Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 13.58.188.166
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
proc /
bus /
input /
[ HOME SHELL ]
Name
Size
Permission
Action
devices
0
B
-r--r--r--
handlers
0
B
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : devices
I: Bus=0019 Vendor=0000 Product=0001 Version=0000 N: Name="Power Button" P: Phys=LNXPWRBN/button/input0 S: Sysfs=/devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 U: Uniq= H: Handlers=kbd event0 B: PROP=0 B: EV=3 B: KEY=10000000000000 0 I: Bus=0011 Vendor=0001 Product=0001 Version=ab41 N: Name="AT Translated Set 2 keyboard" P: Phys=isa0060/serio0/input0 S: Sysfs=/devices/platform/i8042/serio0/input/input1 U: Uniq= H: Handlers=sysrq kbd leds event1 B: PROP=0 B: EV=120013 B: KEY=402000000 3803078f800d001 feffffdfffefffff fffffffffffffffe B: MSC=10 B: LED=7 I: Bus=0003 Vendor=0627 Product=0001 Version=0001 N: Name="QEMU QEMU USB Tablet" P: Phys=usb-0000:04:00.0-1/input0 S: Sysfs=/devices/pci0000:00/0000:00:02.3/0000:04:00.0/usb1/1-1/1-1:1.0/input/input2 U: Uniq=28754-0000:00:02.3:00.0-1 H: Handlers=mouse0 event2 js0 B: PROP=0 B: EV=1f B: KEY=70000 0 0 0 0 B: REL=100 B: ABS=3 B: MSC=10 I: Bus=0011 Vendor=0002 Product=0006 Version=0000 N: Name="ImExPS/2 Generic Explorer Mouse" P: Phys=isa0060/serio1/input0 S: Sysfs=/devices/platform/i8042/serio1/input/input3 U: Uniq= H: Handlers=mouse1 event3 B: PROP=1 B: EV=7 B: KEY=1f0000 0 0 0 0 B: REL=143 I: Bus=0010 Vendor=001f Product=0001 Version=0100 N: Name="PC Speaker" P: Phys=isa0061/input0 S: Sysfs=/devices/platform/pcspkr/input/input4 U: Uniq= H: Handlers=kbd event4 B: PROP=0 B: EV=40001 B: SND=6
Close