Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.216.71.122
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
php /
82 /
src /
ext /
sysvmsg /
[ HOME SHELL ]
Name
Size
Permission
Action
tests
[ DIR ]
drwxr-xr-x
CREDITS
39
B
-rw-r--r--
config.m4
391
B
-rw-r--r--
php_sysvmsg.h
1.24
KB
-rw-r--r--
sysvmsg.c
12.06
KB
-rw-r--r--
sysvmsg.stub.php
994
B
-rw-r--r--
sysvmsg_arginfo.h
2.99
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sysvmsg.stub.php
<?php /** @generate-class-entries */ /** * @strict-properties * @not-serializable */ final class SysvMessageQueue { } function msg_get_queue(int $key, int $permissions = 0666): SysvMessageQueue|false {} /** * @param string|int|float|bool $message * @param int $error_code */ function msg_send(SysvMessageQueue $queue, int $message_type, $message, bool $serialize = true, bool $blocking = true, &$error_code = null): bool {} /** * @param int $received_message_type * @param int $error_code */ function msg_receive( SysvMessageQueue $queue, int $desired_message_type, &$received_message_type, int $max_message_size, mixed &$message, bool $unserialize = true, int $flags = 0, &$error_code = null ): bool {} function msg_remove_queue(SysvMessageQueue $queue): bool {} function msg_stat_queue(SysvMessageQueue $queue): array|false {} function msg_set_queue(SysvMessageQueue $queue, array $data): bool {} function msg_queue_exists(int $key): bool {}
Close