Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.9
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect /
clean /
[ HOME SHELL ]
Name
Size
Permission
Action
base64.inject.unclassed
566
B
-rwxr-xr-x
gzbase64.inject.unclassed
594
B
-rwxr-xr-x
js.inject.VisitorTracker
566
B
-rwxr-xr-x
js.inject.fakejquery02
610
B
-rwxr-xr-x
php.brute.bf1lic
502
B
-rwxr-xr-x
php.inject.n1zb
482
B
-rwxr-xr-x
php.malware.magentocore_ccskim
656
B
-rwxr-xr-x
php_malware_hexinject
656
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : php.inject.n1zb
#!/usr/bin/env bash ## # Linux Malware Detect v2.0.1 # (C) 2002-2026, R-fx Networks <proj@rfxn.com> # (C) 2026, Ryan MacDonald <ryan@rfxn.com> # This program may be freely redistributed under the terms of the GNU GPL v2 ## export PATH=/sbin:/bin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin # $1 file path, $2 signature name, $3 file owner, $4 file mode, $5 file size (b), $6 file md5sum if [ -f "$1" ]; then sed -i -e 's/^<?php $.*=="));?>//' "$1" fi
Close