Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.136.236.39
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
php /
81 /
src /
ext /
openssl /
[ HOME SHELL ]
Name
Size
Permission
Action
tests
[ DIR ]
drwxr-xr-x
CREDITS
77
B
-rw-r--r--
config.w32
330
B
-rw-r--r--
config0.m4
1.22
KB
-rw-r--r--
openssl.c
200.59
KB
-rw-r--r--
openssl.stub.php
11.14
KB
-rw-r--r--
openssl_arginfo.h
26.02
KB
-rw-r--r--
php_openssl.h
5.14
KB
-rw-r--r--
xp_ssl.c
75.95
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : config0.m4
PHP_ARG_WITH([openssl], [for OpenSSL support], [AS_HELP_STRING([--with-openssl], [Include OpenSSL support (requires OpenSSL >= 1.0.2)])]) PHP_ARG_WITH([kerberos], [for Kerberos support], [AS_HELP_STRING([--with-kerberos], [OPENSSL: Include Kerberos support])], [no], [no]) PHP_ARG_WITH([system-ciphers], [whether to use system default cipher list instead of hardcoded value], [AS_HELP_STRING([--with-system-ciphers], [OPENSSL: Use system default cipher list instead of hardcoded value])], [no], [no]) if test "$PHP_OPENSSL" != "no"; then PHP_NEW_EXTENSION(openssl, openssl.c xp_ssl.c, $ext_shared) PHP_SUBST(OPENSSL_SHARED_LIBADD) if test "$PHP_KERBEROS" != "no"; then PKG_CHECK_MODULES([KERBEROS], [krb5-gssapi krb5]) PHP_EVAL_INCLINE($KERBEROS_CFLAGS) PHP_EVAL_LIBLINE($KERBEROS_LIBS, OPENSSL_SHARED_LIBADD) fi PHP_SETUP_OPENSSL(OPENSSL_SHARED_LIBADD, [ AC_DEFINE(HAVE_OPENSSL_EXT,1,[ ]) ], [ AC_MSG_ERROR([OpenSSL check failed. Please check config.log for more information.]) ]) AC_CHECK_FUNCS([RAND_egd]) if test "$PHP_SYSTEM_CIPHERS" != "no"; then AC_DEFINE(USE_OPENSSL_SYSTEM_CIPHERS,1,[ Use system default cipher list instead of hardcoded value ]) fi fi
Close