🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/586248.klas4s23.mid-ica.nl/public_html/l3-gastenboek-gijss033/.git/objects

📁 ..
📁 0c
📁 13
📁 15
📁 16
📁 1b
📁 1d
📁 23
📁 24
📁 27
📁 41
📁 4d
📁 4e
📁 51
📁 66
📁 6b
📁 6e
📁 70
📁 75
📁 7e
📁 92
📁 9b
📁 a0
📁 b2
📁 ca
📁 cb
📁 da
📁 dd
📁 e5
📁 ec
📁 f5
📁 f7
📁 fc
📁 fd
📁 info
📁 pack

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!