Linux sothorn202 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 202.28.82.202 | : 216.73.216.9
pkexec version 0.105
Cant Read [ /etc/named.conf ]
iqtd
RED EYES BYPASS SHELL!
Terminal
Auto Root
Adminer
Backdoor Destroyer
Kernel Exploit
Lock Shell
Lock File
Create User
+ Create Folder
+ Create File
/
home /
wp900 /
culture /
wp-content /
themes /
astra /
[ HOME SHELL ]
NAME
SIZE
PERMISSION
ACTION
admin
[ DIR ]
drwxr-xr-x
assets
[ DIR ]
drwxr-xr-x
inc
[ DIR ]
drwxr-xr-x
languages
[ DIR ]
drwxr-xr-x
template-parts
[ DIR ]
drwxr-xr-x
404.php
693
B
-rw-r--r--
SECURITY.md
1.59
KB
-rw-r--r--
archive.php
735
B
-rw-r--r--
auth.json
97
B
-rw-r--r--
changelog.txt
145.23
KB
-rw-r--r--
comments.php
4.52
KB
-rw-r--r--
footer.php
619
B
-rw-r--r--
functions.php
8.42
KB
-rw-r--r--
header.php
1.46
KB
-rw-r--r--
index.php
913
B
-rw-r--r--
page.php
874
B
-rw-r--r--
readme.txt
5.85
KB
-rw-r--r--
screenshot.jpg
357.85
KB
-rw-r--r--
search.php
777
B
-rw-r--r--
searchform.php
2.08
KB
-rw-r--r--
sidebar.php
1006
B
-rw-r--r--
single.php
701
B
-rw-r--r--
style.css
4.44
KB
-rw-r--r--
theme.json
2.35
KB
-rw-r--r--
toolset-config.json
7.46
KB
-rw-r--r--
wpml-config.xml
5.11
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
# Security Policy Thank you for your interest in helping us improve the security of our open source products, websites and other properties. We have created this Bug Bounty program to appreciate and reward your efforts. ## Reporting a Vulnerability Please report (suspected) security vulnerabilities to **[support+security@bsf.io](mailto:support+security@bsf.io)**. You will receive a response from us within 48 hours. If the issue is confirmed, we will release a patch as soon as possible depending on complexity but historically within a few days. We have [a bug bounty program](https://brainstormforce.com/bug-bounty-program/) too which gives people guidelines on how a report should be reported and how we can reward them for proper reporting. If our team cannot reproduce and verify an issue, a bounty cannot be awarded. To help streamline our intake process, we ask that submissions include: - Description of the vulnerability - Steps to reproduce the reported vulnerability - Proof of exploitability (e.g. screenshot, video) - Perceived impact to another user or the organization - Proposed CVSSv3 Vector & Score (without environmental and temporal modifiers) - List of URLs and affected parameters - Other vulnerable URLs, additional payloads, Proof-of-Concept code - Browser, OS and/or app version used during testing - Impact of the bug Security reports should be sent to **[support+security@bsf.io](mailto:support+security@bsf.io)** For more details, please [visit this page](https://brainstormforce.com/bug-bounty-program/). Once again, thank you for helping us improve security. We really appreciate it.
Close