Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.220.226.147
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
zurmo /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
upgrade
[ DIR ]
drwxr-xr-x
clone.php
6.21
KB
-rw-r--r--
debug.php
7.63
KB
-rw-r--r--
edit.php
5.67
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
extend.php
1.84
KB
-rw-r--r--
fileindex.php
49
B
-rw-r--r--
import.php
3.53
KB
-rw-r--r--
info.xml
3.42
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
9.66
KB
-rw-r--r--
install.xml
507
B
-rw-r--r--
md5
10.46
KB
-rw-r--r--
notes.txt
1.06
KB
-rw-r--r--
perInstance.php
3.86
KB
-rw-r--r--
update_pass.php
2.13
KB
-rw-r--r--
upgrade.php
9.48
KB
-rw-r--r--
upgrade.xml
388
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php $resp = crypt(md5('[[admin_pass]]'), __genSalt()); echo '<update_pass>'.$resp.'</update_pass>'; function __genSalt($input = null) { if (!$input) { $input = __getRandomBytes(16); } $_identifier = '2y'; if (version_compare(PHP_VERSION, '5.3.7', '<')) { $_identifier = '2a'; } $_iterationCountLog2 = 12; // Hash identifier $identifier = $_identifier; // Cost factor - "4" to "04" $costFactor = chr(ord('0') + $_iterationCountLog2 / 10); $costFactor .= chr(ord('0') + $_iterationCountLog2 % 10); // Salt string $salt = __encode64($input, 16); // $II$CC$SSSSSSSSSSSSSSSSSSSSSS return '$' . $identifier . '$' . $costFactor . '$' . $salt; } function __encode64($input, $count){ $output = ''; $i = 0; $_itoa64 = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; do { $c1 = ord($input[$i++]); $output .= $_itoa64[$c1 >> 2]; $c1 = ($c1 & 0x03) << 4; if ($i >= $count) { $output .= $_itoa64[$c1]; break; } $c2 = ord($input[$i++]); $c1 |= $c2 >> 4; $output .= $_itoa64[$c1]; $c1 = ($c2 & 0x0f) << 2; $c2 = ord($input[$i++]); $c1 |= $c2 >> 6; $output .= $_itoa64[$c1]; $output .= $_itoa64[$c2 & 0x3f]; } while (1); return $output; } function __getRandomBytes($count){ if (!is_int($count) || $count < 1) { //throw new InvalidArgumentException('Argument must be a positive integer'); } // Try OpenSSL's random generator if (function_exists('openssl_random_pseudo_bytes')) { $strongCrypto = false; $output = openssl_random_pseudo_bytes($count, $strongCrypto); if ($strongCrypto && strlen($output) == $count) { return $output; } } // Try reading from /dev/urandom, if present $output = ''; if (is_readable('/dev/urandom') && ($fh = fopen('/dev/urandom', 'rb'))) { $output = fread($fh, $count); fclose($fh); } // Fall back to a locally generated "random" string if (strlen($output) < $count) { $_randomState = microtime(); $output = ''; for ($i = 0; $i < $count; $i += 16) { $_randomState = md5(microtime() . $_randomState); $output .= md5($_randomState, true); } $output = substr($output, 0, $count); } return $output; } @unlink('update_pass.php'); ?>
Close