Windows NT IZOXMIX7871CBCZ 6.3 build 9600 (Windows Server 2012 R2 Datacenter Edition) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
: 172.23.17.241 | : 216.73.216.124
Cant Read [ /etc/named.conf ]
8.2.12
Administrator
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
[ C ]
C: /
Windows /
security /
[ HOME SHELL ]
Name
Size
Permission
Action
ApplicationId
[ DIR ]
drwxrwxrwx
audit
[ DIR ]
drwxrwxrwx
cap
[ DIR ]
drwxrwxrwx
database
[ DIR ]
drwxrwxrwx
logs
[ DIR ]
drwxrwxrwx
msscw
[ DIR ]
drwxrwxrwx
templates
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-rw-rw-
FirewallPolicy.xsd
17.54
KB
-rw-rw-rw-
KB.xsd
23.08
KB
-rw-rw-rw-
KBRegistration.xsd
1.87
KB
-rw-rw-rw-
KBRegistrationInfo.xsd
1.07
KB
-rw-rw-rw-
RuleResults.xsd
3.16
KB
-rw-rw-rw-
SMEFRules.xml
5.45
KB
-rw-rw-rw-
SampleMachineList.xml
484
B
-rw-rw-rw-
SecPol.xsd
2.97
KB
-rw-rw-rw-
SecReg.xsd
2.45
KB
-rw-rw-rw-
adminer.php
465.43
KB
-rw-rw-rw-
pwnkit
10.99
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SecPol.xsd
<?xml version="1.0" encoding="utf-8" ?> <xsd:schema elementFormDefault="qualified" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <!-- Top Level document element. this element contains the definition for the controls for the scan operation as well as the definition for the rules policies. It has one attribute "Version" that contains the policy version. currently accepted version is 1.0 --> <xsd:element name="SecurityPolicy"> <xsd:complexType> <xsd:sequence> <xsd:element name="Control" type="ControlType" minOccurs="0" maxOccurs="1" /> <xsd:element name="Rules" type="RulesType" minOccurs="1" maxOccurs="1" /> <xsd:any processContents="skip" minOccurs="0" maxOccurs="unbounded" /> </xsd:sequence> <xsd:attribute name="Version" type="xsd:string" use="required" /> </xsd:complexType> </xsd:element> <!-- This is the contol element. It contains definitions for the scan timeouts as well as the scan verbosity. --> <xsd:complexType name="ControlType"> <xsd:attribute name="TimeTillNewRule" type="xsd:nonNegativeInteger" use="optional"/> <xsd:attribute name="TimeTillRulesFinish" type="xsd:nonNegativeInteger" use="optional"/> <xsd:attribute name="MaxConcurrentRules" type="xsd:nonNegativeInteger" use="optional"/> <xsd:attribute name="Verbose" type="xsd:boolean" use="optional" /> </xsd:complexType> <!-- This is the Rules element. This elemement encapsulates the policies for the rules that are required to run. --> <xsd:complexType name="RulesType"> <xsd:sequence> <xsd:element name="Rule" type="RuleType" minOccurs="0" maxOccurs="unbounded" /> </xsd:sequence> </xsd:complexType> <!-- The Rule element states the Rule Name and the parameters for the Rule. --> <xsd:complexType name="RuleType"> <xsd:sequence> <xsd:element name="Parameters" type="ParametersType" minOccurs="0" maxOccurs="1" /> </xsd:sequence> <xsd:attribute name="Name" type="xsd:string" use="required" /> <xsd:attribute name="Version" type="xsd:string" use="required" /> <xsd:attribute name="OverrideSeverity" type="xsd:string" use="optional" /> <xsd:attribute name="Tag" type="xsd:string" use="optional"/> </xsd:complexType> <!-- The parameters for the rules are just an arbitrary data passed to the extension. This data nevertheless are going to be validated againes the extension supplied schema that defines its policy. --> <xsd:complexType name="ParametersType"> <xsd:sequence> <xsd:element name="Parameter" type="ParameterType" minOccurs="0" maxOccurs="unbounded" /> </xsd:sequence> </xsd:complexType> <xsd:complexType name="ParameterType" mixed="true"> <xsd:sequence> <xsd:any processContents="skip" minOccurs="0" maxOccurs="unbounded" /> </xsd:sequence> <xsd:attribute name="Order" type="xsd:string" use="required" /> </xsd:complexType> </xsd:schema>
Close