🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/584701.klas4s23.mid-ica.nl/public_html/node_modules/gsap/types

📁 ..
📄 animation.d.ts [view]
📄 css-plugin.d.ts [view]
📄 css-rule-plugin.d.ts [view]
📄 custom-bounce.d.ts [view]
📄 custom-ease.d.ts [view]
📄 custom-wiggle.d.ts [view]
📄 draggable.d.ts [view]
📄 draw-svg-plugin.d.ts [view]
📄 ease.d.ts [view]
📄 easel-plugin.d.ts [view]
📄 flip.d.ts [view]
📄 gs-dev-tools.d.ts [view]
📄 gsap-core.d.ts [view]
📄 gsap-plugins.d.ts [view]
📄 gsap-utils.d.ts [view]
📄 index.d.ts [view]
📄 inertia-plugin.d.ts [view]
📄 morph-svg-plugin.d.ts [view]
📄 motion-path-helper.d.ts [view]
📄 motion-path-plugin.d.ts [view]
📄 observer.d.ts [view]
📄 physics-2d-plugin.d.ts [view]
📄 physics-props-plugin.d.ts [view]
📄 pixi-plugin.d.ts [view]
📄 scramble-text-plugin.d.ts [view]
📄 scroll-smoother.d.ts [view]
📄 scroll-to-plugin.d.ts [view]
📄 scroll-trigger.d.ts [view]
📄 split-text.d.ts [view]
📄 text-plugin.d.ts [view]
📄 timeline.d.ts [view]
📄 tween.d.ts [view]
📁 utils

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!