🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/577325.klas4s23.mid-ica.nl/public_html/.git/objects

📁 ..
📁 00
📁 09
📁 0c
📁 12
📁 1a
📁 1d
📁 1e
📁 22
📁 27
📁 2f
📁 31
📁 32
📁 33
📁 34
📁 36
📁 40
📁 49
📁 4a
📁 4b
📁 4d
📁 4e
📁 56
📁 57
📁 59
📁 5b
📁 5f
📁 61
📁 69
📁 6a
📁 6c
📁 6d
📁 71
📁 74
📁 78
📁 79
📁 7b
📁 81
📁 82
📁 87
📁 89
📁 8b
📁 8d
📁 90
📁 94
📁 a0
📁 a1
📁 a9
📁 ac
📁 ad
📁 af
📁 b0
📁 c1
📁 c2
📁 c5
📁 c9
📁 cd
📁 d5
📁 d8
📁 d9
📁 de
📁 e0
📁 e1
📁 ed
📁 ee
📁 f0
📁 fa
📁 fb
📁 info
📁 pack

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!