🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/586004.klas4s23.mid-ica.nl/public_html

📁 ..
📄 .DS_Store [view]
📁 .git
📁 .github
📄 AgencyFB-Bold.ttf [view]
📁 Game
📁 Gamecraft
📁 Gastenboek
📁 Technowire
📄 Technowirelogo.png [view]
📁 burgerbudy
📁 css
📁 ergowijzer
📁 fonts
📄 gamecraft.png [view]
📁 gamecraft213
📄 gastenboek.png [view]
📄 icons8-css-50.png [view]
📄 icons8-html-50.png [view]
📄 image-removebg-preview (6).png [view]
📁 images
📄 index.html [view]
📁 js
📁 nulmeting
📁 pizzaknaller
📄 pizzaknaller.png [view]
📄 prepros-6.config [view]
📁 scss
📄 single.html [view]
📄 snakegame.png [view]
📁 weather
📁 yard

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!