Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
var /
softaculous /
osclass /
[ HOME SHELL ]
Name
Size
Permission
Action
?;
images
[ DIR ]
drwxr-xr-x
?;
php53
[ DIR ]
drwxr-xr-x
?;
php56
[ DIR ]
drwxr-xr-x
?;
php71
[ DIR ]
drwxr-xr-x
Bcrypt.php
2.82
KB
-rw-r--r--
changelog.txt
1.42
KB
-rw-r--r--
clone.php
5.86
KB
-rw-r--r--
config.php
509
B
-rw-r--r--
edit.php
5.18
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
extend.php
11.84
KB
-rw-r--r--
fileindex.php
150
B
-rw-r--r--
import.php
3.45
KB
-rw-r--r--
info.xml
1.65
KB
-rw-r--r--
install.js
921
B
-rw-r--r--
install.php
5.74
KB
-rw-r--r--
install.xml
918
B
-rw-r--r--
md5
4.33
KB
-rw-r--r--
notes.txt
174
B
-rw-r--r--
robots.txt
34
B
-rw-r--r--
update_pass.php
595
B
-rw-r--r--
upgrade.php
4.31
KB
-rw-r--r--
upgrade.xml
328
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Bcrypt.php
<?php class Bcrypt { private $rounds; public function __construct($rounds = 12) { global $error; if(CRYPT_BLOWFISH != 1) { $error[] = "bcrypt not supported in this installation. See http://php.net/crypt"; } $this->rounds = $rounds; } public function hash($input) { $hash = crypt($input, $this->getSalt()); if(strlen($hash) > 13) return $hash; return false; } public function verify($input, $existingHash) { $hash = crypt($input, $existingHash); return $hash === $existingHash; } private function getSalt() { $salt = sprintf('$2a$%02d$', $this->rounds); $bytes = $this->getRandomBytes(16); $salt .= $this->encodeBytes($bytes); return $salt; } private $randomState; private function getRandomBytes($count) { $bytes = ''; if(function_exists('openssl_random_pseudo_bytes') && (strtoupper(substr(PHP_OS, 0, 3)) !== 'WIN')) { // OpenSSL slow on Win $bytes = openssl_random_pseudo_bytes($count); } if($bytes === '' && is_readable('/dev/urandom') && ($hRand = @fopen('/dev/urandom', 'rb')) !== FALSE) { $bytes = fread($hRand, $count); fclose($hRand); } if(strlen($bytes) < $count) { $bytes = ''; if($this->randomState === null) { $this->randomState = microtime(); if(function_exists('getmypid')) { $this->randomState .= getmypid(); } } for($i = 0; $i < $count; $i += 16) { $this->randomState = md5(microtime() . $this->randomState); if (PHP_VERSION >= '5') { $bytes .= md5($this->randomState, true); } else { $bytes .= pack('H*', md5($this->randomState)); } } $bytes = substr($bytes, 0, $count); } return $bytes; } private function encodeBytes($input) { // The following is code from the PHP Password Hashing Framework $itoa64 = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; $output = ''; $i = 0; do { $c1 = ord($input[$i++]); $output .= $itoa64[$c1 >> 2]; $c1 = ($c1 & 0x03) << 4; if ($i >= 16) { $output .= $itoa64[$c1]; break; } $c2 = ord($input[$i++]); $c1 |= $c2 >> 4; $output .= $itoa64[$c1]; $c1 = ($c2 & 0x0f) << 2; $c2 = ord($input[$i++]); $c1 |= $c2 >> 6; $output .= $itoa64[$c1]; $output .= $itoa64[$c2 & 0x3f]; } while (1); return $output; } } ?>
Close