🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/577320.klas4s23.mid-ica.nl/public_html/node_modules/.bin

📁 ..
📄 acorn [view]
📄 acorn.cmd [view]
📄 acorn.ps1 [view]
📄 autoprefixer [view]
📄 autoprefixer.cmd [view]
📄 autoprefixer.ps1 [view]
📄 browserslist [view]
📄 browserslist.cmd [view]
📄 browserslist.ps1 [view]
📄 cssesc [view]
📄 cssesc.cmd [view]
📄 cssesc.ps1 [view]
📄 esbuild [view]
📄 esbuild.cmd [view]
📄 esbuild.ps1 [view]
📄 eslint [view]
📄 eslint.cmd [view]
📄 eslint.ps1 [view]
📄 glob [view]
📄 glob.cmd [view]
📄 glob.ps1 [view]
📄 jiti [view]
📄 jiti.cmd [view]
📄 jiti.ps1 [view]
📄 js-yaml [view]
📄 js-yaml.cmd [view]
📄 js-yaml.ps1 [view]
📄 jsesc [view]
📄 jsesc.cmd [view]
📄 jsesc.ps1 [view]
📄 json5 [view]
📄 json5.cmd [view]
📄 json5.ps1 [view]
📄 loose-envify [view]
📄 loose-envify.cmd [view]
📄 loose-envify.ps1 [view]
📄 nanoid [view]
📄 nanoid.cmd [view]
📄 nanoid.ps1 [view]
📄 node-which [view]
📄 node-which.cmd [view]
📄 node-which.ps1 [view]
📄 parser [view]
📄 parser.cmd [view]
📄 parser.ps1 [view]
📄 resolve [view]
📄 resolve.cmd [view]
📄 resolve.ps1 [view]
📄 rollup [view]
📄 rollup.cmd [view]
📄 rollup.ps1 [view]
📄 semver [view]
📄 semver.cmd [view]
📄 semver.ps1 [view]
📄 sucrase [view]
📄 sucrase-node [view]
📄 sucrase-node.cmd [view]
📄 sucrase-node.ps1 [view]
📄 sucrase.cmd [view]
📄 sucrase.ps1 [view]
📄 tailwind [view]
📄 tailwind.cmd [view]
📄 tailwind.ps1 [view]
📄 tailwindcss [view]
📄 tailwindcss.cmd [view]
📄 tailwindcss.ps1 [view]
📄 update-browserslist-db [view]
📄 update-browserslist-db.cmd [view]
📄 update-browserslist-db.ps1 [view]
📄 vite [view]
📄 vite.cmd [view]
📄 vite.ps1 [view]
📄 yaml [view]
📄 yaml.cmd [view]
📄 yaml.ps1 [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!