Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.9
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
maldetect /
sigs.old /
[ HOME SHELL ]
Name
Size
Permission
Action
csig.dat
13.97
KB
-rw-------
custom.hex.dat
0
B
-rw-r--r--
custom.md5.dat
0
B
-rw-r--r--
hex.dat
501.66
KB
-rw-r--r--
maldet.sigs.ver
14
B
-rw-r--r--
md5.dat
2.46
MB
-rw-r--r--
md5v2.dat
2.68
MB
-rw-r--r--
rfxn.hdb
2.49
MB
-rw-r--r--
rfxn.ndb
510.61
KB
-rw-r--r--
rfxn.yara
1.34
KB
-rw-r--r--
rfxn.yara.bk
0
B
-rw-r--r--
rfxn.yara.patch
546
B
-rw-r--r--
sha256v2.dat
3.79
MB
-rw-------
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rfxn.yara
rule Backdoor_PHP_WPVCD_TempExecution { meta: description = "Backdoor script associated with WP-VCD." strings: $re = /extract\s*\(\s*wp_temp_setupx?\s*\(\s*\$\w+\s*\)\s*\)/ nocase condition: $re } rule Backdoor_PHP_WPVCD_DivCodeName { meta: description = "Backdoor script associated with WP-VCD" strings: $re = /\$div_code_name\s*\=\s*['"]wp_vcd['"];/ nocase condition: $re } rule Backdoor_PHP_WPVCD_Deployer { meta: description = "Deployment script associated with WP-VCD." strings: $re = /strpos\s*\(\s*\$\w{1,40}\s*,\s*['"]WP_V_CD['"]\s*\)\s*===\s*false/ nocase condition: $re } rule Spam_PHP_WPVCD_ContentInjection { meta: description = "Content injection script associated with WP-VCD." strings: $re = /\$ip\s*=\s*\@file_get_contents\s*\(\s*ABSPATH\s*\.\s*['"]wp\-includes\/wp\-feed\.php['"]/ nocase condition: $re } rule Suspicious_PHP_PrependedInclude { meta: description = "Suspicious PHP include often associated with WP-VCD." strings: $re = /^\<\?php\s+if\s*\(\s*file_exists\s*\(\s*dirname\s*\(\s*__FILE__\s*\)\s*\.\s*['"][^'"]+['"]\s*\)\s*\)\s*(include|require)(_once)?\s*\(\s*dirname\s*\(\s*__FILE__\s*\)\s*\.\s*['"][^'"]+['"]\s*\)\s*\;\s*\?\>\s*\<\?/ nocase condition: $re }
Close