IP Address: 80.252.133.24:443 You: 216.73.216.93
| |||||||||||||||||||
|
| ||||||||||||||||||
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON | |||||||||||||||||||
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, | |||||||||||||||||||
[ System Info ]
[ Processes ]
[ SQL Manager ]
[ Eval ]
[ Encoder ]
[ Mailer ]
[ Back Connection ]
[ Backdoor Server ]
[ Kernel Exploit Search ]
[ MD5 Decrypter ]
[ Reverse IP ]
[ Kill Shell ]
[ FTP Brute-Force ] |
|||||||||||||||||||
| |||||||||||||||||||
/ distr/ Shinobi/ tools/ - drwxr-xr-x |
Viewing file:
Select action/file-type: var selectedModule = process.argv[2] if(!selectedModule){ console.log('You must input arguments.') console.log('# node removeCustomAutoLoadModule.js <CUSTOM_AUTOLOAD_FILE_OR_FOLDER_NAME>') console.log('Example:') console.log('# node removeCustomAutoLoadModule.js ExtraBlocks') return } var exec = require('child_process').exec var request = require('request') var homeDirectory = __dirname + '/../' var customAutoLoadFolder = `${homeDirectory}libs/customAutoLoad/` var tempFolder = `${__dirname}/customAutoLoad` var deleteModule = function(myModule){ exec(`rm -rf ${customAutoLoadFolder}${myModule}`,function(){ console.log(`## Removing "${myModule}"`) }) } selectedModule.split(',').forEach(function(myModule){ deleteModule(myModule) }) |
Command: | |
Quick Commands: | |
Upload: | |
PHP Filesystem: |
<@ Ú |
Search File: | |
Create File: | |
View File: | |
Mass Defacement: |