Linux eyewebsolution.dnshostserver.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
Apache
: 185.131.55.234 | : 216.73.216.36
674 Domain
5.6.40
omxrelocation
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect.bk19574 /
clean /
[ HOME SHELL ]
Name
Size
Permission
Action
base64.inject.unclassed
339
B
-rwxr-xr-x
gzbase64.inject.unclassed
367
B
-rwxr-xr-x
js.inject.VisitorTracker
339
B
-rwxr-xr-x
js.inject.fakejquery02
375
B
-rwxr-xr-x
php.brute.bf1lic
275
B
-rwxr-xr-x
php.inject.n1zb
255
B
-rwxr-xr-x
php.malware.magentocore_ccskim
429
B
-rwxr-xr-x
php_malware_hexinject
429
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : base64.inject.unclassed
#!/usr/bin/env bash export PATH=/sbin:/bin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin # $1 file path, $2 signature name, $3 file owner, $4 file mode, $5 file size (b), $6 file md5sum if [ -f "$1" ]; then sed -i -e 's/<?.*eval(base64_decode(.*?>//' -e 's/<?php.*eval(base64_decode(.*?>//' -e 's/eval(base64_decode([^;]*;//' "$1" fi
Close