Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.21.241.17
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect.bk111626 /
clean /
[ HOME SHELL ]
Name
Size
Permission
Action
base64.inject.unclassed
339
B
-rwxr-xr-x
gzbase64.inject.unclassed
367
B
-rwxr-xr-x
js.inject.VisitorTracker
339
B
-rwxr-xr-x
js.inject.fakejquery02
375
B
-rwxr-xr-x
php.brute.bf1lic
275
B
-rwxr-xr-x
php.inject.n1zb
255
B
-rwxr-xr-x
php.malware.magentocore_ccskim
429
B
-rwxr-xr-x
php_malware_hexinject
429
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : js.inject.VisitorTracker
#!/usr/bin/env bash export PATH=/sbin:/bin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin # $1 file path, $2 signature name, $3 file owner, $4 file mode, $5 file size (b), $6 file md5sum if [ -f "$1" ]; then sed -i -e '/var visitortrackerin = setInterval(function(){/,/}\/\*visitorTracker\*\//d' -e '/\/\*visitorTracker\*\//d' "$1" fi
Close