🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/574486.klas4s23.mid-ica.nl/public_html/node_modules/.bin

📁 ..
📄 cssesc [view]
📄 cssesc.cmd [view]
📄 cssesc.ps1 [view]
📄 glob [view]
📄 glob.cmd [view]
📄 glob.ps1 [view]
📄 jiti [view]
📄 jiti.cmd [view]
📄 jiti.ps1 [view]
📄 mini-svg-data-uri [view]
📄 mini-svg-data-uri.cmd [view]
📄 mini-svg-data-uri.ps1 [view]
📄 nanoid [view]
📄 nanoid.cmd [view]
📄 nanoid.ps1 [view]
📄 node-which [view]
📄 node-which.cmd [view]
📄 node-which.ps1 [view]
📄 resolve [view]
📄 resolve.cmd [view]
📄 resolve.ps1 [view]
📄 sucrase [view]
📄 sucrase-node [view]
📄 sucrase-node.cmd [view]
📄 sucrase-node.ps1 [view]
📄 sucrase.cmd [view]
📄 sucrase.ps1 [view]
📄 tailwind [view]
📄 tailwind.cmd [view]
📄 tailwind.ps1 [view]
📄 tailwindcss [view]
📄 tailwindcss.cmd [view]
📄 tailwindcss.ps1 [view]
📄 yaml [view]
📄 yaml.cmd [view]
📄 yaml.ps1 [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!