP
CrystalShell v.1 PHP
Cyber Shell (v 1.0) PHP
dC3 Security Crew Shell PRiV PHP
Dive Shell 1.0 � Emperor Hacking Team PHP
DxShell.1.0 PHP
ELMALISEKER Backd00r ASP
GFS web-shell ver 3.1.7 � PRiV8 PHP
h4ntu shell [powered by tsoi] PHP
JspWebshell 1.2 JSP
KAdot Universal Shell v0.1.6 PHP
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP
Macker�s Private PHPShell PHP
Mysql interface v1.0 PHP
MySQL Web Interface Version 0.8 PHP
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version PHP
Perl Web Shell by RST-GHC PL
Private-i3lue PHP
RedhatC99 [login=redhat-pass=root] PHP
Rootshell.v.1.0 PHP
s72 Shell v1.1 Coding PHP
Safe0ver Shell -Safe Mod Bypass By Evilc0der PHP
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 PHP
SimAttacker � Vrsion 1.0.0 � priv8 4 My friend PHP
SimShell 1.0 � Simorgh Security MGZs PHP
WinX Shell PHP
Worse Linux Shell PHP
NetworkFileManagerPHP.php. � +-- NFM 1.8.php. � +-- NGH.php. � +-- NIX REMOTE WEB
SHELL.

/usr/share/webshells/
+-- asp
� +-- cmd-asp-5.1.asp
� +-- cmdasp.asp
+-- aspx
� +-- cmdasp.aspx
� +-- shell.aspx
+-- cfm
� +-- cfexec.cfm
+-- jsp
� +-- cmdjsp.jsp
� +-- jsp-reverse.jsp
+-- perl
� +-- dc.pl
� +-- perlcmd.cgi
� +-- perl-reverse-shell.pl
� +-- Perl Web Shell by RST-GHC.pl
+-- php
� +-- 529.php
� +-- aa.php
� +-- accept_language.php
� +-- Ajax_PHP Command Shell.php
� +-- Ajax_PHP_Command_Shell.php
� +-- AK-74 Security Team Web Shell Beta Version.php
� +-- angel.php
� +-- Antichat Shell. Modified by Go0o$E.php
� +-- Antichat Shell.php
� +-- Antichat Shell v1.3.php
� +-- Antichat_Shell_v1.3.php
� +-- aspx.php
� +-- aspydrv.php
� +-- Ayyildiz Tim -AYT- Shell v 2.1 Biz.php
� +-- aZRaiLPhp v1.0.php
� +-- aZRaiLPhp_v1.0.php
� +-- b374k-2.7.php
� +-- b374k-mini-shell-php.php.php
� +-- b374k.php.php
� +-- backupsql.php
� +-- beyaz_hacker.php
� +-- c0derz shell [csh] v. 0.1.1 release.php
� +-- c100.php
� +-- c99_locus7s.php
� +-- c99_madnet.php
� +-- C99madShell v. 2.0 madnet edition.php
� +-- C99madShell v. 3.0 BLOG edition.php
� +-- c99.php
� +-- c99_PSych0.php
� +-- C99Shell v. 1.0 beta (5.02.2005).php
� +-- C99Shell v. 1.0 pre-release build(safe-mode).php
� +-- c99unlimited.php
� +-- c99_w4cking.php
� +-- CasuS 1.5.php
� +-- cgi.php
� +-- cgitelnet.php
� +-- CmdAsp.asp.php.txt
� +-- cmd.php
� +-- cpanel.php
� +-- Crystal.php
� +-- Crystal shell.php
� +-- CrystalShell v.1.php
� +-- CTT Shell.php
� +-- ctt_sh.php
� +-- cw.php
� +-- CWShellDumper.php
� +-- cybershell.php
� +-- Cyber Shell.php
� +-- Cyber Shell (v 1.0).php
� +-- CyberSpy5.Asp.php.txt
� +-- dC3 Security Crew Shell PRiV.php
� +-- dC3_Security_Crew_Shell_PRiV.php
� +-- Dive Shell 1.0 - Emperor Hacking Team.php
� +-- Dive_Shell_1.0_Emperor_Hacking_Team.php
� +-- dq.php
� +-- DTool Pro.php
� +-- Dx.php
� +-- DxShell.1.0.php
� +-- DxShell v1.0.php
� +-- EFSO_2.php.txt
� +-- ekin0x.php
� +-- Elmaliseker.php.txt
� +-- erne.php
� +-- ex0shell.php
� +-- FaTaLisTiCz_Fx.php
� +-- fatal.php
� +-- findsock.c
� +-- ftpsearch.php
� +-- g00nshell-v1.3.php
� +-- g3.php
� +-- Gamma Web Shell.php
� +-- gfs_sh.php
� +-- GFS Web-Shell.php
� +-- GFS web-shell ver 3.1.7 - PRiV8.php
� +-- GFS_web-shell_ver_3.1.7_-_PRiV8.php
� +-- go-shell.php
� +-- GRP WebShell 2.0 release build 2018 (C)2006,Great.php
� +-- h4ntu shell [powered by tsoi].php
� +-- h4ntu_shell_[powered_by_tsoi].php
� +-- hiddens shell v1.php
� +-- hxpshell.php
� +-- iMHaBiRLiGi Php FTP.php
� +-- iMHaPFtp.php
� +-- indexer.asp.php.txt
� +-- ironshell.php
� +-- JspWebshell 1.2.php
� +-- JspWebshell_1.2.php
� +-- kacak.php
� +-- KAdot Universal Shell v0.1.6.php
� +-- KAdot_Universal_Shell_v0.1.6.php
� +-- KA_uShell 0.1.6.php
� +-- klasvayv.asp.php.txt
� +-- kral.php
� +-- lamashell.php
� +-- links.php
� +-- liz0zim.php
� +-- Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php
� +-- Loaderz WEB Shell.php
� +-- load_shell.php
� +-- login.php
� +-- lolipop.php
� +-- lostDC.php
� +-- Macker's Private PHPShell.php
� +-- magiccoder.php
� +-- matamu.php
� +-- megabor.php
� +-- micro.php
� +-- Moroccan Spamers Ma-EditioN By GhOsT.php
� +-- Moroccan_Spamers_Ma-EditioN_By_GhOsT.php
� +-- myshell.php
� +-- MyShell.php
� +-- Mysql interface v1.0.php
� +-- Mysql_interface_v1.0.php
� +-- mysql.php
� +-- mysql_tool.php
� +-- MySQL Web Interface Version 0.8.php
� +-- MySQL_Web_Interface_Version_0.8.php
� +-- NCC-Shell.php
� +-- NetworkFileManagerPHP.php
� +-- NFM 1.8.php
� +-- NGH.php
� +-- NIX REMOTE WEB SHELL.php
� +-- NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php
� +-- NIX_REMOTE_WEB-SHELL_v.0.5_alpha_Lite_Public_Version.php
� +-- nshell.php
� +-- nst.php
� +-- nstview.php
� +-- nsTView v2.1.php
� +-- NTDaddy v1.9.php
� +-- PHANTASMA.php
� +-- php-backdoor.php
� +-- php-findsock-shell.php
� +-- php-include-w-shell.php
� +-- pHpINJ.php
� +-- PHPJackal.php
� +-- phpRemoteView.php
� +-- PHPRemoteView.php
� +-- php-reverse-shell.php
� +-- PHP Shell.php
� +-- PhpSpy Ver 2006.php
� +-- PH Vayv.php
� +-- PH_Vayv.php
� +-- PHVayv.php
� +-- Predator.php
� +-- Private-i3lue.php
� +-- pws.php
� +-- qsd-php-backdoor.php
� +-- r00t.php
� +-- R0XEM ShElL.php
� +-- r57_iFX.php
� +-- r57_kartal.php
� +-- r57_Mohajer22.php
� +-- r57.php
� +-- r57shell1.40.php
� +-- r57shell2.0.php
� +-- r57shell.php
� +-- reader.asp.php.txt
� +-- RemExp.asp.php.txt
� +-- robots.php
� +-- rootshell.php
� +-- Rootshell.v.1.0.php
� +-- ru24_post_sh.php
� +-- s1.php
� +-- s2.php
� +-- s72 Shell v1.1 Coding.php
� +-- s72_Shell_v1.1_Coding.php
� +-- sadrazam.php
� +-- safe0ver.php
� +-- Safe0ver Shell -Safe Mod Bypass By Evilc0der.php
� +-- Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php
� +-- Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.php
� +-- sa.php
� +-- shellzx.php
� +-- simattacker.php
� +-- SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php
� +-- simple-backdoor.php
� +-- simple_cmd.php
� +-- Simple_PHP_backdoor_by_DK.php
� +-- SimShell 1.0 - Simorgh Security MGZ.php
� +-- SimShell_1.0_-_Simorgh_Security_MGZ.php
� +-- Sincap 1.0.php
� +-- small.php
� +-- Small Web Shell by ZaCo.php
� +-- SnIpEr_SA Shell.php
� +-- SnIpEr_SA_Shell.php
� +-- soldierofallah.php
� +-- sosyete.php
� +-- spygrup.php
� +-- STNC WebShell v0.8.php
� +-- stres.php
� +-- toolaspshell.php
� +-- tryag.php
� +-- Uploader.php
� +-- Web-shell (c)ShAnKaR.php
� +-- WinX Shell.php
� +-- Worse Linux Shell.php
� +-- wow.php
� +-- zaco.php
� +-- zacosmall.php
� +-- zehir4.asp.php.txt
� +-- zehir4.php
� +-- ZyklonShell.php

List Dork Shell Google C99 , locus7 dan FTP


33|28.45%| powered by captain crunch security team
6 |5.17%| safe-mode: off (not secure)
5 |4.31%| home
4 |3.45%| basel 2.2
4 |3.45%| safe-mode: off (not secure) drwxrwxrwx
3 |2.59%| c99memoryl
3 |2.59%| c99shell [file on secure ok ]
3 |2.59%| c99shell v. 1.0 pre-release build #16
3 |2.59%| hacker
3 |2.59%| uid=99(nobody) gid=99(nobody) groups=99(nobody)
2 |1.72%| --[ c99shell v. 1.0 pre-release build #16
2 |1.72%| basel
2 |1.72%| c99shell v. 1.0 pre-release build
2 |1.72%| powered by captain crunch security team | http://ccteam.ru |
2 |1.72%| safe-mode : off ( not secured ) drwxrwxrwx
2 |1.72%| safe-mode: off (not secure) drwxrwxrwx c99shell
1 |0.86%| !c99shell v. 1.0 pre-release build #16!
1 |0.86%| --[ c99shell v. 1.0 pre-release build
1 |0.86%| -[ c99shell v. 1.0 pre-release build #16 powered by captain cru
1 |0.86%| /opt/zope/lib/python/zdaemon/zdrun.py
1 |0.86%| allintext:"safe-mode: off (not secure)"
1 |0.86%| allinurl:selfremove
1 |0.86%| basel documentation
1 |0.86%| c99memory.php
1 |0.86%| c99shell safe-mode : off ( not secured ) drwxrwxrwx
1 |0.86%| c99shell v. 1.0 pre-release build #16 powered by captain crunch
1 |0.86%| c99shell v. 1.0 pre-release uname
1 |0.86%| c99shell v. pre-release build
1 |0.86%| captain crunch security team
1 |0.86%| code safe-mode: off (not secure) drwxrwxrwx c99shell
1 |0.86%| drwxrwxrwx c99shell filetype:php
1 |0.86%| encoder bind proc. ftp brute sec. sql php-code feedback self re
1 |0.86%| encoder tools proc. ftp brute sec. sql php-code update feedback
1 |0.86%| home updir search buffer tools proc ftp brute sec sql self remo
1 |0.86%| how to restore using !c99memory v. 1.0 pre-release build #16!
1 |0.86%| intext:c99memory v. 1.0
1 |0.86%| intext:safe-mode: off (not secure)
1 |0.86%| intext:safe-mode: off (not secure) tooling
1 |0.86%| inurl:act=sql
1 |0.86%| name asc. size · modify · owner/group · perms action
1 |0.86%| php safe-mode drwxrwxrwx
1 |0.86%| php4 timezone database
1 |0.86%| powered by captain crunch security team drwxrwxrwx
1 |0.86%| powered by captain crunch security team | http://ccteam.ru
1 |0.86%| safe mode: off ( not secure )
1 |0.86%| safe mode: off (not secure)
1 |0.86%| safe-mode: off (not secure) / tmp/ drwxrwxrwx
1 |0.86%| safe-mode: off (not secure) site:pt
1 |0.86%| shell powered by captain crunch security team
1 |0.86%| site:www.astro.mat.uc.pt basel
1 |0.86%| uid= gid= groups= sql uname -a
1 |0.86%| uid=99 ( nobody ) gid=99 ( nobody )
1 |0.86%| uid=99(nobody) gid=99(nobody) groups=99(nobody)safe-mode: off
6 7.32% locus7shell
4 4.88% shell
3 3.66% kuwait hacker
3 3.66% php safe-mode bypass (list directories):
3 3.66% safe-mode: off (not secure)
3 3.66% safe-mode: off (not secure) drwxrwxrwx c99shell
3 3.66% startpar -f
2 2.44% hs_kuwait.php
2 2.44% lejeune interpolate
2 2.44% name asc. size · modify · owner/group · perms action
2 2.44% shell c99 ccteam.r
1 1.22% .phpact=f shell
1 1.22% 00007458 zip
1 1.22% allintitle: \locus7shell\
1 1.22% allintitle: c99memoryl
1 1.22% allinurl:upload3.php
1 1.22% astro acrobat
1 1.22% basel stellar library
1 1.22% c99memory
1 1.22% c99memoryl
1 1.22% c99shell v. 1.0 pre-release build #16
1 1.22% class-efem
1 1.22% efemerides del 22 de abril
1 1.22% encoder bind proc. ftp brute sec. sql php-
1 1.22% encoder bind proc. ftp brute sec. sql php-code feedback
1 1.22% encoder bind proc. ftp brute sec. sql php-code update feedback
1 1.22% encoder tools proc. ftp brute sec. sql php-code update feedback
1 1.22% filetype:php shell
1 1.22% foreach (array(sortsql_sort) as $v)
1 1.22% i.s.s.w team ...
1 1.22% intitle:locus7shell
1 1.22% inurl:ftpquickbrute
1 1.22% inurl:php drwxrwxr-x ftp brute sql
1 1.22% lejeune interpolation
1 1.22% lejuene interpolate
1 1.22% lmgrd_start 47
1 1.22% mysqld usage of cpu suse httpd2-prefork
1 1.22% php echo getenv
1 1.22% php4 “registered stream socket transports�?
1 1.22% powered by captain crunch filetype:php
1 1.22% powered by captain crunch security team drwxrwxrwx
1 1.22% safe-mode:
1 1.22% select action/file-type:
1 1.22% software make dir upload file safe-mode
1 1.22% uid=30(wwwrun) gid=8(www)
1 1.22% "uname -a","uid=","drwxr-xr-x","r57shell"

LOCUS7 SHELL

locus7shell
intitle:locus7shell
locus7shell filetype:php
locus7shell uname
allintitle: locus7shell
- locus7shell
intitle:- locus7shell
x2300 locus7shell
--[ x2300 locus7shell v. 1.0a beta modded by #!physx^ |
allintitle:- locus7shell
intitle: - locus7shell
safe-mode: off (not secure)
locus7shell 2008
shell x2300 locus7shell
.br - locus7shell
.us/images/0/588/mo_656_656.swf
allintext:--[ x2300 locus7shell v. modded by #!physx^
allintitle: - locus7shell
allintitle: locus7shell ext:php
allintitle:locus7shell
allintitle:locus7shell filetype:php
free locus7shell
ftp brute sec. sql php-code
inurl:act=sql
locus7s off secure
locus7s shell
ocus7shell apache
locus7shell edition 2008
locus7shell filetype: 'php'
locus7shell index:php
locus7shell linux 2008
locus7shell modified
php safe-mode bypass (list directories):
safe-mode: off (not secure) drwxrwxrwx locus7shell
%%% locus7shell
- locus7shell windows
--[ x2300 locus7shell v. 1.0a beta modded by #!physx^ | www.loc
--[ x2300 locus7shell v. modded by #!physx^ | www.locus7s.com |
--[ x2300 locus7shell v.1.0a beta modded by #!physx^ | www.locu
/locus7shell/
[enumerate] [encoder] [tools] [proc.] [ftp brute] [sec.] [sql]
allintext: locus7shell v. 1.0a beta
allintext:�?safe-mode: off (not secure)�?
allintitle: \locus7shell\
allinurl: .phpact=ls
apache aix aixthread_scope
ar ba locus7shell
basel
basel 3.1 library
basel interpolation
basel interpolation engine
basel spectra
c99memoryl
encoder bind proc. ftp brute sec. sql php-code feedback self re
filetype locus7shell
interpolation engine
intext:'' safe-mode:off (not secure)''
intitle:- locus7shell'
intitle:c99memoryl inurl:.php
intitle:locus7shell by filetype:php
intitle:locus7shell drwxr-xr-x
inurl:.phpact=ls
inurl:act intext:full hexdump
license.dat idl server bypass

GB Xmlrpc Curl Drwxr; GB x IP WSO; Uname User PHP HDD WSO..

locus7s uname
ocus7shell 2.0
locus7shell [file on secure ok ] drwxrwxrwx
locus7shell intext:x2300 intext:milw0rm.it enumerate uname
locus7shell inurl:php
locus7shell linux
locus7shell linux 2006
locus7shell safe-mode: off (not secure) drwxrwxrwx
locus7shell self remove drwxrwxrwx
locus7shell v. 1.0
locus7shell windows 2008
locus7shell-
make dir make file ok read files locus7shell
modded locus7shell
php safe-mode bypass (list directories)
php safe-mode bypass (read file)
php safe-mode bypass (read files)
safe-mode: apache uname -a: linux filetype:php
safe-mode: off (not secure) locus7shell
safe_mode: off drwxr-xr-x locus7shell
software: safe-mode: off (not secure) your ip: - server ip: [ft
suhosin 5.1.2
sybase aixthread_scope
uploads/ drwxrwxrwx
warning kernel may be alerted using higher levels safe mode
x2300 locus7shell download
x2300 locus7shell modified by #!physx^
x2300 locus7shell v. 1.0a
x2300 locus7shell v. 1.0a beta

FTP password:

intitle:"index of" spwd.db passwd -pam.conf


filetype:bak inurl:"htaccess\passwd\shadow\htusers
filetype:inc dbconn
filetype:inc intext:mysql_connect
filetype:properties inurl:db intext:password
inurl:vtund.conf intext:pass -cvs
inurl:"wvdial.conf" intext:"password"
filetype:mdb wwforum
"AutoCreate:=TRUE password=*"
filetype:pwl pwl
filetype:reg reg +intext:"defaultusername" intext:"defaultpassword"
filetype:ref ref+intext:"internet account manager"
"index of/" "ws_ftp.ini" "parent directory"
filetype:ini ws_ftp pwd
inurl:/wwwboard

inurl:r57.php [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ]


[ delete ]
"r57shell 1.4"
"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]"

inurl:b374k.php
inurl:c99.php
inurl:c100.php Generation time:
inurl:itsecteam_shell.php
inurl:"c99.php" inurl:c99.php inurl:c99.php inurl:c99.php allinurl:c99.php
inurl:"c99.php" inurl:c99.php intitle:c99shell uname c99shell v.1.0 (roots)
inurl:/c99.php allinurl:.c99.php allinurl:.c99.php intitle:C99Shell
allintitle:"C99Shell" allintitle:"C99Shell" c99.php ccteam.ru c99.php
intext:c99shell inurl:c99.php
!C99Shell v. 1.0 pre-release build #16!
intitle:c99shell filetype:php
inurl:c99.php
inurl:"/c99.php"
allinurl:c99.php
c99shell v. 1.0 pre-release build #5
"inurl:c99.php" + "intext:safe"
--[ c99shell v. 1.0 pre-release build #12 powered by Captain Crunch Security Team
c99.php download
intitle:r57shell | intitle:c99shell +uname
inurl:minimail c99
!C99Shell v. 1.0 pre-release build # +php -htm -html -shtml
allintitle: c99shell filetype:php
inurl:c99.php uid=0(root)
inurl:c99.php
inurl:/files/c99.php
intitle:c99shell safe-mode:OFF
c99.php "uid=0"
safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php uid=0(root)
allintitle: "c99shell"
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
c99. PHP-code Feedback Self remove
c99shell filetype:php -echo
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell +filetype:php
intitle:C99Shell v. 1.0 pre-release +uname
!C99Shell v. 1.0 pre-release build #5!
inurl:"c99.php"
C99Shell v. 1.0 pre-release build #16!
c99shell v. 1.0 pre-release build #16
intitle:c99shell intext:uname
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell uname -bbpress
B64 PHP Shell � The Defaced - Created by Kr3w
intitle:madspot team shell
inurl:".php?act=exploits"
inurl:".php?act=tools"
inurl:".php?act=encoder"
inurl:".php?act=proxy"
inurl:".php?act=shbd"
inurl:".php?act=fsbuff"
inurl:".php?act=rip"
inurl:".php?act=update"
inurl:".php?act=cmd="
!C2007Shell v. 1.0 pre-release build #16!
-[ c2007shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r| Adora
Security Pwnz j00! |
inurl:.php �cURL: ON MySQL: ON MSSQL: OFF�
�Shell� filetype:php intext:�uname -a:� �EDT 2010?
intitle:�intitle:r57shell� [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]
[ tmp ] [ delete ]
inurl:�c99.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
inurl:�c100.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
intitle:�Shell� inurl:�.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update

c99shell [file on secure ok ]


/public_html/www/

Ayyildiz Tim -AYT- Shell v 2.1 Biz.php

ELMALISEKER Backd00r

Backdoor.PHP.Agent.php

Fx29Sh.3.2.12.08.php

KAdot Universal Shell v0.1.6.php

GFS web-shell ver 3.1.7 - PRiV8.php

GNY.Shell.v1.1.php

Liz0ziM Private Safe Mode Co...xecuriton Bypass Exploit.php

Moroccan Spamers Ma-EditioN By GhOsT.php

MySQL Web Interface Version 0.8.php

Macker's Private PHPShell.php

NCC-Shell.php

NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php

NetworkFileManagerPHP.php

PHPSPY.php

PHPRemoteView.php

PHPJackal.php

PHANTASMA.php

Private-i3lue.php

PH Vayv.php

RedhatC99 [login=redhat-pass=root].php

Safe0ver Shell -Safe Mod Bypass By Evilc0der.php

Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php

Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.php

Safe mode breaker.php

SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php

aZRaiLPhp v1.0.php

WinX Shell.php

Sst-Sheller.php
SnIpEr_SA Shell.php

SimShell 1.0 - Simorgh Security MGZ.php

arabicspy.php

bdotw44shell.php

backupsql.php

c99-shadows-mod.php

c99_PSych0.php

c99_w4cking.php

c99_w4cking.php

c100 v. 777shell v. Undetect...#18a Modded by 777 - Don.php

cbfphpsh.php

c993.phpc993.php

connect-back.php.php

cpg_143_incl_xpl.php

dC3 Security Crew Shell PRiV.php

dC3.Security.Crew.Shell.priv8.php

egy.php

erne.php

ex0shell.php

g00nshell-v1.3.php

g00nv13.php

gfs_sh.php

h4ntu shell [powered by tsoi].php

hkrkoz.php

iMHaPFtp.php

ironshell.php

isko.php

itsecteam.v2.1.php

itsecteam_shell.php
knullsh.php

kolang-bypass.php

kral.php

lamashell.php

load_shell.php

lolipop.php

lostDC.php

mysqlwebsh.php

nstview.php

nst.php

nshell.php

newsh.php

pHpINJ.php

php-include-w-shell.php

phpjackal1.3.php

priv8-2012-bypass-shell.php

r57.mod-bizzz.shell.php

r57.1.4.0.php

pws.php

r57_Mohajer22.php

r57_iFX.php

r57_kartal.php

r57shell1.40.php

r57shell2.0.php

r57142.php

remview_fix.php

ru24_post_sh.php

s72 Shell v1.1 Coding.php

safe0ver.php

shellzx.php
simple-backdoor.php

simple_cmd.php

sniper.php

soldierofallah.php

sosyete.php

spygrup.php

ugdevil.v2.0.php

wso.v2.5.php

wso2.5.php

wso2.php

x0rg.byp4ss.php

zacosmall.php

..................................................................................

1-Footholds

*Google search: intitle:"WSO 2.4" [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [


Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove
Submited: 2014-01-03

Change dir: Make dir: [ Writeable ] Read file: Make file: [ Writeable ] Search for
hash: Upload file: [ Writeable ] Safe-Mode bypass (read file): Safe-Mode bypass
(dir list):

*Google search: intitle:"=[ 1n73ct10n privat shell ]="


Submited: 2014-01-03

*Google search: filetype:php intext:"!C99Shell v. 1.0 beta"


Submited: 2013-11-25

*Google search: intitle:"uploader by ghost-dz" ext:php


Submited: 2013-11-25

*Google search: inurl:1337w0rm.php intitle:1337w0rm


Submited: 2013-08-08

*Google search: Re: inurl:"r00t.php"


Submited: 2012-11-02

GB X IP WSO

*Google search: intitle:C0ded By web.sniper


Submited: 2012-11-02

*Google search: Re: intitle:Priv8 SCR


Submited: 2012-11-02

*Google search: inurl:"amfphp/browser/servicebrowser.swf"


Submited: 2011-09-26

*Google search: allintext:"fs-admin.php"


Submited: 2011-01-09

*Google search: (intitle:"SHOUTcast Administrator")|(intext:"U SHOUTcast D.N.A.S.


Status")
Submited: 2006-05-03

*Google search: (intitle:"WordPress › Setup Configuration File")|


(inurl:"setup-config.php?step=")
Submited: 2006-03-15

*Google search:"index of /" ( upload.cfm | upload.asp | upload.php | upload.cgi |


upload.jsp | upload.pl )
Submited: 2006-03-06

*Google search: "Please re-enter your password It must match exactly"


Submited: 2006-02-08

*Google search: inurl:"tmtrack.dll?"


Submited: 2006-01-04

*Google search: inurl:polly/CP


Submited: 2005-10-06

*Google search: intitle:"net2ftp" "powered by net2ftp" inurl:ftp OR intext:login OR


inurl:login
Submited: 2005-09-25

*Google search: intitle:MyShell 1.1.0 build 20010923


Submited: 2005-08-15

*Google search: intitle:"YALA: Yet Another LDAP Administrator"


Submited: 2005-05-02

*Google search: intitle:"ERROR: The requested URL could not be retrieved" "While
trying to retrieve the URL" "The following error was encountered:"
Submited: 2005-04-27

*Google search: intitle:"PHP Shell *" "Enable stderr" filetype:php


Submited: 2004-07-12

*Google search: "adding new user" inurl:addnewuser -"there are no domains"


Submited: 2004-07-20

*Google search: intitle:"Web Data Administrator - Login"


Submited: 2004-10-05
2-Files containing usernames

*Google search:intext:"root:x:0:0:root:/root:/bin/bash" inurl:*=/etc/passwd


Submited: 2013-04-22

*Google search:inurl:"/root/etc/passwd" intext:"home/*:"


Submited: 2013-04-22

*Google search: site:extremetracking.com inurl:"login="


Submited: 2006-07-31

*Google search:intext:"SteamUserPassphrase=" intext:"SteamAppUser=" -"username"


-"user"
Submited: 2005-06-05

3- Vulnerable Servers

Google search: inurl:"/reports/rwservlet" intext:"Oracle"


Submited: 2014-02-05

Google search: inurl:"struts" filetype:action


Submited: 2013-11-25

Google search: inurl:.php? intext:CHARACTER_SETS,COLLATIONS, ?intitle:phpmyadmin


Submited: 2013-08-08

Google search: inurl:/wp-content/w3tc/dbcache/


Submited: 2012-12-31

Google search: intext:SQL syntax & inurl:index.php?=id & inurl:gov & inurl:gov
Submited: 2012-12-31

Google search: intext: intext: intext: intext: intext:


Submited: 2012-08-21

Google search: intitle:awen+intitle:asp.net


Submited: 2012-05-15

Google search: intitle:"-N3t" filetype:php undetectable


Submited: 2012-05-15

Google search: inurl:.php intitle:- BOFF 1.0 intext:[ Sec. Info ]


Submited: 2011-12-23

Google search: filetype:php inurl:tiki-index.php +sirius +1.9.*


Submited: 2011-11-25

Google search: filetype:php inanchor:c99 inurl:c99 intitle:c99shell -seeds -


marijuana
Submited: 2011-11-24

Google search: inurl:php intitle:"Cpanel , FTP CraCkeR"


Submited: 2011-11-19

Google search: intitle:#k4raeL - sh3LL


Submited: 2011-10-11

Google search: inurl:view.php?board1_sn=


Submited: 2011-09-26

Google search: intitle:m1n1 1.01


Submited: 2011-07-26

Google search: intitle:Locus7shell intext:"Software:"


Submited: 2011-05-03

Google search: intitle:"[EasyPHP] - Administration"


Submited: 2011-03-23

Google search: MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON
WGet: ON Fetch: OFF Perl: ON
Submited: 2011-02-24

Google search: intitle:cyber anarchy shell


Submited: 2011-02-24

Google search: inurl:/vb/install/upgrade.php


Submited: 2010-12-10

Google search: "[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ]


[ delete ]"
Submited: 2010-12-07

Google search: "www.*.com - c99shell" OR "www.*.net - c99shell" OR "www.*.org -


c99shell"
Submited: 2010-12-08

Google search: "r57shell 1.4"


Submited: 2010-12-07

Google search: "safe_mode: * PHP version: * cURL: * MySQL: * MSSQL: * PostgreSQL: *


Oracle: *"
Submited: 2010-12-07

Google search: "you can now password" | "this is a special page only seen by you.
your profile visitors" inurl:imchaos
Submited: 2005-09-15

4-Vulnerable Files

Google search :-site:simplemachines.org "These are the paths and URLs to your SMF
installation"
Submited: 2013-09-24

Google search: allinurl:forcedownload.php?file=


Submited: 2011-08-25

Google search: ionCube Loader Wizard information disclosure


Submited: 2011-05-28

Google search: vBulletin Install Page Detection


Submited: 2011-05-27

Google search: inurl:"simplenews/admin"


Submited: 2006-09-13

Google search: inurl:updown.php | intext:"Powered by PHP Uploader Downloader"


Submited: 2006-02-28

5-Error Messages

Google search: "[function.getimagesize]: failed to open stream: No such file or


directory in"
Submited: 2014-02-05

Google search: intext:"Access denied for" intitle:"Shopping cart"


Submited: 2014-02-05

Google search: inurl:advsearch.php?module= & intext:sql syntax


Submited: 2013-04-09

Google search: intext:"Fatal error: Class 'Red_Action' not found in"


Submited: 2012-12-06

Google search: "CHARACTER_SETS" "COLLATION_CHARACTER_SET_APPLICABILITY"


Submited: 2012-08-21

Google search: inurl:"*.php?*=*.php" intext:"Warning: include" -inurl:.html -


site:"php.net" -site:"stackoverflow.com"-inurl:"*forums*"
Submited: 2012-05-15

Google search: inurl:"index.php?m=content+c=rss+catid=10"


Submited: 2011-01-21

Google search: "plugins/wp-db-backup/wp-db-backup.php"


Submited: 2010-12-08

Google search: allintext:"fs-admin.php"


Submited: 2010-11-11

6-Files containing passwords

Google search: "automatic teller" "operator manual" "password" filetype:pdf


Submited: 2014-09-15

Google search: inurl:ws_ftp.ini "[WS_FTP]" filetype:ini


Submited: 2014-08-21

Google search: xamppdirpasswd.txt filetype:txt


Submited: 2014-04-28

Google search: inurl:typo3conf/localconf.php


Submited: 2014-04-07

Google search: inurl:/backup intitle:index of backup intext:*sql


Submited: 2014-03-31

Google search: filetype:password jmxremote


Submited: 2013-11-25

Google search: ext:sql intext:@gmail.com intext:password


Submited: 2013-11-25

Google search: "BEGIN RSA PRIVATE KEY" filetype:key -github


Submited: 2013-09-24
Google search: filetype:sql insite:pass && user
Submited: 2013-04-22

Google search: ext:sql intext:@hotmail.com intext :password


Submited: 2013-04-09

Google search: filetype:config inurl:web.config inurl:ftp


Submited: 2013-04-09

Google search: allinurl:"User_info/auth_user_file.txt"


Submited: 2012-11-05

Google search: inurl:"/dbman/default.pass"


Submited: 2012-11-02

Google search: filetype:xls "username | password"


Submited: 2012-11-02

...................................................................................
...................................................................................
..........

"# shell Gaza Hacker Team version (2)"

"--[ Shell CGI | Perl V1.0 ]--"

"--[ Storm7Shell v1.3.37, coded by sToRm ]--"

".: No System is Perfectly Safe :."

".:[ irc.rosebanditz.us | Generated: seconds ]:."

"127.0.0.1/version.php?version=131 (port 80)"

":: g00nshell v1.3 final ::"

"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ syslog ] [ resolv ] [ hosts


] [ shadow ] [ passwd ] [ tmp ] [ delete ]"

"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ brute ] [ ln -s


all ] [ tmp ] [ deface vbb ]"

"[ STUNSHELL #unknown @ ByroeNet ]"

"[Err0R ] [Home] [Execute Command] [Evaluate PHP] [MySQL Query] [Chmod


File ] [PHPinfo ] [md5 cracker] [Show headers ] [Log out ]"

"[Fx29Sh] [psyBNC] [Eggdrop]"

"[Home] [Back] [Forward] [Up] [Refresh] [Search] [Buffer]"

"[Main] [Forum Defacer] [Email Spammer] [About] [Logout] [SuiCide]"

"[PHP-Tools] [Cpanel Finder] [Install IP:Port Proxy] [Install PHP


Proxy] [Install RFI/LFI Scanner] [Mass Code Injection] [Find WR
dir`s]"
"Coded by Amin Shokohi (Pejvak)"

"Copyright (C) 2000-2010 SadrazaM All Rights Reserved."

"Copyright 2004-Simorgh Security"

"edited by h4cker.tr"

"Executed command: ls -lia"

"File Manager - Current disk free"

"File Upload by Encodable''

"Galaxy2.03"

"h1kt0s4 shell"

"Hacked by Vrs-hCk - c0li.m0de.0n"

"Home - Back - phpinfo - CMD - All Coder - Htaccess - Symlink - Read -


Mail - PhpEval - Sql-read - ChmoD - Info&GR33tz"

"ipays - exploit"

"Jalankan Perintah: safe_dir"

"kaMtiEz r57 PaneL"

"Komut Sonu�lar1:"

"Komut Uygula: ls -lia"

"MagicCoder | Version X70.01"

"MFTeaM By FakoMast3r"

"PhpSpy Ver: 2010"

"R57 Shell Cracker by Group XP"

"r57shell 1.4"

"RootShell Security Group"

"Rootshell v2.0.0 ? 2006 by SR-Crew

"Safe0ver By Evilc0der.com - Bet@ Versiyon - 7 Subat 2007"

"safe_mode: * PHP version: * cURL: * MySQL: * MSSQL: *


PostgreSQL: * Oracle: *"

"SyRiAn Sh3ll"

"Upload Ur Shell Or Ur Mailer ;)"

"Upload Your Fav Shell or :D"


"Uploader by ./BaghazzNugraha"

"Usage: nc -vv -l"

"User massdefacer Cod3d by"

"valdez- globalnet"

"WebRooT Hack Tools"

"www.* .com - c99shell" OR "www.* .net - c99shell" OR "www.* .org - c99shell"

"ZaraByte File Uploader"

"� I?IOE & [email protected]"

"� Iron & [email protected]"

# Domains & Users Karar alShaMi t00l

#r57 shell 1.50 Edited by Kaptan

--== www.h4ckcity.org Sheller Version: 1.02 Coded By LocalMan & 2MzRp


Spc Thx :Mikili,Mehdi.H4ckCity,Ne0.limpizik ,r3dm0v3 ==--

--[ c999shell v.1.0 pre-release build #16 Modded by Shadow & Preddy |
RootShell Security Group ]--

.:[Codec Elite Defacer . elite [email protected]

[Home] [Back] [Forward] [UPDIR] [Refresh] [Search] [Buffer] [Encoder]


[Tools] [Proc.] [FTP brute] [Sec.] [SQL] [PHP-code] [Self remove]
[Logout]

[PHP-Tools] [Cpanel Finder] [Install PHP Proxy] [Install RFI/LFI


Scanner] [Mass Code Injection]

b374k "1923Turk-Grup"

Coded By: Mr.Amir-Masoud [ Iranian HackerZ ]

Encoder Tools Proc . FTP brute Sec . SQL PHP- code Update Feedback
Self remove Logout

explore shell eval mysql phpinfo netsploit upload mail

index of /cgirun

intext:"c99madshell v.3.0 BLOG edition EDITED BY MADNET"

intext:"change.php : Script to change the data for admin" title:"change.php"

intext:"HMBr57 1.41"

intext:"~~Joomla1.txt" title:"Index of /"

intext:Safe-mode:OFF (not secure)

intext:v4 Shell version 1.00 | h4ckz.net |


intitle:b374k m1n1 1.01

intitle:cyber anarchy shell

intitle:Locus7Shell [Enumerate] [Encoder] [Tools] [Proc.] [FTP Brute]


[Sec.] [SQL] [PHP-Code] [Backdoor Host] [Back-Connection] [milw0rm
it!] [PHP-Proxy] [Self remove]

inurl:/cgiweb/web.root

inurl:/cgiweb/web.root title:"web.root"

MySQL : ON MSSQL : OFF Oracle: OFF MSSQL : OFF PostgreSQL: ON cURL :


ON WGet: ON Fetch: OFF Perl: ON

o---[ ly0kha Shell | VBF gr0up | ly0kha@ yahoo.com | Sh3ll bypass


safemode ]---o

o---[ r57 Shell ]---o o---[ heroes1412 ]---o

priv8 cgi shell Connected to

TengkorakCrew C99 SHELL1.5 06.2008

Welcome to cgi-shell.py

Inurl:images/mma.php

intitle:o--{ UnKn0wN Shell }--o

intext:o--{ UnKn0wN Shell }--o

intitle:#k4raeL - sh3LL

R57shell - Developed by Navaro

HMBr57 Shell

h1kt0s4 shell

FuRty's Shell | Legend-H.ORG

V9F Shell

ly0kha shell

..:: TheSunOfVN ::..

thesunofvn.php

madspot.php

Group XP Shell - MiDepa.mx

Mr.TiGeR shell

[ phpinfo ] [ php.ini ] [ Cpu ] [ Memory ] [ Users ] [ Brute ] [ ln -s all ]


[ Tools ] [ Mass Code Injection ] [ tmp ]
Disable functions : NONE

Sql.safe_mode: OFF

safe_mode: OFF Open_Basedir: /var/www/

:: read file from vul ini_restore() ::

:: DeZender ::

----------XGroupVN----------

_____TheSunOfVN_____

Turbo Force By

Cpanel , FTP CraCkeR

Coded By Turk Gececi ( Global Hacker )

Home -- File Manager -- Command Execute -- Back Connect -- BypasS


Command eXecute(SF-DF) -- Symlink -- BypasS Directory -- Eval Php --
Data Base -- Convert -- Mail Boomber

Server Information -- Dos Local Server -- Backup Database -- Mass Deface


-- Download Remote File -- DDoS -- Find Writable Directory -- Server --
Remove Me -- About

Xgr0upVN ShElL

XgroupVnXgroupVn

o---[ Xgr0upVn.org - shell by RST/GHC | http://Xgr0upVn.org | H@ck+Cr@ck=Enj0y! |


Design by:AluCaR | ]---o

Login As (XgroupVn) Logout

Danger! Web-daemon crash possible.

o--[ heroes1412 ]--o

o--[ r57 ]--o

PHPJackal v1.9 - Powered By NetJackal

$$root_unknown.cgi$$

*-[ Unknown ]-*

Home | Command | GUI | Upload File | Download File | Back & Bind | Brute Forcer |
Check Log | Domains/Users | Logout | Help

0x0.php

0x00.php

w4ck.php
intitle:SQL CMD 3.0 | al-swisre

intext:WeB.Sniper

intitle: :: WeB.Sniper ::

intext: :::[email protected]:::

intitle: -=] fx0 [=-

intext: Turbo Force By Tryag

intext: Coded By Mr.Ejr4M

inurl:"mad.php" intext:"MADSPOT.NET"

inurl:"pak.php" intext:"madspot.net" / eval/ symlink

� Iron & RootShell Security Group

MySQL Web Interface By Number 7

TeaMp0isoN Private Build [ BETA ]

[ Coded By w0LF Gh4m3D | | [email protected] ]

[ Coded By Mr.Ejr4M | [email protected] | www.Dz-devloper.net ]

By Mr.eJr4M EnCode

Coded By Karar aLShaMi

c991.php

Dev by AminOu Dz | [ ScripT Extracting Config !n Serv ~v� 2o12~ !! ]

Usage: Read File !n Sh311 => cat /etc/passwd

[ Dz Security & Dz Hacking !! ]

Dev by BriscO-Dz

By kasper-boy

intitle: c0ded By Dr.ahmed

c0nf!g ExtracT0r by ph!bEr 0pt!k [ pErl pr0gramM!nG LaNgUagE ]

[ th4nK t0 & DZ pr0gramMeR f0r 0riGinal pErl !! ]

Usage: Read File !n Sh311 => cat /etc/passwd

#Dev by DAMANE2011 | Extracting Config V1 2011 !!! Modif!ed | [ ScripT Extracting


Config 2011~ !! ]

[ Dz Security & Programming !! ]

Usage: Read File !n Sh311 => cat /etc/passwd


Dev by NEC | [ ScripT Extracting Config !n Serv ~v² 2o12~ !! ]

Dev by BriscO-Dz | [ ScripT Extracting Config !n Serv ~v� 2o12~ !! ]

Scr!pt Sh0w Doma!ns & Us3rs

Dev by Ev!LsCr!pT_Dz | [ ScripT Extracting Config !n Serv ~v� 2o12~ !! ]

[ Coded By Karar aLShaMi | Developed By The Sword + RAB3OUN ]

The Sword Config f**k Script

Arab Black Hat Config f**k Script

[ Coded By Karar aLShaMi | Developed By ViRuS_BaGhDaD | www.Arab-Blackhat.cc ]

:::: BY RAMZI NULL ::::

::SkaLFooLD:::

inurl:(shell.php | c99.php) Encoder Bind Proc. FTP brute Sec. SQL PHP-code Feedback
Self remove Logout
inu
rl:(shell.php | c99.php) intitle:c99shell Encoder Bind Proc. FTP brute Sec. SQL
PHP-code Feedback Self remove Logout

inurl:"c100.php" /images

intitle:"Madspot Security Team Shell" /images

inurl:"storm7shell.php" Safe Mode:OFF /images

................,..................................................................
.............................................................................

windows-1251 drwxrwxrwx [ home ]

c99 v0.0.1 SYN-MOD [SYNSTA] @www.


n3tshell v. emp3ror undetectable #18! filetype php
!C99madShell v. 2.1 madnet edition ADVANCED!
(intitle:k1r4 | intitle:N3t) uname
HMBr57 Shell
"c99madshell" drwxr-xr-x Wordpress Not Found! filetype:php
.com - N3t
!C99pRoShell v. X3 pRo edition!
Neil Jenner - Uploads
phpshell "Safe-mode: ON (secure)" ?---------
Rootshell v2.0.0 ? 2006 by SR-Crew
- Locus7Shell
"Powered by osCommerce" file_manager.php
"Shell" drwx- filetype:php
fatalisticz_fx fx29shell
"r57shell" drwx- filetype:php
"*- Antichat Shell" filetype:php
"Black PHP Shell" drwx- filetype:php
C100shell filetype:php
"Shellci.biz" ext:php
"uname -a","uid=","drwxr-xr-x","r57shell"
"uname -a","uid=","drwxrwxrwx","r57shell"
c99shell filetype:php -echo
safe-mode: off (not secure) drwxrwxrwx c99shell
"Eugen Shell" omg_1.php
c99shell [file on secure ok ]?
"easy-content filemanager" filetype:asp
- k1r4
com - Antichat Shell
"drwxr-xr-x","STNC WebShell v0.8"

Hacked By eL-CeWaD | drwxr-xr-x


"- phpshell" "Safe-mode: OFF (not secure)" filetype:php
!C99Shell v. 1.0 pre-release build # +php -htm -html -shtml
r57shell drwxrwxrwx ext:php
[email protected]
`�.��.��`�.� AtlantiQ SheLL v0.0700 �.��`�.��.��
BraIn Inc� - PHPmailer By[[email protected] ] Remix 2008
FaTaLisTiCz_Fx Fx29SheLL v2.0.09. filetype:php
"shell @" drwxrwxrwx filetype:php
w4ck1ng-shell (Private Build v0.3) filetype:php
phpshell drwxrwxrwx ext:php
c99shell drwxrwxrwx ext:php
locus7Shell drwxrwxrwx ext:php
Storm7Shell drwxrwxrwx ext:php
k1r4 drwxrwxrwx ext:php
Shellci.biz drwxrwxrwx ext:php
C99pRoshell drwxrwxrwx ext:php
/public_html/ drwxrwxrwx ext:php
webadmin drwxrwxrwx ext:php

/public_html/ Upload File : Name: Size: Permissions:


drwxr-xr-x: tmp--drwxr-xr-x: websitemap-- drwxr-xr-x.htaccess:
-=] fx0 [=- drwxrwxrwx ext:php
C99madshell drwxrwxrwx ext:php
SpYshell drwxrwxrwx ext:php
intitle:" - phpshell" drwxr-x--- filetype:php
N3tshell drwxrwxrwx ext:php
Cyber Anarchy Shell drwxrwxrwx ext:php
"/hsphere/local/home" drwxrwxrwx ext:php
islamicshell ext:php
DM Shell ext:php
- AA-66 BASED BY N3TSHELL
o--{ W.A.S Shell }--o drwxrwxrwx ext:php
- phpshell*software apache*=php
c99madshell*software apache*=php
k1r4*software apache*=php
N3t*software apache*=php
phpshell filetype:php

C99madshell public_html secure off drwxr-xr-x

SoQoR.NeT Shell
ly0kha shell
MOHAJER22
..// XcruzzmiX� >>>
[ � ] S E M P A K [ � ]
-=] fx0 [=-
valdez- globalnet

TengkorakCrew C99 SHELL1.5 06.2008

"webadmin.php - " filetype:php

Mr.HiTman c99SHeLL
HMBr57 Shell
[-Sy BanditZ SheLL-]
`�.��.��`�.� AtlantiQ SheLL v0.0700 �.��`�.��.��
*PHP Mailer* K. Script v0.6: PHPShell
Bhlynx. Script v2.1.5 * (Editing): PHPShell
"PHP File Manager" filetype:php

inanchor:c99shell filetype:php
intitle: r57shell filetype: php
intitle: c99shell filetype: php
intitle: c99madshell filetype: php
intitle: phpRemoteView filetype: php

RST/GHC filetype:php intitle:r57shell


inurl:filemanager/default.asp
intitle:r57shell +uname
(intitle:r57shell | intitle:c99shell) +uname
intitle:"r57Shell"
intitle:"C99Shell"
* Software: Apache. PHP/4.3.9. uname -a: Linux
* - N3t
com - k1r4
PHPKonsole filetype: php
PHPKonsole PHPShell filetype:php -echo Public PHP FileManagers
PHPJackal filetype: php
intitle:"PhpMyExplorer" inurl:"index"
inurl:"r57.php" +uname
RST/GHC filetype:php
intitle:"nst" filetype:php intitle:nst.void
"antichat" filetype:php
RST/GHC filetype:php http-shell by RST/GHC
PHPKonsole PHPShell filetype:php -echo
intitle:"nstview" filetype:php
intitle:r57shell +uname -bbpress
intitle:"c99shell" filetype:php
intitle:"PHP Shell *" "Enable stderr" filetype:php
intitle:r57shell +uname
inurl:c99.php
intitle:*.com - phpshell
r57shell 1.31
phpshell +uname
- Locus7Shell
Storm7Shell
SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend
C99madShell v. 2.0 madnet edition! uname -a: FreeBSD
~ 0x00 PHP shell v.0x2
Alucar Shell

c99.shell.php
hbtcasus.php
phpRemotevieW.php
PHPShellbyMacker.php
r57shell-1.3.php
r57shell-v1.24.php
c99shellbeta.php
kobra.php
phpshell.php
PHVayv.php
r57shell-v1.0.php
r57

...................................................................................
....

uid=99(nobody) gid=99(nobody) groups=99(nobody)safe-mode: off (


uid=99(nobody) gid=99(nobody) groups=99(nobody)
allinurl:fck_spellerpages/spellerpages/server-scripts/spellchec
''c99madshell'' soft mode''apache''
drwxr-x--- [ home ]File manager drwx--x--x x86_64 #1 SMP Upload file: (Writeable)
Choose File>>
2015 Safe Mode Drwxr XR X.enumerate] [encoder] [tools] [proc.] [ftp brute] [sec.]
[sql]- wso 2.4 ","drwxr-xr-x","c99madshellPublic HTML drwxrwxrwx 2016 C99madshell
PHP2013 drwxr-x--- safe mode r57shell rw rC99shell Off Oracle drwxrwxrwx
PHP2013:.de/c99madshell.phpN3tshell Drwxr XR X
IL Boff 1.0 RW R
GB Xmlrpc WSO Drwxr
C99shell UName bbPress Drwxr
Drwxr XR X C99shell
C99shell 4.0V Drwxr XR X
Boff 1.0 RW R
Safe SMP Boff RW R" filetype:php intext:"Safe-Mode: OFF"
2013 drwxr-x--- safe mode r57shell rw r
0.07% uname -auid=drwxr-xr-xc99shell
1 0.07% safe mode : off generation time drwxrwxrwx -c99shell
1 0.07% safe mode off drwxrwxrwx c99shell
1 0.07% safe-mode: off (not secure)
1 0.07% safe-mode: off (not secure) drwxrwxrwx c99shell.php
1 0.07% safemode perms drwxr
1 0.07% drwxr-xr-x safe mode on secure public_html c99shell
1 0.07% c99shell drwxr-xr-x uname safe mode secure off public_html
1 0.07% c99shell v. 1.0 beta
1 0.07% @drwxrwxrwx c99shell.php
1 0.07%

Execute command:
Execute!
Change directory:
List files!
Upload file:

You might also like