/
/
home
/
u523034047
/
domains
Server: in-mum-web1112.main-hosting.eu (62.72.28.111)
You: 216.73.216.4
PHP 8.3.16
Dir:
/home/u523034047/domains
Edit:
/home/u523034047/domains/remove_links.php
<?php // ==== Configuration ==== // Path to domains folder $baseDir = '/home/u523034047/domains'; // अपने सर्वर के path के अनुसार बदलें $linksToRemove = [ 'http://www.conference.iardo.com', 'https://www.handbagsaleus.com', 'https://replicachanel.us.com', 'https://www.replicawatchescanada.com/collections/rolex', 'https://www.replicawatchescanada.com', 'https://www.handbags.uk.com', 'https://www.watchesuk.uk.com', 'https://www.fakewatches.us', 'https://www.handbag.uk.com', 'https://www.rolexuk.to', 'https://demo.jfcombd.com', 'https://www.ukcheaphandbags.co.uk', 'https://www.canadagooseoutletus.com', 'https://pos.medrocroyalservices.com', 'https://gardenstennis-sw19.co.uk/outlet.html', 'https://delhiconference.com', 'http://www.iardo.com', 'https://www.qtienaillounge.com' ]; // Malicious PHP code patterns (जैसे zip:// require वाले) $phpMalwarePatterns = [ '/<\?php\s*\$zlj\s*=\s*[\'"]zip:\/\/[\'"].*?\?>/is', '/<\?php\s*require\s*\(?\s*[\'"].*?\.zip#.*?[\'"]\s*\)?;?\s*\?>/is' ]; // Extensions to scan $extensions = ['php', 'html', 'htm', 'js']; // Backup folder $backupDir = $baseDir . '/backup_links_scan_' . date('Ymd_His'); mkdir($backupDir, 0755, true); // Log file $logFile = $backupDir . '/removed_links_log.txt'; file_put_contents($logFile, "Scan started: " . date('Y-m-d H:i:s') . "\n"); // Function to recursively scan and remove links and malicious PHP function scanDirAndRemoveLinks($dir, $linksToRemove, $phpMalwarePatterns, $extensions, $backupDir, $logFile) { $files = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($dir)); foreach ($files as $file) { if ($file->isFile()) { $ext = pathinfo($file->getFilename(), PATHINFO_EXTENSION); if (in_array(strtolower($ext), $extensions)) { $filePath = $file->getPathname(); $content = file_get_contents($filePath); $originalContent = $content; // Remove <a href="malicious-link">...</a> foreach ($linksToRemove as $link) { $pattern = '/<a[^>]*href=["\']'.preg_quote($link, '/').'["\'][^>]*>.*?<\/a>/is'; $content = preg_replace($pattern, '', $content); } // Remove malicious PHP injections foreach ($phpMalwarePatterns as $pattern) { $content = preg_replace($pattern, '', $content); } if ($content !== $originalContent) { // Backup original file $relativePath = str_replace($dir, '', $filePath); $backupPath = $backupDir . $relativePath; $backupFolder = dirname($backupPath); if (!is_dir($backupFolder)) { mkdir($backupFolder, 0755, true); } copy($filePath, $backupPath); // Save modified content file_put_contents($filePath, $content); file_put_contents($logFile, "Cleaned: " . $filePath . "\n", FILE_APPEND); } } } } } // Run the scan for all domains inside baseDir $domains = array_filter(glob($baseDir . '/*'), 'is_dir'); foreach ($domains as $domainPath) { scanDirAndRemoveLinks($domainPath, $linksToRemove, $phpMalwarePatterns, $extensions, $backupDir, $logFile); } file_put_contents($logFile, "Scan completed: " . date('Y-m-d H:i:s') . "\n", FILE_APPEND); echo "Scan completed. Check log file at: $logFile\n"; echo "Backup of original files stored at: $backupDir\n"; ?>
Ukuran: 3.8 KB