Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.137.142.253
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
ruby /
2.7.0 /
drb /
[ HOME SHELL ]
Name
Size
Permission
Action
acl.rb
4.61
KB
-rw-r--r--
drb.rb
57.63
KB
-rw-r--r--
eq.rb
275
B
-rw-r--r--
extserv.rb
836
B
-rw-r--r--
extservm.rb
1.75
KB
-rw-r--r--
gw.rb
3
KB
-rw-r--r--
invokemethod.rb
777
B
-rw-r--r--
observer.rb
667
B
-rw-r--r--
ssl.rb
11.54
KB
-rw-r--r--
timeridconv.rb
2.16
KB
-rw-r--r--
unix.rb
2.78
KB
-rw-r--r--
weakidconv.rb
1.12
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : invokemethod.rb
# frozen_string_literal: false # for ruby-1.8.0 module DRb # :nodoc: all class DRbServer module InvokeMethod18Mixin def block_yield(x) if x.size == 1 && x[0].class == Array x[0] = DRbArray.new(x[0]) end @block.call(*x) end def perform_with_block @obj.__send__(@msg_id, *@argv) do |*x| jump_error = nil begin block_value = block_yield(x) rescue LocalJumpError jump_error = $! end if jump_error case jump_error.reason when :break break(jump_error.exit_value) else raise jump_error end end block_value end end end end end
Close