H/drwxrwxrwx [ home ] windows-1251 wso 2.
XdawelaX
K0D1K Backdoor, Recoded By K0D1K
/* Decoded by Anonymox9ja */ mailer
intitle:Automatic cPanel Finder/Cracker 3xp1r3 Cyber Army
M O C H U B O Y I N B O X M A I L E R
.:|T.C.T xMailer |:.
intitle:Atom!c Bomb
B0FF codesupp edit
drwxr-xr-x [ home ]. UTF-8 Windows-1251 KOI8-R KOI8-U cp866
/ drwxr-xr-x [ File Manager ]. UTF-8, Windows-1251, KOI8-R, KOI8-U, cp866. Server
IP
/ drwxr-xr-x [ home ]. UTF-8, Windows-
-rw-r--r--, R T E D
-rwxr-xr-x, R T E D
RC-SHELL v2 ext:php
RC-SHELL v2.0.2011.0827
+[ No Free 2015 ]+
[ Rofik Shell ]
JamvanHax0r Web Sh3LL
Coded by RetnOHacK #Procoderz Team Albanian
#Procoderz Team Albania - 1337w0rm � RetnOHacK 2013
UTC 2015 x86_64. Safe mode: OFF
El Moujahidin Bypass Shell
ELMALISEKER Backd00r
::[ k4L0ng666 HeRe ]
M3R1C4 Shell Backdoor
Windows NT WIN-1RBRKP3NC8R 6.1 build 7601
Copyright � Trenggalek Cyber Army
disk total/free \ \ web software \ \ safe mode \ \ open basedir \ \ curl \ \
Rajaoui-PS Mini Sh3ll
ShellIBT/shellibt.php
ALFA-SHELL-V2.5.0.1
\ sys \ \ kernel \ \ user \ \ disk total/free \ \ web software \ \ safe mode \ \
open basedir \ \ curl \ \ mysql \ \ mssql \ \ oracle \ \ postgresql \ \ \ \ linux
Treize_Shell
uname: user: php: hdd: 5 rw r r select action
uname -a: Windows NT STORM 6.1 build 7601
-=[Indonesia Cyber Crash Shell]=-
--==[[ InCreDibLe SHelL By Team IndiShElL ]]==--
MANNU SHELL By Team IndiShell
=[ Symlink By CaptSalkus48 ]=pass:hackmeDON
Coded by Donnazmi pass:hackmeDON
!!BLAZING HACKERS PAKISTAN!!SHELL!! pass:bhp
Coded by : E@GL3 STR!K3R pass:bhp
404 Error Web Shell by Madleets.com
Software : Microsoft-IIS/8.5
System OS : Windows NT NJWEB01 6.2 build 9200 (Unknown Windows version Standard
Edition) i586 | [ Google ] | [ milw0rm ]
.::. Anonymox9ja T.C.T Mailer 2016 .::.
/drwxrwxrwx [ home ] windows-1251 wso 2.4
Software: Apache/2.4.7 (Ubuntu). PHP/5.5.9-1ubuntu4.20. uname -a: Linux
Name Size Permissions Option drwxr-xr-x
Code By: H?i CLover [#] H?i Clover � [#]
HOME PROCESS EVAL SQL HASH CONNECT ZONE-H DDOS SAFE MODE SYMLINK MADSPOT KIll C0de
r57shell v.1.42 | Byt3B0y mod. |
WSO 2.4 | [ Php ]
Hacked By Alarg53
Cod3d By Alarg53
Hacked By Alarg531.0, Coded By Alarg53 Hacked By Alarg531.0, Coded By Alarg53
-:[ User & Domains & Symlink ]:- ext:php
Symlink_Sa 3.0
Anonjocker Shell by Karim-TN v1.0
Choose File Submit
/ drwxr-xr-x [ home ].Cwd: Linux
Uname user php hdd wso
Wso smp.php safe mode- off [ phpinfo ] datetime- drwxr-xr-x [ home ]
Permisions: drwxr-xr-x [home dir]
c99madshell apache drwxr xr x shell php smp
Madspot security team shell rw r
r00t-tEaM ShElL
!C99madShell v. 3.0 BLOG edition!
Owned By EPO--=[ KING OF HALIFAX]=--
Cod3d by Mr.Alsa3ek and Al-Swisre
drwxrws--- [ home ]
[ WSO r3coded by Kerupuk -Stupidc0de Family x Sanjungan Jiwa Team ]
[Google] [Exploit-DB]
"::---[ MCA shell ]---::"
::[ BillGate - cybery army ]::
(( Hacked By: Al-rqmi.TM )
intitle:"index of/"sym.php"
drwx---r-x [ home ]
# �#Powered by FULLMAGIC COMMUNITY:: Masa Depan Mu Adalah Kematian ::
[ Bing ] | [ Zone-H ]
Server IP:
inurl:c99.php uid =
Linux neon.mtw.ru 3.9.3
Anjiyo Bypass Shell
2016 safe-mode off linux neon drwxr-xr
BWI PriV8 Sh3LL
Haunted Uploader Shell r3c0ded bY Haunted Bro Team.
[#] HauntedUploader Shell
Siyanur5x.php bypass privilege shell
2016 safe-mode off linux neon drwxr-xr
Coded by MecTruy
0rYX_HACKER.PHP Handler Bypass Shell Beta 1.0
[ Salam ? Alaykoum ]
Jijle3 [PHDZ] ext:php
[ � ] LyCaNZ [ � ]
[ � ] S E M P A K [ � ]
(Writeable). Make file: (Writeable). Execute: Upload file: (Writeable)
Permissions, Actions. [ . ] dir
"xploit.php" drwxr-xr-x
[ freedom is real - 1945 ]
-=[ b374k r3c0ded by ./Mr.Dha ]=-
Black CyberSec Crew Shell
Web Shell b374k r3c0d3d by x'1n73ct
[ + ] 1n73ct10n Shell V3.3 [ + ]
Mr.RobotX169-Web Shell
IndoXploit Coder Shell
Mr Secretz Shell
Stupidc0de Shell
[+] cPanel & WHM Toolkit
ERORDZ
Claymiro Shell
--------------Anonymous Shell-----------------
-=[ b374k r3c0ded by X'1N73CT & S1T1 B4RC0D3 ]=-
� 2015 X'1N73CT & S1T1 B4RC0D3
Make Dir
2016 safe-mode off windows-1251 drwxr-xr
Gabesi TN File Manager
Coded By Gabesi TN
Hacked by Gabesi TN
-=[ Walkers404 File Manager ]=-
/ drwxr-xr-x [ File Manager ]
Pak Hunters File Manager
Hunter Bajwa File Manager
Halako File Manager
</> ustadcage_48 file manager
File Manager (Aut0Upload3r)
2015 Safe Mode Wso Smp (writeable)
linux - drwxr -xr -x
2016 safe-mode off linux drwxr-xr
2016 Safe Mode Wso Smp (writeable)
GB-WSO-IP-WSO.
WSO 2.5 lt windows-1251 (writable)
=[ 1n73ct10n privat shell ]=
Andela1C3 v.3
=[ Benny-x207 privat shell ]=
||@N0NYM0US-S3C.ORG SHELL||
Uname: Windows NT HW19 6.2 build 9200 [Google] [milw0rm]
Safe mode: OFF [ phpinfo ] Datetime: upload
safe : OFF MySQL: ON | Perl: ON . Server IP :
-rw-rw-rw- R T E D
Permission: -rw-rw-rw-
uname -a : sysctl : $OSTYPE : Server : id : pwd : ip
drwxrwxrwx RT
intitle:webr00t cgi shell
"inurl:.root"."webr00t cgi shell"
"intitle:Index of */sym"."inurl:/sym"
"5.2.17 Safe mode:"
"5.2.11 Safe mode:"
"5.2.12 Safe mode:"
"Sifre=webr00t"
"5.2.11 Safe mode:"
"5.2.10 Safe mode:"
"5.2.1 Safe mode:"
intxt:"webadmin.php"
inurl:webadmin.php"
intitle: Linux * 2.6.18-348.1.1.el5PAE
intitle: - WSO 2.3
intitle: - WSO 2.4
intitle: - WSO 2.5
intitle: - WSO 2.5.1
5.2.16 Safe mode: OFF [ phpinfo ] Datetime:
2009 i686 Server IP:
2010 i686 Server IP:
2011 i686 Server IP:
2012 i686 Server IP:
2013 i686 Server IP:
"Userful: gcc, cc, ld, make, php, perl, python, tar, gzip, bzip2, nc, locate"
"Downloaders: wget, lynx, links, curl, lwp-mirror"
"Type Host Login Password Database"
"Execution PHP-code"
"reverse (login -> nigol)"."/etc/passwd"
" Bind port to /bin/sh [perl]"
"drwxr-xr-x [ home ]"
inurl:wso2.php
inurl:wso2.4.php
inurl:wso2.5.php
inurl:wso2.5.1.php
"Filesystem Size Used Avail Use% Mounted on"
"# Do not remove the following line, or various programs"
inurl:wso.php uid=0(root)
"posix_getpwuid ("Read" /etc/passwd)"
"captain crunch security team" inurl:wso
download wso2.php
download wso2.5.1.php
inurl:sym.php
allinurl: wsotest.php
inurl:wso.php
"-:[ User & Domains & Symlink ]:-"
allinurl: wso.php
inurl:"/wso.php"
allinurl: wso2.5.php
inurl:wso.php
inurl:"sym.php" Symlink Sa 3.0
inurl:wso.php uid=0(root)
"Symlink Sa 3.0"
intitle:Symlink Sa 3.0
inurl:"/wso.php"
inurl:wso.php
inurl:wso2.php
inurl:wso2.5.php
inurl:wso2.5.1.php
wso shell v.1.0 (roots)
inurl:wso.php
allintitle: "[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink
File ] [ Symlink Bypass ] "
inurl:"[ Home ] [ User & Domains & Symlink ] [ Domains & Script ] [ Symlink File ]
[ Symlink Bypass ] "
intxt:[ Bypass Read ] [ Mass Joomla ] [ Mass WordPress ] [ Mass vBulletin ]
[ Help ]
intitle:B-F Config_cPanel
intitle:Blind SQL Injection
intitle:Bypass Disable function
intitle:Carbylamine PHP Encoder
intitle:Change Joomla Index
intitle:Change WP Index
intitle:Converter Havij To Pro
intitle:Cpanel Brute Forcer 2012
intitle:Cpanel Brute Forcer 2011
intitle:Cpanel Brute Forcer 2013
intitle:Cpanel Webmail Brute Forcer
intitle:Face Book Brute Forcer
intitle:zip Filez Server ScaNNer v1.0
"Saudi Sh3ll v1.0"
inurl:wso.php#
Allinurl:wso2.5.1.php#
Allinurl:wso2.5.php#
Allinurl:wso2.4.php#
intitle:wsec_wp GUI v1.0
intitle:Symlink Sa v3.0
intitle:Symlink Sa v2.0
intitle:Symlink Sa v1.0
intitle:king B_F v1.0 Brute Forcer script
intitle:r00t4Lif t00lkit v0.2
allinurl: "wso.php
MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON WGet: ON
Fetch: OFF Perl: ON
Security Info Processes MySQL Eval Encoder Mailer milw0rm Md5-Lookup Toolz Kill-
Shell Feedback Update About
FTP-Brute
Freespace : 2396.21 GB of 3304.2 GB (72.52%). MySQL: ON MSSQL: OFF Oracle: OFF
MSSQL: OFF PostgreSQL: ON cURL: ON WGet: ON Fetch: OFF Perl: ON
ALFA TEaM SHeLL
[FTP Buteforcer] [Security Info] [Processes] [MySQL] [PHP-Code] [Encoder]
[Backdoor]
[Home] [Enumerate] [Search] [Self-Kill] [About]
[PHP-Tools] [Cpanel Finder] [Install PHP Proxy] [Install RFI/LFI Scanner] [Mass
Code Injection]
Software : Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/1.0.1e-fips mod_jk/1.2.37
mod_bwlimited/1.4. PHP/5.5.28 - php.ini
New8ie-Shell
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off
2011 php perms safe-mode: off (not secure)
[ftp buteforcer] [security info] [processes] [mysql] [php-code] [encoder]
[backdoor]
[home] [enumerate] [search] [self-kill] [about]
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: on
fetch: on perl: on
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off perl: off
curl: off mysql: on mssql: off postgresql: off oracle: off
curl: on mysql: on mssql: off postgresql: on oracle: off
curl: on mysql: on mssql: on postgresql: on oracle: off
frosch orgel
mysql: on mssql: off oracle: off mssql: off postgresql: on curl: on wget: on fetch:
off perl: on
safe-mode: off (off secure) drwxr-xr-x
mysql: on mssql: off oracle: off mssql: off postgresql: off curl: on wget: off
fetch: off-rw-r-
2010 safe~mode drwxr-xr-x
2010 safe~mode perms drwxr
[ftp buteforcer] [security info] [processes] [mysql] [php-code] [encoder]
[backdoor] [back-connection] [home] [enumerate] [md5-
[ftp buteforcer] [security info] [processes] [mysql] [php-code] [encoder]
[backdoor] [home] [enumerate] [search] [self-kill] [a
curl: on mysql: on mssql: off
perms drwxr-xr-x
WSO [MySQLl] [home] [perl: off] perms drwxr
curl: on mysql: on mssql: on postgresql: off oracle: off
SyRiAn Electronic Army Shell
storm 3[hard edition]
Manager | Jump | SQL | Extract Users & Domains | Hash Tools | Md5 | Crack |
/etc/passwd | Symljnk | CGI | Root | Bypass | Up shell | Mailer Tools |Leech | |
Encode JS Obfuscator | Decode JS Obfuscator | Encode PHP | Decode PHP | BackConnect
| Brute Force Tools | CM | Reverse IP
Lolipop BETA ( Powered By KingDefacer )
( CyberMiniShell v1.0 )
webadmin.php create symlink delete rename move
Delete, Chmod, Rename, Edit drwxr-xr-x ext:php
B Ge Team File Manager drwxr-xr-x ext:php
Recode Galerz Shell
OS Shell
Z3U54774CK | OWL SQUAD
404-server!! drwxr-xr-x
ZONE TUNISIA TEAM FILE MANAGER VERSION 1
Golden-Hacker File Manager
Cod3d By Alarg53
[#] hm X_Shell Backd00r [#]
{+} Mr.Trouble5hooting Was Here..!!! {+}
? Stupidc0de Family Backdoor ?
MesterFri File
Mr Secretz Shell
mas-untung [dot] [tk]
</> USTADCAGE_48 FILE MANAGER
$$ Beby $$
EBULOBO SHELL
Upload File ... -- drwxr-xr-x. Delete Chmod Rename
intitle:�wso � ext:php intext:�server ip� 2015 intext:� [ home ]�''
ALFA TEaM SHeLL
Madspot Security Team Shell Drwxr Xr X
0x404 Backdoor
Uname: User: Php: Hdd: Cwd
...:::: PHP File Manager
Current Path : "Upload File" Version 1.0, Coded By filetype:php site:net
Current Path : "Upload File" drwxr-xr-x
[#] DrXx [#]
current path /var/www/html/ upload ext:php
404-server upload file name size -rw-rw-r-- delete chmod rename edit
MySQL : ON | Perl : ON | Python : ON | WGET : ON | CURL : ON Current Path
Public Shell Version 2.0
-- drwxr-xr-x. Delete Chmod Rename. Man Man
W3LL M!N! SH3LL
Mister Spy drwxr-xr-x
[#]S4yur xh3LL Backd00r [#]
X.X File Manager
X.X Mini Shell
B Ge Team File Manager
[#] Mini Anime Shell [#]
3QRAB ALMO5EAM File Manager
Rwad Security File Manager
DrXx1.0, Coded By SAHARA H4XOR
public-html/wp-content [home] -rw--r--r-
Speca Turshi shell
MalaysiaGOV File Manager
Recoded By Cyber4rt
2016 safe mode utf-8 drwxr-xr
SmartSh3ll @by_DrBaKou
Wso smp.php rw-r safe off
2016 safe mode utf-8 drwxr-xr
D3c0d3r Team Shell
Software : Apache/2.2.8
SAFE MODE is OFF (Not Secure) OS : Windows NT
http://www.indetectables.net/viewtopic.php?p=275405
/public_html/wp-content/uploads/
"G22B File Manager"
[!] Silent MiNi Shell [!] ~ Silent L0v3R ~
PHP Tryag File Manager 1.4 G-B - :: Security ???? ????? Arab ::
SNOOPER DZ SHELL
"[email protected]"
xor.php
"g2b.php"
::---[MCA shell]---::.php"
::[ MCA shell ]:: - Hacked By:Al-rqmi.TM
"[MCA shell]"
!N3tShell v. Emp3ror Undetectable #18!
[Cyber Anarchy Shell] by r0ot
[ STUNSHELL #unknown @ ByroeNet ]
1n73ction Shell V3.3 [ Special Edition ]
h1kt0s4 shell
1 0.39% basel 3.1 library
1 0.39% basel interpolation
1 0.39% basel interpolation engine
1 0.39% basel spectra
x2300 locus7shell modified by #!physx^
basel stellar library
allintext:�safe-mode: off (not secure)
1 0.39% x2300 locus7shell v. 1.0a beta
1 1.22% .phpact=f shell
uid=30(wwwrun) gid=8(www)
2 0.78% .us/images/0/588/mo_656_656.swf
2 0.78% allintext:--[ x2300 locus7shell v. modded by #!physx^
lion/
"Current Path : /var/www/html/" upload
DC3 Cyber ??Security Crew Shell Shell Dive PRIV DxShell.1.0 egy
x2300 Locus7 Shell
Backdoor of Et04
K0D1K Backdoor, Recoded By K0D1K
Welcome To Hell :) -rw-r--r--
13chmod37 priv8 Shell
Coded By ./ChmoD Home:
:: Coded By izleyici
Hacked MichZo
ELMALISEKER Backd00r ASP
Gamma Web Shell Perl-Cgi
go-shell Perl-Cgi
Sindbad File Manager
Dr.S4mom File Manager
intitle:HackeD By Matrix Dz
hacked by Mr.DreamX196
"Sindbad~EG File Manager"
.:!~@# .::M@rAz Ali::. #@~!:.
config root man just like file manager
-rw-r--r-- Man Man ext:php
hacked by nofawkX-al
Drs-team web shell
"D.R.S Dz"
!:: JACKSON ::!
ZARk - Backd00R eXpl0iter
Blackshot BACKD00R
Hamdida X_Shell Backd00r
Upload File : Name: Size: Permissions: Options:
BOSS SHELL
Cyber Team Cirebon
Red White Spirit Team
[!] DiffMuRis Shell
El Moujahidin Bypass Shell -rw-r--r--
bypass 1.0, Devloped By El Moujahidin
Fallagassrini Bypass Shell
Coded By Ashiyane HaCkEr
By Error Filename ? Size Permission Owner Group Functions
X-m3n
"X-m3n" shell ext:php
[+] idbte4m shell v1
+-=[ Coded by Sy$+3mX | BloodSecurity Hackers ]=-+
[?CWD] [?DOC_ROOT] [?PARENT] [RELOAD]
[WRITABLE][READABLE] ~> drwxr-xr-x
c99shellbyR3.php
Bloodsec International
Bloodsec International Private shell by ~OverLaX~
X-P - Shalimar Group
Dr.SiLnT HilL Bypass Shell
IDBTE4M SHELL V1 [+]=-
7RAXEX xh3LL Backd00r
RouGani Shell
Official #OpHongKong Shell
AnonymousFox Shell
_ow _4 _a_ch ? __^
[#] DiDO [#]
Mr. DellatioNx196 GaLers xh3LL Backd00r
TANBE CYBER TEAM SHELL ARYMY
AL-VRI (shell)
Bogor Blackhat shell
Sinkashit Shell v.666
Current File Backd00r
4n0ns 4LphA xh3LL Backd00r
[#] Anon Aplha xh3LL Backd00r
::[ BillGate - Muslim Cyber Army ]::
[#] uLtRa VicTory xh3LL Backd00r [#]
GaLers Shell SANDI JULIAN BACKDOOR
path=/var/www/vhosts/
Doctor_injection Shell
Gunz_Berrry xh3LL Backd00r
Uploaded by: KN4CK3R
Blackshot BACKD00R
intitle:hacked by noFawkx-al
intitle:backdoor + inurl:edu
ASPYDrvsInfo
Sniper-Sa Shell
N3TWAR SPAMMER
n3tw4r INBOX
Spiritokiller INBOX
k4raeL+-+sh3LL
#k4rael - Sh3ll
HaCkeR"s By jozaF
HaCkEd By _=Reza=_
Egy-Spider Shell
HACKED by [ �0��upT3R ] [ RunN3R-32 ]
.::M9awdin Team::..
[#] GaLers xh3LL Backd00r - mex exchange
SyRiAn Sh3ll ~ V8~ [ B3 Cr34T!V3 Or D!3 TRy!nG ]
Hacked By Blackhattiger
ISPA Shell Prv8
d | HACKED BY ANONCODERS - CYBER CALIPHATE
Intext:S4yur xh3LL Backd00r
Intext:Hamdida X_Shell Backd00r
X11R6
Coded By Mr.Hamdida X_Shell Backd00r
Coded By G-B Home:
backdoorintitle:"Hamdida X_Shell Backd00r"
Dtool Pro 21. Dx Shell v1.0 22. ekin0x 23
"uploader by ghost-dz"ext:php
Hacked by IndoXploit
Lazy File Manager
D2MYSILENT Privat3 Sh3ll
[#] Hacktivist Jihad sh3LL Backd00r
intitle:MyShell 1.1.0 build 20010923
inurl:/administrator/index.php?autologin=1
intext:powered by joomla & filetype:sql -github
Intext:GaLers xh3LL Backd00r
b4cKd00r 3 Coded By Mr. DellatioNx196 Indonesian Cyber Freedom
Gunz_Berrry Backd00r
[#] Gunz_Berrry AnonCoders Backd00r [#]
Gunz_Berrry
D14N xh3LL Backd00r
Memberal_Force xh3LL Backd00r
ILink7 | [#] GaLers xh3LL Backd00r [#]
FallaGa File Manager
Tryag File Manager
Hacked by ./BlaDDzeRR
H4CK50D1 xh3LL Backd00r
OuNeT RdXxS Shell
MulCiShell v2.0
Zehir Shell
Dark Shell
ASPX Shell
Altantiq Shell
][Black-Heart][
c99.xml
cPanel Shell
c99.xml
Lou Sh File Manager
Khanh Cloud! Mini Shell
Coded by Fallag Gassrini |Tunisian Fallaga Team
Intext:[#] Walkers Xhell Backd00r [#]
Intext:Gunz_Berry AnonCoders Backd00r
gunz_berry | Hacked MD-GHOST
AnoaGhost Shell File Manager
hacked by moroccan wolf
Hacked By Predator-Ma
Hacked by Zabi8
Da3s HaCkEr File Manager
Fr13nds File Manager
HaTRk File Manager
Cyb3r_Dr4in File Manager
Fr13nds Team File Manager
path=/var/www/
darkshadow File Manager
uploader by ghost dz
Dr.silnt HilL File Manager
Dr.ViP File Manager
Coded By Fallag darkshadow-tn
Hacked By (The_InJx)
Hacked By MrMax
Hacked By DrLazy Fallag
.::Hacked By Owner Dzz::.
| HaCkEd ~ By: MD ~GHOST|
Hacked By MD-GHOST
fileupload-XpaLFz_TAclwLOT69023703.log
HaTRk File Manager
Dr-Jn File Manager Version 1.0, Coded By HaCkEr
Hacked By TheWayEnd | [#] S4yur xh3LL Backd00r [#]
Current Path : /var/www/vhosts/
Siber-Warrior Clean SheLL
Cyb3r_Dr4in File Manager
Safe mode: OFF [ phpinfo ] Datetime: Server IP:
[ + ] Nabil NaSsiri [ + ] | [ Php ]
[+] Pontianak Crew [+]
-:[ DM SHELL ]:-
�[ Hacked by Uchiha ]�
Uname User Php Hdd Cwd. [ Sec. Info ].
3Turr ~ SH311
k 2 l l 3 3 d S h e l l
::k 2 l l 3 3 d::
2015 gb safe mode off server ip
EliTeCr3W�
WSO [Black-ID] 3.0
Madspot security shell safemode smp drwxr rw r
2015 safe mode shell smp drwx sql
drwx+Shell+SMP+File+PHP/
SQL PHP-code Update Feedback Self remove Logout. drwx--x--x
upload: [ok] make file: [ok] drwxr xr x ext:php
CyberTrons xh3LL Backd00r
Coded By Mr. CyberTron
R57 WSO uname RW R
gALerZ xh33L b4cKdDoRz
0R4EL3XH33L
[#] Bems404 xh33L b4cKdDoRz [#]
[+]OWNED[+]
-rw-r--r--. Delete, Chmod, Rename, Edit
=|#Mr.EXI2T|= =
!shell recoded by !87&!01 kurdish blackhats
bypass 1.0, Devloped By El Moujahidin
dhfdfh | [+]OWNED[+]
gALerZ xh33L b4cKdDoRz r3c0ded bY Zee Zuu
search.assist.shaw.ca
allinurl:"/wp-content/themes/newsworld/*.php"
allinurl:/wp-content/themes/newsworld/getresults.php site:org
allinurl:/wp-content/themes/newsworld/getresults.php site:biz
allinurl:/wp-content/themes/newsworld/getresults.php site:in
allinurl:/wp-content/themes/newsworld/newuser.php
allinurl:/wp-content/themes/newsworld/getresults.php first
thumbopen.php?src=http://flickr.com.apartmentrentalslist.com/index.php second
https://defense.ballastsecurity.net/decoding/index.php?
raw=b8054335e47c2604c48729ed0ad34a0d
https://defense.ballastsecurity.net/decoding/index.php?
raw=7dd5ccad14ab12de7b73b34a4ada4159
inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"
intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]
[ tmp ] [ delete ]
inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update
webadmin.php
webadmin.php drwxr-xr-x
[ � ] S E M P A K [ � ] shell
Sadrazam | Casus Shell
Modded FaTaLisTiCz_Fx Fx29SheLL - 30 - 12 - 2010
Small Web Shell by ZaCo PHP
Ceweng Cyber 1.02 05.2011
C37 phpshell 1.1
b374k m1n1 1.01
CiH H@CkErZ CiH99 v8.2 2018
m1n1 newbie3vilc063s.2012
intitle:"index of/" "Ardy47@Problem
intitle:"index of/" "sym.php
intitle:"index of/" "sadrazam.php?
intitle:"index of/" "GnY.php
intitle:"index of/" " webadmin.php
--==[[ Symlink Based CPanel Cracker By Team IndiShell ]]==--
-=[Symlink Tools to bypass user]V.3=-
o---[ Developer by SnIpEr_SA Symlink User Bypass]---o
filetype php r57 shell
drwxr-xr-x - SuperWeb
"drwxrwxrwx" hsphere shell filetype:php
13chmod37 priv8 Shell
CiH_H@CkErZ CiH99 v8.2 2014
eXpCrEw SHeLL
==AXeL PaNi==
==eL PaNi==
==INTeL PaNi==
==IZeL PuNe==
-===[ ExploreCrew WebShell ]===-- - -
cc
Mr.TiGeR shell
o---[ Xgr0upVn.org - shell by RST/GHC | http://Xgr0upVn.org | H@ck+Cr@ck=Enj0y! |
Design by:AluCaR | ]---o
intitle:"Symlink_Sa 2.0 "
o--{ UnKn0wN Shell }--o
o--{ W.A.S Shell }--o
#k4raeL - sh3LL
o--{ Cubi11 Shell }--o
o--{ TuN-Hax0rS Shell }--o
NeT-Own3r Shell
HMBr57 Shell
c99madshell drwxr-xr-x
AluCaR Shell
Sniper-Sa Cr3w
zehir ASP shell
ly0kha shell
h4ntu shell [powered by tsoi] PHP
SnIpEr_SA shell
#
lamashell PHP
#
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP
#
load_shell PHP
c99madshell ok drwxr-xr-x filetype:php
bypass drwxr-xr-x filetype:php
Rchi xh3LL Backd00r
GaLers xh3LL Backd00r
=[Indonesia Cyber Crash Privat Shell]=
K2LL33D SHELL
o---[ r57 Shell ]---o o---[ heroes1412 ]---o
[ + ] 1n73ct10n Shell V3.3 [ + ]
[milw0rm!] bypass drwxr-xr-x filetype:php
Permisions: drwxr-xr-x [home dir]
Wso 2.2 Drwxr Xr X
Wso 2.1 Drwxr Xr X
Php Uid Drwxr Xr X Uname A Http
Uname A Uid Drwxr Xr X R57shell
Public Html Drwxr Xr X
Wso 2.3 Drwxr Xr X
Boff 1.0 Drwxr Xr X
_[ X-Shell ]_::. .::_[ VnZone ]_
x0rg-Bypass
Mr.Xu�n Qu�
Shell
jatimcrew .: Ninja_1263:.
X Slash SHELL 1.5 06.2008
Laskar Lolabu1.5 06.2008
[FTP Buteforcer] [Security Info] [Processes] [MySQL] [PHP-Code] [Encoder]
[Backdoor] [Back-Connection] [Home] [Enumerate] [Md5-Lookup] [Word-Lists] [milw0rm
it!] [Search] [Self-Kill] [About]
!N3tShell v. Emp3ror Undetectable #18!
[Cyber Anarchy Shell] by r0ot
[ STUNSHELL #unknown @ ByroeNet ]
1n73ction Shell V3.3 [ Special Edition ]
h1kt0s4 shell
! tryagshell 1.3
h1kt0s4
h1kt0s4
-
r57 Shell -
c100 Shell -
Sniper-Sa Shell
Egy-Spider Shell
Locus Shell
#!physx
CiH_H@CkErZ CiH99 v8.1 2013
FX29 Shell
[FULL]Fx29SheLL
By FaTaLisTiCz_Fx
Fx Fx29SheLL v2.0.09.08
Uploader
PHPjackal1.3
Mail List Maker
..............................................................................
!C99Shell v. 1.0 beta!
!C99Shell v. 1.0 pre-release build #16!
!C99Shell v. 1.0 pre-release build #5!
!C99shell v. 1+Safe-mode: OFF (not secure)
!c99shell v. 1+Safe-mode: OFF (not secure)
"c99" filetype:php intext:"Safe-Mode: OFF"
"c99.php" filetype:php
"c99shell v 1.0"
"c99shell v. 1.0 "
"c99Shell v. 1.0 pre"
"C99Shell v. 1.0 pre"
"c99Shell v. 1.0 pre-release build "
"C99Shell v. 1.0 pre-release build "
"c99shell v. 1.0 pre-release build"
"c99shell v. 1.0 pre-release"
"Captain Crunch Security Team" inurl:c99
"Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
"Encoder Tools Proc. FTP brute"
"index of /" c99.php
"index of" c99.php
"Index of/"+c99.php
"inurl:c99..php"
"inurl:c99.php"
"uname -a","uid=","drwxr-xr-x","r57shell"
--[ c99shell v. 1.0 pre-release build #15 | Powered by ]--
--[ c99shell v. 1.0 pre-release build #16
--[ c99shell v. 1.0 pre-release build #16 powered by Captain Crunch Security Team |
]--
=C99Shell v. 1.0 pre-release
allintext: Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self
remove
allintext:C99Shell v. 1.0 pre-release build #12
allintitle: "c99shell"
allintitle: C99shell filetype:php
allinurl: "c99.php"
allinurl: c99.php
allinurl:"c99.php"
allinurl:"c99.php" filetype:php
allinurl:.c99.php
allinurl:/c99.php
allinurl:c99.php
allinurl:c99.php?
c9 shell v.1.0 (roots)
c9. PHP-code Feedback Self remove
c9.php
c9.php "intitle:Index of "
c9.php download
c99 shell v.1.0 (roots)
c99. PHP-code Feedback Self remove
c99.php "intitle:Index of "
c99shell [file on secure ok ]?
c99shell +uname
c99shell filetype:php -echo
c99shell linux infong
c99shell php + uname
c99shell powered by admin
c99shell v. 1.0
C99Shell v. 1.0 beta !
c99shell v. 1.0 pre
C99Shell v. 1.0 pre-release
C99Shell v. 1.0 pre-release build
c99shell v. 1.0 pre-release build
C99Shell v. 1.0 pre-release build #
C99Shell v. 1.0 pre-release build #12
c99shell v. 1.0 pre-release build #16
C99Shell v. 1.0 pre-release build #16
c99shell v. 1.0 pre-release build #16 |
C99Shell v. 1.0 pre-release build #16 administrator
C99Shell v. 1.0 pre-release build #16 download
C99Shell v. 1.0 pre-release build #16 software apache
C99Shell v. 1.0 pre-release build #16!
C99Shell v. 1.0 pre-release build #5
c99shell v. 1.0 pre-release build #5
c99shell v. 1.0 release security
C99Shell v. 1.3
c99shell v. pre-release build
c99shell v.1.0
C99Shell v.1.0 pre-release
c99shell[file on ]ok
c99shell[on file]ok
c99shell+v.+1.0 16
c9shell
c9shell [file on secure ok ]?
c9shell +uname
c9shell filetype:php -echo
c9shell linux infong
c9shell php + uname
c9shell powered by admin
c9shell v. 1.0
c9Shell v. 1.0 beta !
c9shell v. 1.0 pre
c9Shell v. 1.0 pre-release
c9Shell v. 1.0 pre-release build
c9shell v. 1.0 pre-release build
c9Shell v. 1.0 pre-release build #
c9Shell v. 1.0 pre-release build #12
c9shell v. 1.0 pre-release build #16
c9Shell v. 1.0 pre-release build #16
c9shell v. 1.0 pre-release build #16 |
c9Shell v. 1.0 pre-release build #16 administrator
c9Shell v. 1.0 pre-release build #16 download
c9Shell v. 1.0 pre-release build #16 software apache
c9Shell v. 1.0 pre-release build #16!
c9Shell v. 1.0 pre-release build #5
c9shell v. 1.0 pre-release build #5
c9shell v. 1.0 release security
c9Shell v. 1.3
c9shell v. pre-release build
c9shell v.1.0
c9Shell v.1.0 pre-release
c9shell[file on ]ok
c9shell[on file]ok
c9shell+v.+1.0 16
download c99.php
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout"
files/c99.php
ftp apache inurl:c99.php
img.c99.php
img/c99.php
index of /admin/files/
intitle:!C99Shell v. 1.0 pre-release build #16! root
intitle:"c99shell" filetype:php root
intitle:"c99shell" Linux infong 2.4
intitle:"index of /" "c99.php"
intitle:"Index of" c99.php
intitle:"index of" intext:c99.php
intitle:"Index of/"+c99.php
intitle:"index.of" c99.php
intitle:c99shell "Software: Apache"
intitle:c99shell +filetype:php
intitle:c99shell filetype:php
intitle:c99shell intext:uname
intitle:C99Shell pre-release
intitle:c99shell uname -bbpress
intitle:C99Shell v. 1.0 pre-release +uname
intitle:index.of c99.php
intitle:index/of file c99.php
inurl:"/c99.php"
inurl:"/c99.php" intitle:"C99shell"
inurl:"c99.php"
inurl:"c99.php" c99shell
inurl:"c99.php" filetype:php
inurl:"c99.php?"
inurl:/c99.php
inurl:/c99.php?
inurl:/c99.php+uname
inurl:admin/files/
inurl:c99.php
inurl:c99.php c99 shell
inurl:c99.php ext:php
inurl:c99.php uid=0(root)
inurl:c99.php?
ok c99.php
powered by Captain Crunch Security Team
root c99.php
safe-mode: off (not secure) drwxrwxrwx c99shell
Dork : inurl:/wp-content/plugins/wp-vertical-gallery/
Dork : inurl:/wp-content/plugins/estatik/
2013 drwxr-x--- safe mode r57shell rw r
0.07% uname -auid=drwxr-xr-xc99shell
1 0.07% safe mode : off generation time drwxrwxrwx -c99shell
1 0.07% safe mode off drwxrwxrwx c99shell
1 0.07% safe-mode: off (not secure)
1 0.07% safe-mode: off (not secure) drwxrwxrwx c99shell.php
1 0.07% safemode perms drwxr
1 0.07% drwxr-xr-x safe mode on secure public_html c99shell
1 0.07% c99shell drwxr-xr-x uname safe mode secure off public_html
1 0.07% c99shell v. 1.0 beta
1 0.07% @drwxrwxrwx c99shell.php
1 0.07%
drwxr-x--- [ home ]File manager drwx--x--x x86_64 #1 SMP Upload file: (Writeable)
Choose File>>
2015 Safe Mode Drwxr XR X.enumerate] [encoder] [tools] [proc.] [ftp brute] [sec.]
[sql]- wso 2.4 ","drwxr-xr-x","c99madshellPublic HTML drwxrwxrwx 2016 C99madshell
PHP2013 drwxr-x--- safe mode r57shell rw rC99shell Off Oracle drwxrwxrwx
PHP2013:.de/c99madshell.phpN3tshell Drwxr XR X
IL Boff 1.0 RW R
GB Xmlrpc WSO Drwxr
C99shell UName bbPress Drwxr
Drwxr XR X C99shell
C99shell 4.0V Drwxr XR X
Boff 1.0 RW R
Safe SMP Boff RW R" filetype:php intext:"Safe-Mode: OFF"
inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"
"Shell" filetypehp intext:"uname -a:" "EDT 2010"
intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]
[ tmp ] [ delete ]
inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update
inurl:r57.php [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ]
[ delete ]
"r57shell 1.4"
"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]"
inurl:b374k.php
inurl:c99.php
inurl:c100.php Generation time:
inurl:itsecteam_shell.php
inurl:"c99.php" inurl:c99.php inurl:c99.php inurl:c99.php allinurl:c99.php
inurl:"c99.php" inurl:c99.php intitle:c99shell uname c99shell v.1.0 (roots)
inurl:/c99.php allinurl:.c99.php allinurl:.c99.php intitle:C99Shell
allintitle:"C99Shell" allintitle:"C99Shell" c99.php ccteam.ru c99.php
intext:c99shell inurl:c99.php
!C99Shell v. 1.0 pre-release build #16!
intitle:c99shell filetype:php
inurl:c99.php
inurl:"/c99.php"
allinurl:c99.php
c99shell v. 1.0 pre-release build #5
"inurl:c99.php" + "intext:safe"
--[ c99shell v. 1.0 pre-release build #12 powered by Captain Crunch Security Team
c99.php download
intitle:r57shell | intitle:c99shell +uname
inurl:minimail c99
!C99Shell v. 1.0 pre-release build # +php -htm -html -shtml
allintitle: c99shell filetype:php
inurl:c99.php uid=0(root)
inurl:c99.php
inurl:/files/c99.php
intitle:c99shell safe-mode:OFF
c99.php "uid=0"
safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php uid=0(root)
allintitle: "c99shell"
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
c99. PHP-code Feedback Self remove
c99shell filetype:php -echo
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell +filetype:php
intitle:C99Shell v. 1.0 pre-release +uname
!C99Shell v. 1.0 pre-release build #5!
inurl:"c99.php"
C99Shell v. 1.0 pre-release build #16!
c99shell v. 1.0 pre-release build #16
intitle:c99shell intext:uname
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell uname -bbpress
B64 PHP Shell � The Defaced - Created by Kr3w
intitle:madspot team shell
inurl:".php?act=exploits"
inurl:".php?act=tools"
inurl:".php?act=encoder"
inurl:".php?act=proxy"
inurl:".php?act=shbd"
inurl:".php?act=fsbuff"
inurl:".php?act=rip"
inurl:".php?act=update"
inurl:".php?act=cmd="
!C2007Shell v. 1.0 pre-release build #16!
-[ c2007shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r| Adora
Security Pwnz j00! |
inurl:.php �cURL: ON MySQL: ON MSSQL: OFF�
�Shell� filetype:php intext:�uname -a:� �EDT 2010?
intitle:�intitle:r57shell� [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]
[ tmp ] [ delete ]
inurl:�c99.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
inurl:�c100.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
intitle:�Shell� inurl:�.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update
1 4 14.29% !n3tshell v. d.o.m team!
2 2 7.14% fx29shell drwxrwxrwx
3 2 7.14% intitle:inbox mailer filetype:php
4 1 3.57% !c99 v0.0.1 syn-mod [synsta]!
5 1 3.57% !n3tshell v. emp3ror undetectable #18! filetype php
6 1 3.57% alex geigy
7 1 3.57% c99 v0.0.1 syn-mod synsta
8 1 3.57% consul autolift
9 1 3.57% drwxrwxrwx n3tshell filetype:php
10 1 3.57% fatalisticz_fx fx29shell v
11 1 3.57% fx fx29shell drwxr-xr-x
12 1 3.57% garage geigy
13 1 3.57% inbox mailer
14 1 3.57% intitle:fx29shell apache uname filetype:php
15 1 3.57% intitle:inbox php mailer ext:php
16 1 3.57% intitle:inbox php mailer ext:php inurl:ch
17 1 3.57% intitle:inbox php mailer filetype:php
18 1 3.57% musawir ali wavelets
19 1 3.57% safe-mode : curl : mysql : mssql-
20 1 3.57% safe-mode: off (no secure). /home/httpd/ -
List of ALL hacking Shells
C99Shell v. 1.0 beta (5.02.2005) PHP
b374k PHP
b374k-mini-shell PHP
Cyber Shell PHP
GFS Web-Shell PHP
NFM 1.8 PHP
r57shell PHP
Small Web Shell by ZaCo PHP
nsTView v2.1 PHP
DxShell v1.0 PHP
C99madShell v. 2.0 madnet edition PHP
CTT Shell PHP
GRP WebShell 2.0 release build 2018 (C)2006,Great PHP
Crystal shell PHP
Loaderz WEB Shell PHP
NIX REMOTE WEB SHELL PHP
Antichat Shell PHP
CasuS 1.5 PHP
Sincap 1.0 PHP
C99Shell v. 1.0 pre-release build(safe-mode) PHP
hiddens shell v1 PHP
Web-shell (c)ShAnKaR PHP
Predator PHP
KA_uShell 0.1.6 PHP
NGH PHP
C2007Shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r PHP
Antichat Shell. Modified by Go0o$E PHP
c0derz shell [csh] v. 0.1.1 release PHP
iMHaBiRLiGi Php FTP PHP
PHVayv PHP
phpRemoteView PHP
STNC WebShell v0.8 PHP
MyShell PHP
ZyklonShell PHP
AK-74 Security Team Web Shell Beta Version PHP
Gamma Web Shell Perl-Cgi
go-shell Perl-Cgi
PhpSpy Ver 2006 Perl-Cgi
CmdAsp.asp.txt ASP
CyberSpy5.Asp.txt ASP
klasvayv.asp.txt ASP
indexer.asp.txt ASP
NTDaddy v1.9 ASP
reader.asp.txt ASP
RemExp.asp.txt ASP
zehir4.asp.txt ASP
Elmaliseker.txt ASP
EFSO_2.txt ASP
accept_language PHP
Ajax_PHP Command Shell PHP
Antichat Shell v1.3 PHP
Ayyildiz Tim -AYT- Shell v 2.1 Biz PHP
aZRaiLPhp v1.0 PHP
backupsql PHP
c99 PHP
c99_locus7s PHP
c99_madnet PHP
c99_PSych0 PHP
c99_w4cking PHP
Crystal PHP
ctt_sh PHP
cybershell PHP
dC3 Security Crew Shell PRiV PHP
Dive Shell 1.0 � Emperor Hacking Team PHP
DTool Pro PHP
Dx PHP
GFS web-shell ver 3.1.7 � PRiV8 PHP
gfs_sh PHP
h4ntu shell [powered by tsoi] PHP
iMHaPFtp PHP
ironshell PHP
JspWebshell 1.2 PHP
KAdot Universal Shell v0.1.6 PHP
lamashell PHP
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP
load_shell PHP
matamu PHP
Moroccan Spamers Ma-EditioN By GhOsT PHP
myshell PHP
Mysql interface v1.0 PHP
MySQL Web Interface Version 0.8 PHP
mysql PHP
mysql_tool PHP
NCC-Shell PHP
NetworkFileManagerPHP PHP
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version PHP
nshell PHP
nstview PHP
PH Vayv PHP
PHANTASMA PHP
PHP Shell PHP
php-backdoor PHP
php-include-w-shell PHP
pHpINJ PHP
PHPJackal PHP
PHPRemoteView PHP
Private-i3lue PHP
pws PHP
r57 PHP
r57_iFX PHP
r57_kartal PHP
r57_Mohajer22 PHP
rootshell PHP
ru24_post_sh PHP
s72 Shell v1.1 Coding PHP
Safe0ver Shell -Safe Mod Bypass By Evilc0der PHP
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 PHP
SimAttacker � Vrsion 1.0.0 � priv8 4 My friend PHP
simple_cmd PHP
simple-backdoor PHP
SimShell 1.0 � Simorgh Security MGZ PHP
SnIpEr_SA Shell PHP
Uploader PHP
WinX Shell PHP
Worse Linux Shell PHP
zacosmall PHP
Antichat Shell v1.3 PHP
Ayyildiz Tim -AYT- Shell v 2.1 Biz PHP
aZRaiLPhp v1.0 PHP
CrystalShell v.1 PHP
Cyber Shell (v 1.0) PHP
dC3 Security Crew Shell PRiV PHP
Dive Shell 1.0 � Emperor Hacking Team PHP
DxShell.1.0 PHP
ELMALISEKER Backd00r ASP
GFS web-shell ver 3.1.7 � PRiV8 PHP
h4ntu shell [powered by tsoi] PHP
JspWebshell 1.2 JSP
KAdot Universal Shell v0.1.6 PHP
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit PHP
Macker�s Private PHPShell PHP
Mysql interface v1.0 PHP
MySQL Web Interface Version 0.8 PHP
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version PHP
Perl Web Shell by RST-GHC PL
Private-i3lue PHP
RedhatC99 [login=redhat-pass=root] PHP
Rootshell.v.1.0 PHP
s72 Shell v1.1 Coding PHP
Safe0ver Shell -Safe Mod Bypass By Evilc0der PHP
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 PHP
SimAttacker � Vrsion 1.0.0 � priv8 4 My friend PHP
SimShell 1.0 � Simorgh Security MGZs PHP
WinX Shell PHP
Worse Linux Shell PHP
NetworkFileManagerPHP.php. � +-- NFM 1.8.php. � +-- NGH.php. � +-- NIX REMOTE WEB
SHELL.
/usr/share/webshells/
+-- asp
� +-- cmd-asp-5.1.asp
� +-- cmdasp.asp
+-- aspx
� +-- cmdasp.aspx
� +-- shell.aspx
+-- cfm
� +-- cfexec.cfm
+-- jsp
� +-- cmdjsp.jsp
� +-- jsp-reverse.jsp
+-- perl
� +-- dc.pl
� +-- perlcmd.cgi
� +-- perl-reverse-shell.pl
� +-- Perl Web Shell by RST-GHC.pl
+-- php
� +-- 529.php
� +-- aa.php
� +-- accept_language.php
� +-- Ajax_PHP Command Shell.php
� +-- Ajax_PHP_Command_Shell.php
� +-- AK-74 Security Team Web Shell Beta Version.php
� +-- angel.php
� +-- Antichat Shell. Modified by Go0o$E.php
� +-- Antichat Shell.php
� +-- Antichat Shell v1.3.php
� +-- Antichat_Shell_v1.3.php
� +-- aspx.php
� +-- aspydrv.php
� +-- Ayyildiz Tim -AYT- Shell v 2.1 Biz.php
� +-- aZRaiLPhp v1.0.php
� +-- aZRaiLPhp_v1.0.php
� +-- b374k-2.7.php
� +-- b374k-mini-shell-php.php.php
� +-- b374k.php.php
� +-- backupsql.php
� +-- beyaz_hacker.php
� +-- c0derz shell [csh] v. 0.1.1 release.php
� +-- c100.php
� +-- c99_locus7s.php
� +-- c99_madnet.php
� +-- C99madShell v. 2.0 madnet edition.php
� +-- C99madShell v. 3.0 BLOG edition.php
� +-- c99.php
� +-- c99_PSych0.php
� +-- C99Shell v. 1.0 beta (5.02.2005).php
� +-- C99Shell v. 1.0 pre-release build(safe-mode).php
� +-- c99unlimited.php
� +-- c99_w4cking.php
� +-- CasuS 1.5.php
� +-- cgi.php
� +-- cgitelnet.php
� +-- CmdAsp.asp.php.txt
� +-- cmd.php
� +-- cpanel.php
� +-- Crystal.php
� +-- Crystal shell.php
� +-- CrystalShell v.1.php
� +-- CTT Shell.php
� +-- ctt_sh.php
� +-- cw.php
� +-- CWShellDumper.php
� +-- cybershell.php
� +-- Cyber Shell.php
� +-- Cyber Shell (v 1.0).php
� +-- CyberSpy5.Asp.php.txt
� +-- dC3 Security Crew Shell PRiV.php
� +-- dC3_Security_Crew_Shell_PRiV.php
� +-- Dive Shell 1.0 - Emperor Hacking Team.php
� +-- Dive_Shell_1.0_Emperor_Hacking_Team.php
� +-- dq.php
� +-- DTool Pro.php
� +-- Dx.php
� +-- DxShell.1.0.php
� +-- DxShell v1.0.php
� +-- EFSO_2.php.txt
� +-- ekin0x.php
� +-- Elmaliseker.php.txt
� +-- erne.php
� +-- ex0shell.php
� +-- FaTaLisTiCz_Fx.php
� +-- fatal.php
� +-- findsock.c
� +-- ftpsearch.php
� +-- g00nshell-v1.3.php
� +-- g3.php
� +-- Gamma Web Shell.php
� +-- gfs_sh.php
� +-- GFS Web-Shell.php
� +-- GFS web-shell ver 3.1.7 - PRiV8.php
� +-- GFS_web-shell_ver_3.1.7_-_PRiV8.php
� +-- go-shell.php
� +-- GRP WebShell 2.0 release build 2018 (C)2006,Great.php
� +-- h4ntu shell [powered by tsoi].php
� +-- h4ntu_shell_[powered_by_tsoi].php
� +-- hiddens shell v1.php
� +-- hxpshell.php
� +-- iMHaBiRLiGi Php FTP.php
� +-- iMHaPFtp.php
� +-- indexer.asp.php.txt
� +-- ironshell.php
� +-- JspWebshell 1.2.php
� +-- JspWebshell_1.2.php
� +-- kacak.php
� +-- KAdot Universal Shell v0.1.6.php
� +-- KAdot_Universal_Shell_v0.1.6.php
� +-- KA_uShell 0.1.6.php
� +-- klasvayv.asp.php.txt
� +-- kral.php
� +-- lamashell.php
� +-- links.php
� +-- liz0zim.php
� +-- Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php
� +-- Loaderz WEB Shell.php
� +-- load_shell.php
� +-- login.php
� +-- lolipop.php
� +-- lostDC.php
� +-- Macker's Private PHPShell.php
� +-- magiccoder.php
� +-- matamu.php
� +-- megabor.php
� +-- micro.php
� +-- Moroccan Spamers Ma-EditioN By GhOsT.php
� +-- Moroccan_Spamers_Ma-EditioN_By_GhOsT.php
� +-- myshell.php
� +-- MyShell.php
� +-- Mysql interface v1.0.php
� +-- Mysql_interface_v1.0.php
� +-- mysql.php
� +-- mysql_tool.php
� +-- MySQL Web Interface Version 0.8.php
� +-- MySQL_Web_Interface_Version_0.8.php
� +-- NCC-Shell.php
� +-- NetworkFileManagerPHP.php
� +-- NFM 1.8.php
� +-- NGH.php
� +-- NIX REMOTE WEB SHELL.php
� +-- NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php
� +-- NIX_REMOTE_WEB-SHELL_v.0.5_alpha_Lite_Public_Version.php
� +-- nshell.php
� +-- nst.php
� +-- nstview.php
� +-- nsTView v2.1.php
� +-- NTDaddy v1.9.php
� +-- PHANTASMA.php
� +-- php-backdoor.php
� +-- php-findsock-shell.php
� +-- php-include-w-shell.php
� +-- pHpINJ.php
� +-- PHPJackal.php
� +-- phpRemoteView.php
� +-- PHPRemoteView.php
� +-- php-reverse-shell.php
� +-- PHP Shell.php
� +-- PhpSpy Ver 2006.php
� +-- PH Vayv.php
� +-- PH_Vayv.php
� +-- PHVayv.php
� +-- Predator.php
� +-- Private-i3lue.php
� +-- pws.php
� +-- qsd-php-backdoor.php
� +-- r00t.php
� +-- R0XEM ShElL.php
� +-- r57_iFX.php
� +-- r57_kartal.php
� +-- r57_Mohajer22.php
� +-- r57.php
� +-- r57shell1.40.php
� +-- r57shell2.0.php
� +-- r57shell.php
� +-- reader.asp.php.txt
� +-- RemExp.asp.php.txt
� +-- robots.php
� +-- rootshell.php
� +-- Rootshell.v.1.0.php
� +-- ru24_post_sh.php
� +-- s1.php
� +-- s2.php
� +-- s72 Shell v1.1 Coding.php
� +-- s72_Shell_v1.1_Coding.php
� +-- sadrazam.php
� +-- safe0ver.php
� +-- Safe0ver Shell -Safe Mod Bypass By Evilc0der.php
� +-- Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php
� +-- Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.php
� +-- sa.php
� +-- shellzx.php
� +-- simattacker.php
� +-- SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php
� +-- simple-backdoor.php
� +-- simple_cmd.php
� +-- Simple_PHP_backdoor_by_DK.php
� +-- SimShell 1.0 - Simorgh Security MGZ.php
� +-- SimShell_1.0_-_Simorgh_Security_MGZ.php
� +-- Sincap 1.0.php
� +-- small.php
� +-- Small Web Shell by ZaCo.php
� +-- SnIpEr_SA Shell.php
� +-- SnIpEr_SA_Shell.php
� +-- soldierofallah.php
� +-- sosyete.php
� +-- spygrup.php
� +-- STNC WebShell v0.8.php
� +-- stres.php
� +-- toolaspshell.php
� +-- tryag.php
� +-- Uploader.php
� +-- Web-shell (c)ShAnKaR.php
� +-- WinX Shell.php
� +-- Worse Linux Shell.php
� +-- wow.php
� +-- zaco.php
� +-- zacosmall.php
� +-- zehir4.asp.php.txt
� +-- zehir4.php
� +-- ZyklonShell.php
List Dork Shell Google C99 , locus7 dan FTP
33|28.45%| powered by captain crunch security team
6 |5.17%| safe-mode: off (not secure)
5 |4.31%| home
4 |3.45%| basel 2.2
4 |3.45%| safe-mode: off (not secure) drwxrwxrwx
3 |2.59%| c99memoryl
3 |2.59%| c99shell [file on secure ok ]
3 |2.59%| c99shell v. 1.0 pre-release build #16
3 |2.59%| hacker
3 |2.59%| uid=99(nobody) gid=99(nobody) groups=99(nobody)
2 |1.72%| --[ c99shell v. 1.0 pre-release build #16
2 |1.72%| basel
2 |1.72%| c99shell v. 1.0 pre-release build
2 |1.72%| powered by captain crunch security team | http://ccteam.ru |
2 |1.72%| safe-mode : off ( not secured ) drwxrwxrwx
2 |1.72%| safe-mode: off (not secure) drwxrwxrwx c99shell
1 |0.86%| !c99shell v. 1.0 pre-release build #16!
1 |0.86%| --[ c99shell v. 1.0 pre-release build
1 |0.86%| -[ c99shell v. 1.0 pre-release build #16 powered by captain cru
1 |0.86%| /opt/zope/lib/python/zdaemon/zdrun.py
1 |0.86%| allintext:"safe-mode: off (not secure)"
1 |0.86%| allinurl:selfremove
1 |0.86%| basel documentation
1 |0.86%| c99memory.php
1 |0.86%| c99shell safe-mode : off ( not secured ) drwxrwxrwx
1 |0.86%| c99shell v. 1.0 pre-release build #16 powered by captain crunch
1 |0.86%| c99shell v. 1.0 pre-release uname
1 |0.86%| c99shell v. pre-release build
1 |0.86%| captain crunch security team
1 |0.86%| code safe-mode: off (not secure) drwxrwxrwx c99shell
1 |0.86%| drwxrwxrwx c99shell filetype:php
1 |0.86%| encoder bind proc. ftp brute sec. sql php-code feedback self re
1 |0.86%| encoder tools proc. ftp brute sec. sql php-code update feedback
1 |0.86%| home updir search buffer tools proc ftp brute sec sql self remo
1 |0.86%| how to restore using !c99memory v. 1.0 pre-release build #16!
1 |0.86%| intext:c99memory v. 1.0
1 |0.86%| intext:safe-mode: off (not secure)
1 |0.86%| intext:safe-mode: off (not secure) tooling
1 |0.86%| inurl:act=sql
1 |0.86%| name asc. size · modify · owner/group · perms action
1 |0.86%| php safe-mode drwxrwxrwx
1 |0.86%| php4 timezone database
1 |0.86%| powered by captain crunch security team drwxrwxrwx
1 |0.86%| powered by captain crunch security team | http://ccteam.ru
1 |0.86%| safe mode: off ( not secure )
1 |0.86%| safe mode: off (not secure)
1 |0.86%| safe-mode: off (not secure) / tmp/ drwxrwxrwx
1 |0.86%| safe-mode: off (not secure) site:pt
1 |0.86%| shell powered by captain crunch security team
1 |0.86%| site:www.astro.mat.uc.pt basel
1 |0.86%| uid= gid= groups= sql uname -a
1 |0.86%| uid=99 ( nobody ) gid=99 ( nobody )
1 |0.86%| uid=99(nobody) gid=99(nobody) groups=99(nobody)safe-mode: off
6 7.32% locus7shell
4 4.88% shell
3 3.66% kuwait hacker
3 3.66% php safe-mode bypass (list directories):
3 3.66% safe-mode: off (not secure)
3 3.66% safe-mode: off (not secure) drwxrwxrwx c99shell
3 3.66% startpar -f
2 2.44% hs_kuwait.php
2 2.44% lejeune interpolate
2 2.44% name asc. size · modify · owner/group · perms action
2 2.44% shell c99 ccteam.r
1 1.22% .phpact=f shell
1 1.22% 00007458 zip
1 1.22% allintitle: \locus7shell\
1 1.22% allintitle: c99memoryl
1 1.22% allinurl:upload3.php
1 1.22% astro acrobat
1 1.22% basel stellar library
1 1.22% c99memory
1 1.22% c99memoryl
1 1.22% c99shell v. 1.0 pre-release build #16
1 1.22% class-efem
1 1.22% efemerides del 22 de abril
1 1.22% encoder bind proc. ftp brute sec. sql php-
1 1.22% encoder bind proc. ftp brute sec. sql php-code feedback
1 1.22% encoder bind proc. ftp brute sec. sql php-code update feedback
1 1.22% encoder tools proc. ftp brute sec. sql php-code update feedback
1 1.22% filetype:php shell
1 1.22% foreach (array(sortsql_sort) as $v)
1 1.22% i.s.s.w team ...
1 1.22% intitle:locus7shell
1 1.22% inurl:ftpquickbrute
1 1.22% inurl:php drwxrwxr-x ftp brute sql
1 1.22% lejeune interpolation
1 1.22% lejuene interpolate
1 1.22% lmgrd_start 47
1 1.22% mysqld usage of cpu suse httpd2-prefork
1 1.22% php echo getenv
1 1.22% php4 “registered stream socket transports�?
1 1.22% powered by captain crunch filetype:php
1 1.22% powered by captain crunch security team drwxrwxrwx
1 1.22% safe-mode:
1 1.22% select action/file-type:
1 1.22% software make dir upload file safe-mode
1 1.22% uid=30(wwwrun) gid=8(www)
1 1.22% "uname -a","uid=","drwxr-xr-x","r57shell"
LOCUS7 SHELL
locus7shell
intitle:locus7shell
locus7shell filetype:php
locus7shell uname
allintitle: locus7shell
- locus7shell
intitle:- locus7shell
x2300 locus7shell
--[ x2300 locus7shell v. 1.0a beta modded by #!physx^ |
allintitle:- locus7shell
intitle: - locus7shell
safe-mode: off (not secure)
locus7shell 2008
shell x2300 locus7shell
.br - locus7shell
.us/images/0/588/mo_656_656.swf
allintext:--[ x2300 locus7shell v. modded by #!physx^
allintitle: - locus7shell
allintitle: locus7shell ext:php
allintitle:locus7shell
allintitle:locus7shell filetype:php
free locus7shell
ftp brute sec. sql php-code
inurl:act=sql
locus7s off secure
locus7s shell
ocus7shell apache
locus7shell edition 2008
locus7shell filetype: 'php'
locus7shell index:php
locus7shell linux 2008
locus7shell modified
php safe-mode bypass (list directories):
safe-mode: off (not secure) drwxrwxrwx locus7shell
%%% locus7shell
- locus7shell windows
--[ x2300 locus7shell v. 1.0a beta modded by #!physx^ | www.loc
--[ x2300 locus7shell v. modded by #!physx^ | www.locus7s.com |
--[ x2300 locus7shell v.1.0a beta modded by #!physx^ | www.locu
/locus7shell/
[enumerate] [encoder] [tools] [proc.] [ftp brute] [sec.] [sql]
allintext: locus7shell v. 1.0a beta
allintext:�?safe-mode: off (not secure)�?
allintitle: \locus7shell\
allinurl: .phpact=ls
apache aix aixthread_scope
ar ba locus7shell
basel
basel 3.1 library
basel interpolation
basel interpolation engine
basel spectra
c99memoryl
encoder bind proc. ftp brute sec. sql php-code feedback self re
filetype locus7shell
interpolation engine
intext:'' safe-mode:off (not secure)''
intitle:- locus7shell'
intitle:c99memoryl inurl:.php
intitle:locus7shell by filetype:php
intitle:locus7shell drwxr-xr-x
inurl:.phpact=ls
inurl:act intext:full hexdump
license.dat idl server bypass
GB Xmlrpc Curl Drwxr; GB x IP WSO; Uname User PHP HDD WSO..
locus7s uname
ocus7shell 2.0
locus7shell [file on secure ok ] drwxrwxrwx
locus7shell intext:x2300 intext:milw0rm.it enumerate uname
locus7shell inurl:php
locus7shell linux
locus7shell linux 2006
locus7shell safe-mode: off (not secure) drwxrwxrwx
locus7shell self remove drwxrwxrwx
locus7shell v. 1.0
locus7shell windows 2008
locus7shell-
make dir make file ok read files locus7shell
modded locus7shell
php safe-mode bypass (list directories)
php safe-mode bypass (read file)
php safe-mode bypass (read files)
safe-mode: apache uname -a: linux filetype:php
safe-mode: off (not secure) locus7shell
safe_mode: off drwxr-xr-x locus7shell
software: safe-mode: off (not secure) your ip: - server ip: [ft
suhosin 5.1.2
sybase aixthread_scope
uploads/ drwxrwxrwx
warning kernel may be alerted using higher levels safe mode
x2300 locus7shell download
x2300 locus7shell modified by #!physx^
x2300 locus7shell v. 1.0a
x2300 locus7shell v. 1.0a beta
FTP password:
intitle:"index of" spwd.db passwd -pam.conf
filetype:bak inurl:"htaccess\passwd\shadow\htusers
filetype:inc dbconn
filetype:inc intext:mysql_connect
filetype:properties inurl:db intext:password
inurl:vtund.conf intext:pass -cvs
inurl:"wvdial.conf" intext:"password"
filetype:mdb wwforum
"AutoCreate:=TRUE password=*"
filetype:pwl pwl
filetype:reg reg +intext:"defaultusername" intext:"defaultpassword"
filetype:ref ref+intext:"internet account manager"
"index of/" "ws_ftp.ini" "parent directory"
filetype:ini ws_ftp pwd
inurl:/wwwboard
inurl:r57.php [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ]
[ delete ]
"r57shell 1.4"
"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]"
inurl:b374k.php
inurl:c99.php
inurl:c100.php Generation time:
inurl:itsecteam_shell.php
inurl:"c99.php" inurl:c99.php inurl:c99.php inurl:c99.php allinurl:c99.php
inurl:"c99.php" inurl:c99.php intitle:c99shell uname c99shell v.1.0 (roots)
inurl:/c99.php allinurl:.c99.php allinurl:.c99.php intitle:C99Shell
allintitle:"C99Shell" allintitle:"C99Shell" c99.php ccteam.ru c99.php
intext:c99shell inurl:c99.php
!C99Shell v. 1.0 pre-release build #16!
intitle:c99shell filetype:php
inurl:c99.php
inurl:"/c99.php"
allinurl:c99.php
c99shell v. 1.0 pre-release build #5
"inurl:c99.php" + "intext:safe"
--[ c99shell v. 1.0 pre-release build #12 powered by Captain Crunch Security Team
c99.php download
intitle:r57shell | intitle:c99shell +uname
inurl:minimail c99
!C99Shell v. 1.0 pre-release build # +php -htm -html -shtml
allintitle: c99shell filetype:php
inurl:c99.php uid=0(root)
inurl:c99.php
inurl:/files/c99.php
intitle:c99shell safe-mode:OFF
c99.php "uid=0"
safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php uid=0(root)
allintitle: "c99shell"
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
c99. PHP-code Feedback Self remove
c99shell filetype:php -echo
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell +filetype:php
intitle:C99Shell v. 1.0 pre-release +uname
!C99Shell v. 1.0 pre-release build #5!
inurl:"c99.php"
C99Shell v. 1.0 pre-release build #16!
c99shell v. 1.0 pre-release build #16
intitle:c99shell intext:uname
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
intitle:c99shell uname -bbpress
B64 PHP Shell � The Defaced - Created by Kr3w
intitle:madspot team shell
inurl:".php?act=exploits"
inurl:".php?act=tools"
inurl:".php?act=encoder"
inurl:".php?act=proxy"
inurl:".php?act=shbd"
inurl:".php?act=fsbuff"
inurl:".php?act=rip"
inurl:".php?act=update"
inurl:".php?act=cmd="
!C2007Shell v. 1.0 pre-release build #16!
-[ c2007shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r| Adora
Security Pwnz j00! |
inurl:.php �cURL: ON MySQL: ON MSSQL: OFF�
�Shell� filetype:php intext:�uname -a:� �EDT 2010?
intitle:�intitle:r57shell� [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ]
[ tmp ] [ delete ]
inurl:�c99.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
inurl:�c100.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update
Feedback Self remove Logout
intitle:�Shell� inurl:�.php� & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-
code Update
c99shell [file on secure ok ]
/public_html/www/
Ayyildiz Tim -AYT- Shell v 2.1 Biz.php
ELMALISEKER Backd00r
Backdoor.PHP.Agent.php
Fx29Sh.3.2.12.08.php
KAdot Universal Shell v0.1.6.php
GFS web-shell ver 3.1.7 - PRiV8.php
GNY.Shell.v1.1.php
Liz0ziM Private Safe Mode Co...xecuriton Bypass Exploit.php
Moroccan Spamers Ma-EditioN By GhOsT.php
MySQL Web Interface Version 0.8.php
Macker's Private PHPShell.php
NCC-Shell.php
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php
NetworkFileManagerPHP.php
PHPSPY.php
PHPRemoteView.php
PHPJackal.php
PHANTASMA.php
Private-i3lue.php
PH Vayv.php
RedhatC99 [login=redhat-pass=root].php
Safe0ver Shell -Safe Mod Bypass By Evilc0der.php
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php
Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.php
Safe mode breaker.php
SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php
aZRaiLPhp v1.0.php
WinX Shell.php
Sst-Sheller.php
SnIpEr_SA Shell.php
SimShell 1.0 - Simorgh Security MGZ.php
arabicspy.php
bdotw44shell.php
backupsql.php
c99-shadows-mod.php
c99_PSych0.php
c99_w4cking.php
c99_w4cking.php
c100 v. 777shell v. Undetect...#18a Modded by 777 - Don.php
cbfphpsh.php
c993.phpc993.php
connect-back.php.php
cpg_143_incl_xpl.php
dC3 Security Crew Shell PRiV.php
dC3.Security.Crew.Shell.priv8.php
egy.php
erne.php
ex0shell.php
g00nshell-v1.3.php
g00nv13.php
gfs_sh.php
h4ntu shell [powered by tsoi].php
hkrkoz.php
iMHaPFtp.php
ironshell.php
isko.php
itsecteam.v2.1.php
itsecteam_shell.php
knullsh.php
kolang-bypass.php
kral.php
lamashell.php
load_shell.php
lolipop.php
lostDC.php
mysqlwebsh.php
nstview.php
nst.php
nshell.php
newsh.php
pHpINJ.php
php-include-w-shell.php
phpjackal1.3.php
priv8-2012-bypass-shell.php
r57.mod-bizzz.shell.php
r57.1.4.0.php
pws.php
r57_Mohajer22.php
r57_iFX.php
r57_kartal.php
r57shell1.40.php
r57shell2.0.php
r57142.php
remview_fix.php
ru24_post_sh.php
s72 Shell v1.1 Coding.php
safe0ver.php
shellzx.php
simple-backdoor.php
simple_cmd.php
sniper.php
soldierofallah.php
sosyete.php
spygrup.php
ugdevil.v2.0.php
wso.v2.5.php
wso2.5.php
wso2.php
x0rg.byp4ss.php
zacosmall.php
..................................................................................
1-Footholds
*Google search: intitle:"WSO 2.4" [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [
Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove
Submited: 2014-01-03
Change dir: Make dir: [ Writeable ] Read file: Make file: [ Writeable ] Search for
hash: Upload file: [ Writeable ] Safe-Mode bypass (read file): Safe-Mode bypass
(dir list):
*Google search: intitle:"=[ 1n73ct10n privat shell ]="
Submited: 2014-01-03
*Google search: filetype:php intext:"!C99Shell v. 1.0 beta"
Submited: 2013-11-25
*Google search: intitle:"uploader by ghost-dz" ext:php
Submited: 2013-11-25
*Google search: inurl:1337w0rm.php intitle:1337w0rm
Submited: 2013-08-08
*Google search: Re: inurl:"r00t.php"
Submited: 2012-11-02
GB X IP WSO
*Google search: intitle:C0ded By web.sniper
Submited: 2012-11-02
*Google search: Re: intitle:Priv8 SCR
Submited: 2012-11-02
*Google search: inurl:"amfphp/browser/servicebrowser.swf"
Submited: 2011-09-26
*Google search: allintext:"fs-admin.php"
Submited: 2011-01-09
*Google search: (intitle:"SHOUTcast Administrator")|(intext:"U SHOUTcast D.N.A.S.
Status")
Submited: 2006-05-03
*Google search: (intitle:"WordPress › Setup Configuration File")|
(inurl:"setup-config.php?step=")
Submited: 2006-03-15
*Google search:"index of /" ( upload.cfm | upload.asp | upload.php | upload.cgi |
upload.jsp | upload.pl )
Submited: 2006-03-06
*Google search: "Please re-enter your password It must match exactly"
Submited: 2006-02-08
*Google search: inurl:"tmtrack.dll?"
Submited: 2006-01-04
*Google search: inurl:polly/CP
Submited: 2005-10-06
*Google search: intitle:"net2ftp" "powered by net2ftp" inurl:ftp OR intext:login OR
inurl:login
Submited: 2005-09-25
*Google search: intitle:MyShell 1.1.0 build 20010923
Submited: 2005-08-15
*Google search: intitle:"YALA: Yet Another LDAP Administrator"
Submited: 2005-05-02
*Google search: intitle:"ERROR: The requested URL could not be retrieved" "While
trying to retrieve the URL" "The following error was encountered:"
Submited: 2005-04-27
*Google search: intitle:"PHP Shell *" "Enable stderr" filetype:php
Submited: 2004-07-12
*Google search: "adding new user" inurl:addnewuser -"there are no domains"
Submited: 2004-07-20
*Google search: intitle:"Web Data Administrator - Login"
Submited: 2004-10-05
2-Files containing usernames
*Google search:intext:"root:x:0:0:root:/root:/bin/bash" inurl:*=/etc/passwd
Submited: 2013-04-22
*Google search:inurl:"/root/etc/passwd" intext:"home/*:"
Submited: 2013-04-22
*Google search: site:extremetracking.com inurl:"login="
Submited: 2006-07-31
*Google search:intext:"SteamUserPassphrase=" intext:"SteamAppUser=" -"username"
-"user"
Submited: 2005-06-05
3- Vulnerable Servers
Google search: inurl:"/reports/rwservlet" intext:"Oracle"
Submited: 2014-02-05
Google search: inurl:"struts" filetype:action
Submited: 2013-11-25
Google search: inurl:.php? intext:CHARACTER_SETS,COLLATIONS, ?intitle:phpmyadmin
Submited: 2013-08-08
Google search: inurl:/wp-content/w3tc/dbcache/
Submited: 2012-12-31
Google search: intext:SQL syntax & inurl:index.php?=id & inurl:gov & inurl:gov
Submited: 2012-12-31
Google search: intext: intext: intext: intext: intext:
Submited: 2012-08-21
Google search: intitle:awen+intitle:asp.net
Submited: 2012-05-15
Google search: intitle:"-N3t" filetype:php undetectable
Submited: 2012-05-15
Google search: inurl:.php intitle:- BOFF 1.0 intext:[ Sec. Info ]
Submited: 2011-12-23
Google search: filetype:php inurl:tiki-index.php +sirius +1.9.*
Submited: 2011-11-25
Google search: filetype:php inanchor:c99 inurl:c99 intitle:c99shell -seeds -
marijuana
Submited: 2011-11-24
Google search: inurl:php intitle:"Cpanel , FTP CraCkeR"
Submited: 2011-11-19
Google search: intitle:#k4raeL - sh3LL
Submited: 2011-10-11
Google search: inurl:view.php?board1_sn=
Submited: 2011-09-26
Google search: intitle:m1n1 1.01
Submited: 2011-07-26
Google search: intitle:Locus7shell intext:"Software:"
Submited: 2011-05-03
Google search: intitle:"[EasyPHP] - Administration"
Submited: 2011-03-23
Google search: MySQL: ON MSSQL: OFF Oracle: OFF MSSQL: OFF PostgreSQL: OFF cURL: ON
WGet: ON Fetch: OFF Perl: ON
Submited: 2011-02-24
Google search: intitle:cyber anarchy shell
Submited: 2011-02-24
Google search: inurl:/vb/install/upgrade.php
Submited: 2010-12-10
Google search: "[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ]
[ delete ]"
Submited: 2010-12-07
Google search: "www.*.com - c99shell" OR "www.*.net - c99shell" OR "www.*.org -
c99shell"
Submited: 2010-12-08
Google search: "r57shell 1.4"
Submited: 2010-12-07
Google search: "safe_mode: * PHP version: * cURL: * MySQL: * MSSQL: * PostgreSQL: *
Oracle: *"
Submited: 2010-12-07
Google search: "you can now password" | "this is a special page only seen by you.
your profile visitors" inurl:imchaos
Submited: 2005-09-15
4-Vulnerable Files
Google search :-site:simplemachines.org "These are the paths and URLs to your SMF
installation"
Submited: 2013-09-24
Google search: allinurl:forcedownload.php?file=
Submited: 2011-08-25
Google search: ionCube Loader Wizard information disclosure
Submited: 2011-05-28
Google search: vBulletin Install Page Detection
Submited: 2011-05-27
Google search: inurl:"simplenews/admin"
Submited: 2006-09-13
Google search: inurl:updown.php | intext:"Powered by PHP Uploader Downloader"
Submited: 2006-02-28
5-Error Messages
Google search: "[function.getimagesize]: failed to open stream: No such file or
directory in"
Submited: 2014-02-05
Google search: intext:"Access denied for" intitle:"Shopping cart"
Submited: 2014-02-05
Google search: inurl:advsearch.php?module= & intext:sql syntax
Submited: 2013-04-09
Google search: intext:"Fatal error: Class 'Red_Action' not found in"
Submited: 2012-12-06
Google search: "CHARACTER_SETS" "COLLATION_CHARACTER_SET_APPLICABILITY"
Submited: 2012-08-21
Google search: inurl:"*.php?*=*.php" intext:"Warning: include" -inurl:.html -
site:"php.net" -site:"stackoverflow.com"-inurl:"*forums*"
Submited: 2012-05-15
Google search: inurl:"index.php?m=content+c=rss+catid=10"
Submited: 2011-01-21
Google search: "plugins/wp-db-backup/wp-db-backup.php"
Submited: 2010-12-08
Google search: allintext:"fs-admin.php"
Submited: 2010-11-11
6-Files containing passwords
Google search: "automatic teller" "operator manual" "password" filetype:pdf
Submited: 2014-09-15
Google search: inurl:ws_ftp.ini "[WS_FTP]" filetype:ini
Submited: 2014-08-21
Google search: xamppdirpasswd.txt filetype:txt
Submited: 2014-04-28
Google search: inurl:typo3conf/localconf.php
Submited: 2014-04-07
Google search: inurl:/backup intitle:index of backup intext:*sql
Submited: 2014-03-31
Google search: filetype:password jmxremote
Submited: 2013-11-25
Google search: ext:sql intext:@gmail.com intext:password
Submited: 2013-11-25
Google search: "BEGIN RSA PRIVATE KEY" filetype:key -github
Submited: 2013-09-24
Google search: filetype:sql insite:pass && user
Submited: 2013-04-22
Google search: ext:sql intext:@hotmail.com intext :password
Submited: 2013-04-09
Google search: filetype:config inurl:web.config inurl:ftp
Submited: 2013-04-09
Google search: allinurl:"User_info/auth_user_file.txt"
Submited: 2012-11-05
Google search: inurl:"/dbman/default.pass"
Submited: 2012-11-02
Google search: filetype:xls "username | password"
Submited: 2012-11-02
...................................................................................
...................................................................................
..........
"# shell Gaza Hacker Team version (2)"
"--[ Shell CGI | Perl V1.0 ]--"
"--[ Storm7Shell v1.3.37, coded by sToRm ]--"
".: No System is Perfectly Safe :."
".:[ irc.rosebanditz.us | Generated: seconds ]:."
"127.0.0.1/version.php?version=131 (port 80)"
":: g00nshell v1.3 final ::"
"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ syslog ] [ resolv ] [ hosts
] [ shadow ] [ passwd ] [ tmp ] [ delete ]"
"[ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ brute ] [ ln -s
all ] [ tmp ] [ deface vbb ]"
"[ STUNSHELL #unknown @ ByroeNet ]"
"[Err0R ] [Home] [Execute Command] [Evaluate PHP] [MySQL Query] [Chmod
File ] [PHPinfo ] [md5 cracker] [Show headers ] [Log out ]"
"[Fx29Sh] [psyBNC] [Eggdrop]"
"[Home] [Back] [Forward] [Up] [Refresh] [Search] [Buffer]"
"[Main] [Forum Defacer] [Email Spammer] [About] [Logout] [SuiCide]"
"[PHP-Tools] [Cpanel Finder] [Install IP:Port Proxy] [Install PHP
Proxy] [Install RFI/LFI Scanner] [Mass Code Injection] [Find WR
dir`s]"
"Coded by Amin Shokohi (Pejvak)"
"Copyright (C) 2000-2010 SadrazaM All Rights Reserved."
"Copyright 2004-Simorgh Security"
"edited by h4cker.tr"
"Executed command: ls -lia"
"File Manager - Current disk free"
"File Upload by Encodable''
"Galaxy2.03"
"h1kt0s4 shell"
"Hacked by Vrs-hCk - c0li.m0de.0n"
"Home - Back - phpinfo - CMD - All Coder - Htaccess - Symlink - Read -
Mail - PhpEval - Sql-read - ChmoD - Info&GR33tz"
"ipays - exploit"
"Jalankan Perintah: safe_dir"
"kaMtiEz r57 PaneL"
"Komut Sonu�lar1:"
"Komut Uygula: ls -lia"
"MagicCoder | Version X70.01"
"MFTeaM By FakoMast3r"
"PhpSpy Ver: 2010"
"R57 Shell Cracker by Group XP"
"r57shell 1.4"
"RootShell Security Group"
"Rootshell v2.0.0 ? 2006 by SR-Crew
"Safe0ver By Evilc0der.com - Bet@ Versiyon - 7 Subat 2007"
"safe_mode: * PHP version: * cURL: * MySQL: * MSSQL: *
PostgreSQL: * Oracle: *"
"SyRiAn Sh3ll"
"Upload Ur Shell Or Ur Mailer ;)"
"Upload Your Fav Shell or :D"
"Uploader by ./BaghazzNugraha"
"Usage: nc -vv -l"
"User massdefacer Cod3d by"
"valdez- globalnet"
"WebRooT Hack Tools"
"www.* .com - c99shell" OR "www.* .net - c99shell" OR "www.* .org - c99shell"
"ZaraByte File Uploader"
# Domains & Users Karar alShaMi t00l
#r57 shell 1.50 Edited by Kaptan
--== www.h4ckcity.org Sheller Version: 1.02 Coded By LocalMan & 2MzRp
Spc Thx :Mikili,Mehdi.H4ckCity,Ne0.limpizik ,r3dm0v3 ==--
--[ c999shell v.1.0 pre-release build #16 Modded by Shadow & Preddy |
RootShell Security Group ]--
[Home] [Back] [Forward] [UPDIR] [Refresh] [Search] [Buffer] [Encoder]
[Tools] [Proc.] [FTP brute] [Sec.] [SQL] [PHP-code] [Self remove]
[Logout]
[PHP-Tools] [Cpanel Finder] [Install PHP Proxy] [Install RFI/LFI
Scanner] [Mass Code Injection]
b374k "1923Turk-Grup"
Coded By: Mr.Amir-Masoud [ Iranian HackerZ ]
Encoder Tools Proc . FTP brute Sec . SQL PHP- code Update Feedback
Self remove Logout
explore shell eval mysql phpinfo netsploit upload mail
index of /cgirun
intext:"c99madshell v.3.0 BLOG edition EDITED BY MADNET"
intext:"change.php : Script to change the data for admin" title:"change.php"
intext:"HMBr57 1.41"
intext:"~~Joomla1.txt" title:"Index of /"
intext:Safe-mode:OFF (not secure)
intext:v4 Shell version 1.00 | h4ckz.net |
intitle:b374k m1n1 1.01
intitle:cyber anarchy shell
intitle:Locus7Shell [Enumerate] [Encoder] [Tools] [Proc.] [FTP Brute]
[Sec.] [SQL] [PHP-Code] [Backdoor Host] [Back-Connection] [milw0rm
it!] [PHP-Proxy] [Self remove]
inurl:/cgiweb/web.root
inurl:/cgiweb/web.root title:"web.root"
MySQL : ON MSSQL : OFF Oracle: OFF MSSQL : OFF PostgreSQL: ON cURL :
ON WGet: ON Fetch: OFF Perl: ON
o---[ ly0kha Shell | VBF gr0up | ly0kha@ yahoo.com | Sh3ll bypass
safemode ]---o
o---[ r57 Shell ]---o o---[ heroes1412 ]---o
priv8 cgi shell Connected to
TengkorakCrew C99 SHELL1.5 06.2008
Welcome to cgi-shell.py
Inurl:images/mma.php
intitle:o--{ UnKn0wN Shell }--o
intext:o--{ UnKn0wN Shell }--o
intitle:#k4raeL - sh3LL
R57shell - Developed by Navaro
HMBr57 Shell
h1kt0s4 shell
FuRty's Shell | Legend-H.ORG
V9F Shell
ly0kha shell
..:: TheSunOfVN ::..
thesunofvn.php
madspot.php
Group XP Shell - MiDepa.mx
Mr.TiGeR shell
[ phpinfo ] [ php.ini ] [ Cpu ] [ Memory ] [ Users ] [ Brute ] [ ln -s all ]
[ Tools ] [ Mass Code Injection ] [ tmp ]
Disable functions : NONE
Sql.safe_mode: OFF
safe_mode: OFF Open_Basedir: /var/www/
:: read file from vul ini_restore() ::
:: DeZender ::
----------XGroupVN----------
_____TheSunOfVN_____
Turbo Force By
Cpanel , FTP CraCkeR
Coded By Turk Gececi ( Global Hacker )
Home -- File Manager -- Command Execute -- Back Connect -- BypasS
Command eXecute(SF-DF) -- Symlink -- BypasS Directory -- Eval Php --
Data Base -- Convert -- Mail Boomber
Server Information -- Dos Local Server -- Backup Database -- Mass Deface
-- Download Remote File -- DDoS -- Find Writable Directory -- Server --
Remove Me -- About
Xgr0upVN ShElL
XgroupVnXgroupVn
o---[ Xgr0upVn.org - shell by RST/GHC | http://Xgr0upVn.org | H@ck+Cr@ck=Enj0y! |
Design by:AluCaR | ]---o
Login As (XgroupVn) Logout
Danger! Web-daemon crash possible.
o--[ heroes1412 ]--o
o--[ r57 ]--o
PHPJackal v1.9 - Powered By NetJackal
$$root_unknown.cgi$$
*-[ Unknown ]-*
Home | Command | GUI | Upload File | Download File | Back & Bind | Brute Forcer |
Check Log | Domains/Users | Logout | Help
0x0.php
0x00.php
w4ck.php
intitle:SQL CMD 3.0 | al-swisre
intext:WeB.Sniper
intitle: :: WeB.Sniper ::
intext: :::[email protected]:::
intitle: -=] fx0 [=-
intext: Turbo Force By Tryag
intext: Coded By Mr.Ejr4M
inurl:"mad.php" intext:"MADSPOT.NET"
inurl:"pak.php" intext:"madspot.net" / eval/ symlink
� Iron & RootShell Security Group
MySQL Web Interface By Number 7
TeaMp0isoN Private Build [ BETA ]
[ Coded By Mr.Ejr4M | [email protected] | www.Dz-devloper.net ]
By Mr.eJr4M EnCode
Coded By Karar aLShaMi
c991.php
Dev by AminOu Dz | [ ScripT Extracting Config !n Serv ~v� 2o12~ !! ]
Usage: Read File !n Sh311 => cat /etc/passwd
[ Dz Security & Dz Hacking !! ]
Dev by BriscO-Dz
By kasper-boy
intitle: c0ded By Dr.ahmed
c0nf!g ExtracT0r by ph!bEr 0pt!k [ pErl pr0gramM!nG LaNgUagE ]
[ th4nK t0 & DZ pr0gramMeR f0r 0riGinal pErl !! ]
Usage: Read File !n Sh311 => cat /etc/passwd
#Dev by DAMANE2011 | Extracting Config V1 2011 !!! Modif!ed | [ ScripT Extracting
Config 2011~ !! ]
[ Dz Security & Programming !! ]
Usage: Read File !n Sh311 => cat /etc/passwd
Dev by NEC | [ ScripT Extracting Config !n Serv ~v² 2o12~ !! ]
Dev by BriscO-Dz | [ ScripT Extracting Config !n Serv ~v� 2o12~ !! ]
Scr!pt Sh0w Doma!ns & Us3rs
Dev by Ev!LsCr!pT_Dz | [ ScripT Extracting Config !n Serv ~v� 2o12~ !! ]
[ Coded By Karar aLShaMi | Developed By The Sword + RAB3OUN ]
The Sword Config f**k Script
Arab Black Hat Config f**k Script
[ Coded By Karar aLShaMi | Developed By ViRuS_BaGhDaD | www.Arab-Blackhat.cc ]
:::: BY RAMZI NULL ::::
::SkaLFooLD:::
inurl:(shell.php | c99.php) Encoder Bind Proc. FTP brute Sec. SQL PHP-code Feedback
Self remove Logout
inu
rl:(shell.php | c99.php) intitle:c99shell Encoder Bind Proc. FTP brute Sec. SQL
PHP-code Feedback Self remove Logout
inurl:"c100.php" /images
intitle:"Madspot Security Team Shell" /images
inurl:"storm7shell.php" Safe Mode:OFF /images
................,..................................................................
.............................................................................
windows-1251 drwxrwxrwx [ home ]
c99 v0.0.1 SYN-MOD [SYNSTA] @www.
n3tshell v. emp3ror undetectable #18! filetype php
!C99madShell v. 2.1 madnet edition ADVANCED!
(intitle:k1r4 | intitle:N3t) uname
HMBr57 Shell
"c99madshell" drwxr-xr-x Wordpress Not Found! filetype:php
.com - N3t
!C99pRoShell v. X3 pRo edition!
Neil Jenner - Uploads
phpshell "Safe-mode: ON (secure)" ?---------
Rootshell v2.0.0 ? 2006 by SR-Crew
- Locus7Shell
"Powered by osCommerce" file_manager.php
"Shell" drwx- filetype:php
fatalisticz_fx fx29shell
"r57shell" drwx- filetype:php
"*- Antichat Shell" filetype:php
"Black PHP Shell" drwx- filetype:php
C100shell filetype:php
"Shellci.biz" ext:php
"uname -a","uid=","drwxr-xr-x","r57shell"
"uname -a","uid=","drwxrwxrwx","r57shell"
c99shell filetype:php -echo
safe-mode: off (not secure) drwxrwxrwx c99shell
"Eugen Shell" omg_1.php
c99shell [file on secure ok ]?
"easy-content filemanager" filetype:asp
- k1r4
com - Antichat Shell
"drwxr-xr-x","STNC WebShell v0.8"
Hacked By eL-CeWaD | drwxr-xr-x
"- phpshell" "Safe-mode: OFF (not secure)" filetype:php
!C99Shell v. 1.0 pre-release build # +php -htm -html -shtml
r57shell drwxrwxrwx ext:php
[email protected] `�.��.��`�.� AtlantiQ SheLL v0.0700 �.��`�.��.��
BraIn Inc� - PHPmailer By[
[email protected] ] Remix 2008
FaTaLisTiCz_Fx Fx29SheLL v2.0.09. filetype:php
"shell @" drwxrwxrwx filetype:php
w4ck1ng-shell (Private Build v0.3) filetype:php
phpshell drwxrwxrwx ext:php
c99shell drwxrwxrwx ext:php
locus7Shell drwxrwxrwx ext:php
Storm7Shell drwxrwxrwx ext:php
k1r4 drwxrwxrwx ext:php
Shellci.biz drwxrwxrwx ext:php
C99pRoshell drwxrwxrwx ext:php
/public_html/ drwxrwxrwx ext:php
webadmin drwxrwxrwx ext:php
/public_html/ Upload File : Name: Size: Permissions:
drwxr-xr-x: tmp--drwxr-xr-x: websitemap-- drwxr-xr-x.htaccess:
-=] fx0 [=- drwxrwxrwx ext:php
C99madshell drwxrwxrwx ext:php
SpYshell drwxrwxrwx ext:php
intitle:" - phpshell" drwxr-x--- filetype:php
N3tshell drwxrwxrwx ext:php
Cyber Anarchy Shell drwxrwxrwx ext:php
"/hsphere/local/home" drwxrwxrwx ext:php
islamicshell ext:php
DM Shell ext:php
- AA-66 BASED BY N3TSHELL
o--{ W.A.S Shell }--o drwxrwxrwx ext:php
- phpshell*software apache*=php
c99madshell*software apache*=php
k1r4*software apache*=php
N3t*software apache*=php
phpshell filetype:php
C99madshell public_html secure off drwxr-xr-x
SoQoR.NeT Shell
ly0kha shell
MOHAJER22
..// XcruzzmiX� >>>
[ � ] S E M P A K [ � ]
-=] fx0 [=-
valdez- globalnet
TengkorakCrew C99 SHELL1.5 06.2008
"webadmin.php - " filetype:php
Mr.HiTman c99SHeLL
HMBr57 Shell
[-Sy BanditZ SheLL-]
`�.��.��`�.� AtlantiQ SheLL v0.0700 �.��`�.��.��
*PHP Mailer* K. Script v0.6: PHPShell
Bhlynx. Script v2.1.5 * (Editing): PHPShell
"PHP File Manager" filetype:php
inanchor:c99shell filetype:php
intitle: r57shell filetype: php
intitle: c99shell filetype: php
intitle: c99madshell filetype: php
intitle: phpRemoteView filetype: php
RST/GHC filetype:php intitle:r57shell
inurl:filemanager/default.asp
intitle:r57shell +uname
(intitle:r57shell | intitle:c99shell) +uname
intitle:"r57Shell"
intitle:"C99Shell"
* Software: Apache. PHP/4.3.9. uname -a: Linux
* - N3t
com - k1r4
PHPKonsole filetype: php
PHPKonsole PHPShell filetype:php -echo Public PHP FileManagers
PHPJackal filetype: php
intitle:"PhpMyExplorer" inurl:"index"
inurl:"r57.php" +uname
RST/GHC filetype:php
intitle:"nst" filetype:php intitle:nst.void
"antichat" filetype:php
RST/GHC filetype:php http-shell by RST/GHC
PHPKonsole PHPShell filetype:php -echo
intitle:"nstview" filetype:php
intitle:r57shell +uname -bbpress
intitle:"c99shell" filetype:php
intitle:"PHP Shell *" "Enable stderr" filetype:php
intitle:r57shell +uname
inurl:c99.php
intitle:*.com - phpshell
r57shell 1.31
phpshell +uname
- Locus7Shell
Storm7Shell
SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend
C99madShell v. 2.0 madnet edition! uname -a: FreeBSD
~ 0x00 PHP shell v.0x2
Alucar Shell
c99.shell.php
hbtcasus.php
phpRemotevieW.php
PHPShellbyMacker.php
r57shell-1.3.php
r57shell-v1.24.php
c99shellbeta.php
kobra.php
phpshell.php
PHVayv.php
r57shell-v1.0.php
r57
...................................................................................
....
uid=99(nobody) gid=99(nobody) groups=99(nobody)safe-mode: off (
uid=99(nobody) gid=99(nobody) groups=99(nobody)
allinurl:fck_spellerpages/spellerpages/server-scripts/spellchec
''c99madshell'' soft mode''apache''
drwxr-x--- [ home ]File manager drwx--x--x x86_64 #1 SMP Upload file: (Writeable)
Choose File>>
2015 Safe Mode Drwxr XR X.enumerate] [encoder] [tools] [proc.] [ftp brute] [sec.]
[sql]- wso 2.4 ","drwxr-xr-x","c99madshellPublic HTML drwxrwxrwx 2016 C99madshell
PHP2013 drwxr-x--- safe mode r57shell rw rC99shell Off Oracle drwxrwxrwx
PHP2013:.de/c99madshell.phpN3tshell Drwxr XR X
IL Boff 1.0 RW R
GB Xmlrpc WSO Drwxr
C99shell UName bbPress Drwxr
Drwxr XR X C99shell
C99shell 4.0V Drwxr XR X
Boff 1.0 RW R
Safe SMP Boff RW R" filetype:php intext:"Safe-Mode: OFF"
2013 drwxr-x--- safe mode r57shell rw r
0.07% uname -auid=drwxr-xr-xc99shell
1 0.07% safe mode : off generation time drwxrwxrwx -c99shell
1 0.07% safe mode off drwxrwxrwx c99shell
1 0.07% safe-mode: off (not secure)
1 0.07% safe-mode: off (not secure) drwxrwxrwx c99shell.php
1 0.07% safemode perms drwxr
1 0.07% drwxr-xr-x safe mode on secure public_html c99shell
1 0.07% c99shell drwxr-xr-x uname safe mode secure off public_html
1 0.07% c99shell v. 1.0 beta
1 0.07% @drwxrwxrwx c99shell.php
1 0.07%
Execute command:
Execute!
Change directory:
List files!
Upload file: