./Fake Root Shell

h:/root/home/zanssequicare-001/www/zanssht/casano/ [ drwxrwxrwx ]

System: Windows NT WIN5232 10.0 build 20348 (Windows Server 2016) AMD64
Software: Microsoft-IIS/10.0
PHP Version: 7.4.30 PHP Os: WINNT
Server IP: 205.144.171.232
Your IP: 18.119.107.36
User: zanssequicare-001 (0) | Group: ? (0)
Safe Mode: OFF
MYSQL: OFF | PERL: OFF | PYTHON: OFF | WGET: OFF | CURL: ON | GCC: OFF | PKEXEC: OFF
Disable Function:
exec,passthru,shell_exec,system,proc_open,popen,curl_multi_exec,show_source

Scan Root by shizuo
Command is Disabled!
Netfilter : Ptrace : Sequoia : OverlayFS : Dirtypipe : Sudo : Pwnkit : 
Name Type Last Edit Size Owner/Group Permission Action
..
fekrutrooting dir 2024-06-29 13:55 - 0/0 drwxrwxrwx
five dir 2024-06-26 11:14 - 0/0 drwxrwxrwx
for dir 2024-06-30 16:18 - 0/0 drwxrwxrwx
shizuorooting dir 2024-06-27 19:16 - 0/0 drwxrwxrwx
six dir 2024-06-26 11:20 - 0/0 drwxrwxrwx
adminer.php file 2024-06-25 13:21 0 B 0/0 -rw-rw-rw-
detect.php file 2024-06-27 13:45 32.91 KB 0/0 -rw-rw-rw-
maimuna.php file 2024-06-26 22:47 14.04 KB 0/0 -rw-rw-rw-

© Bengkulu Cyber Team | ./Fake Root